|
4 | 4 | "name": "AWS Certificate Manager (ACM) Orchestrator",
|
5 | 5 | "status": "production",
|
6 | 6 | "update_catalog": true,
|
7 |
| - "link_github": true, |
| 7 | + "link_github": true, |
8 | 8 | "release_dir": "aws-orchestrator-core/bin/Release/netcoreapp3.1",
|
| 9 | + "release_project": "aws-orchestrator-core/aws-orchestrator-core.csproj", |
9 | 10 | "support_level": "kf-supported",
|
10 | 11 | "description": "The AWS ACM Orchestrator supports Inventory and Management of certificates in the AWS Certificate Manager. It supports three methods of authentication: Environmental Credentials loaded via the AWS SDK e.g. inside an EC2 instance; IAM User Credentials for assuming a Role as a specific user; OAuth-based Credentials to authenticate with an OAuth provider to assume a Role.",
|
11 | 12 | "about": {
|
12 | 13 | "orchestrator": {
|
13 | 14 | "UOFramework": "10.1",
|
14 | 15 | "keyfactor_platform_version": "9.10",
|
15 | 16 | "pam_support": true,
|
16 |
| - "win": { |
17 |
| - "supportsCreateStore": false, |
18 |
| - "supportsDiscovery": false, |
19 |
| - "supportsManagementAdd": true, |
20 |
| - "supportsManagementRemove": true, |
21 |
| - "supportsReenrollment": false, |
22 |
| - "supportsInventory": true, |
23 |
| - "platformSupport": "Unused" |
24 |
| - }, |
25 |
| - "linux": { |
26 |
| - "supportsCreateStore": false, |
27 |
| - "supportsDiscovery": false, |
28 |
| - "supportsManagementAdd": true, |
29 |
| - "supportsManagementRemove": true, |
30 |
| - "supportsReenrollment": false, |
31 |
| - "supportsInventory": true, |
32 |
| - "platformSupport": "Unused" |
33 |
| - }, |
34 | 17 | "store_types": [
|
35 | 18 | {
|
36 | 19 | "Name": "AWS Certificate Manager",
|
|
49 | 32 | "Name": "UseEC2AssumeRole",
|
50 | 33 | "DisplayName": "Assume new Account / Role in EC2",
|
51 | 34 | "Type": "Bool",
|
52 |
| - "DependsOn": null, |
| 35 | + "DependsOn": "", |
53 | 36 | "DefaultValue": "false",
|
54 |
| - "Required": true |
| 37 | + "Required": true, |
| 38 | + "IsPAMEligible": false, |
| 39 | + "Description": "A switch to enable the store to assume a new Account ID and Role when using EC2 credentials" |
55 | 40 | },
|
56 | 41 | {
|
57 | 42 | "Name": "UseOAuth",
|
58 | 43 | "DisplayName": "Use OAuth 2.0 Provider",
|
59 | 44 | "Type": "Bool",
|
60 |
| - "DependsOn": null, |
| 45 | + "DependsOn": "", |
61 | 46 | "DefaultValue": "false",
|
62 |
| - "Required": true |
| 47 | + "Required": true, |
| 48 | + "IsPAMEligible": false, |
| 49 | + "Description": "A switch to enable the store to use an OAuth provider workflow to authenticate with AWS ACM" |
63 | 50 | },
|
64 | 51 | {
|
65 | 52 | "Name": "UseIAM",
|
66 | 53 | "DisplayName": "Use IAM User Auth",
|
67 | 54 | "Type": "Bool",
|
68 |
| - "DependsOn": null, |
| 55 | + "DependsOn": "", |
69 | 56 | "DefaultValue": "false",
|
70 |
| - "Required": true |
| 57 | + "Required": true, |
| 58 | + "IsPAMEligible": false, |
| 59 | + "Description": "A switch to enable the store to use IAM User auth to assume a role when authenticating with AWS ACM" |
71 | 60 | },
|
72 | 61 | {
|
73 | 62 | "Name": "EC2AssumeRole",
|
74 | 63 | "DisplayName": "AWS Role to Assume (EC2)",
|
75 | 64 | "Type": "String",
|
76 | 65 | "DependsOn": "UseEC2AssumeRole",
|
77 |
| - "DefaultValue": null, |
78 |
| - "Required": false |
| 66 | + "DefaultValue": "", |
| 67 | + "Required": false, |
| 68 | + "IsPAMEligible": false, |
| 69 | + "Description": "The AWS Role to assume using the EC2 instance credentials" |
79 | 70 | },
|
80 | 71 | {
|
81 | 72 | "Name": "OAuthScope",
|
82 | 73 | "DisplayName": "OAuth Scope",
|
83 | 74 | "Type": "String",
|
84 | 75 | "DependsOn": "UseOAuth",
|
85 |
| - "DefaultValue": null, |
86 |
| - "Required": false |
| 76 | + "DefaultValue": "", |
| 77 | + "Required": false, |
| 78 | + "IsPAMEligible": false, |
| 79 | + "Description": "This is the OAuth Scope needed for Okta OAuth, defined in Okta" |
87 | 80 | },
|
88 | 81 | {
|
89 | 82 | "Name": "OAuthGrantType",
|
90 | 83 | "DisplayName": "OAuth Grant Type",
|
91 | 84 | "Type": "String",
|
92 | 85 | "DependsOn": "UseOAuth",
|
93 | 86 | "DefaultValue": "client_credentials",
|
94 |
| - "Required": false |
| 87 | + "Required": false, |
| 88 | + "IsPAMEligible": false, |
| 89 | + "Description": "In OAuth 2.0, the term �grant type� refers to the way an application gets an access token. In Okta this is `client_credentials`" |
95 | 90 | },
|
96 | 91 | {
|
97 | 92 | "Name": "OAuthUrl",
|
98 | 93 | "DisplayName": "OAuth Url",
|
99 | 94 | "Type": "String",
|
100 | 95 | "DependsOn": "UseOAuth",
|
101 | 96 | "DefaultValue": "https://***/oauth2/default/v1/token",
|
102 |
| - "Required": false |
| 97 | + "Required": false, |
| 98 | + "IsPAMEligible": false, |
| 99 | + "Description": "An optional parameter sts:ExternalId to pass with Assume Role calls" |
103 | 100 | },
|
104 | 101 | {
|
105 | 102 | "Name": "IAMAssumeRole",
|
106 | 103 | "DisplayName": "AWS Role to Assume (IAM)",
|
107 | 104 | "Type": "String",
|
108 | 105 | "DependsOn": "UseIAM",
|
109 |
| - "DefaultValue": null, |
110 |
| - "Required": false |
| 106 | + "DefaultValue": "", |
| 107 | + "Required": false, |
| 108 | + "IsPAMEligible": false, |
| 109 | + "Description": "The AWS Role to assume as the IAM User." |
111 | 110 | },
|
112 | 111 | {
|
113 | 112 | "Name": "OAuthAssumeRole",
|
114 | 113 | "DisplayName": "AWS Role to Assume (OAuth)",
|
115 | 114 | "Type": "String",
|
116 | 115 | "DependsOn": "UseOAuth",
|
117 |
| - "DefaultValue": null, |
118 |
| - "Required": false |
| 116 | + "DefaultValue": "", |
| 117 | + "Required": false, |
| 118 | + "IsPAMEligible": false, |
| 119 | + "Description": "The AWS Role to assume after getting an OAuth token." |
119 | 120 | },
|
120 | 121 | {
|
121 | 122 | "Name": "ExternalId",
|
122 | 123 | "DisplayName": "sts:ExternalId",
|
123 | 124 | "Type": "String",
|
124 |
| - "DependsOn": null, |
125 |
| - "DefaultValue": null, |
126 |
| - "Required": false |
| 125 | + "DependsOn": "", |
| 126 | + "DefaultValue": "", |
| 127 | + "Required": false, |
| 128 | + "IsPAMEligible": false, |
| 129 | + "Description": "An optional parameter sts:ExternalId to pass with Assume Role calls" |
127 | 130 | },
|
128 | 131 | {
|
129 | 132 | "Name": "ServerUsername",
|
130 | 133 | "DisplayName": "Server Username",
|
131 | 134 | "Type": "Secret",
|
132 |
| - "DependsOn": null, |
133 |
| - "DefaultValue": null, |
134 |
| - "Required": false |
| 135 | + "DependsOn": "", |
| 136 | + "DefaultValue": "", |
| 137 | + "Required": false, |
| 138 | + "IsPAMEligible": true, |
| 139 | + "Description": "The AWS Access Key for an IAM User or Client ID for OAuth. Depends on Auth method in use." |
135 | 140 | },
|
136 | 141 | {
|
137 | 142 | "Name": "ServerPassword",
|
138 | 143 | "DisplayName": "Server Password",
|
139 | 144 | "Type": "Secret",
|
140 |
| - "DependsOn": null, |
141 |
| - "DefaultValue": null, |
142 |
| - "Required": false |
143 |
| - }, |
144 |
| - { |
145 |
| - "Name": "ServerUseSsl", |
146 |
| - "DisplayName": "Use SSL", |
147 |
| - "Type": "Bool", |
148 |
| - "DependsOn": null, |
149 |
| - "DefaultValue": "true", |
150 |
| - "Required": true |
| 145 | + "DependsOn": "", |
| 146 | + "DefaultValue": "", |
| 147 | + "Required": false, |
| 148 | + "IsPAMEligible": true, |
| 149 | + "Description": "The AWS Access Secret for an IAM User or Client Secret for OAuth. Depends on Auth method in use." |
151 | 150 | }
|
152 | 151 | ],
|
153 | 152 | "EntryParameters": [
|
|
160 | 159 | "OnAdd": true,
|
161 | 160 | "OnRemove": false,
|
162 | 161 | "OnReenrollment": false
|
163 |
| - } |
| 162 | + }, |
| 163 | + "Description": "When adding, this is the Region that the Certificate will be added to" |
| 164 | + }, |
| 165 | + { |
| 166 | + "Name": "ACM Tags", |
| 167 | + "DisplayName": "ACM Tags", |
| 168 | + "Type": "String", |
| 169 | + "RequiredWhen": { |
| 170 | + "HasPrivateKey": false, |
| 171 | + "OnAdd": false, |
| 172 | + "OnRemove": false, |
| 173 | + "OnReenrollment": false |
| 174 | + }, |
| 175 | + "Description": "The ACM tags that should be assigned to the certificate. Multiple name/value pairs may be entered in the format of `Name1=Value1,Name2=Value2,...,NameN=ValueN`" |
164 | 176 | }
|
165 | 177 | ],
|
166 | 178 | "PasswordOptions": {
|
|
0 commit comments