You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -447,70 +447,90 @@ This section outlines all required ports, file access, permissions, and validati
447
447
448
448
***Gateway Registration**
449
449
450
-
TODO Gateway Registration is a required section
450
+
Each ACME CA issues certificates that chain to a specific intermediate and root certificate. For trust validation and proper integration with the Keyfactor Gateway, the following steps are required for**every ACME CA** usedin your environment.
451
451
452
-
***CA Connection**
452
+
---
453
453
454
-
Populate using the configuration fields collected in the [requirements](#requirements) section.
454
+
### 🔍 Retrieving Root and Intermediate Certificates
* **SignerEncryptionPhrase** - Used to encrypt singer information when account is saved to disk (optional)
461
-
* **DnsProvider** - DNS Provider to use for ACME DNS-01 challenges (options Google, Cloudflare, AwsRoute53, Azure, Ns1)
462
-
* **Google_ServiceAccountKeyPath** - Google Cloud DNS: Path to service account JSON key file only if using Google DNS (Optional)
463
-
* **Google_ProjectId** - Google Cloud DNS: Project ID only if using Google DNS (Optional)
464
-
* **Cloudflare_ApiToken** - Cloudflare DNS: API Token only if using Cloudflare DNS (Optional)
465
-
* **Azure_ClientId** - Azure DNS: ClientId only if using Azure DNS and Not Managed Itentity in Azure (Optional)
466
-
* **Azure_ClientSecret** - Azure DNS: ClientSecret only if using Azure DNS and Not Managed Itentity in Azure (Optional)
467
-
* **Azure_SubscriptionId** - Azure DNS: SubscriptionId only if using Azure DNS and Not Managed Itentity in Azure (Optional)
468
-
* **Azure_TenantId** - Azure DNS: TenantId only if using Azure DNS and Not Managed Itentity in Azure (Optional)
469
-
* **AwsRoute53_AccessKey** - Aws DNS: Access Key only if not using AWS DNS and default AWS Chain Creds on AWS (Optional)
470
-
* **AwsRoute53_SecretKey** - Aws DNS: Secret Key only if using AWS DNS and not using default AWS Chain Creds on AWS (Optional)
471
-
* **Ns1_ApiKey** - Ns1 DNS: Api Key only if Using Ns1 DNS (Optional)
456
+
Here is how to obtain the root and intermediate CA certificates from supported ACME providers:
472
457
473
-
2. Define [Certificate Profiles](https://software.keyfactor.com/Guides/AnyCAGatewayREST/Content/AnyCAGatewayREST/AddCP-Gateway.htm) and [Certificate Templates](https://software.keyfactor.com/Guides/AnyCAGatewayREST/Content/AnyCAGatewayREST/AddCA-Gateway.htm) for the Certificate Authority as required. One Certificate Profile must be defined per Certificate Template. It's recommended that each Certificate Profile be named after the Product ID. The Acme plugin supports the following product IDs:
458
+
#### Let's Encrypt
474
459
475
-
***default**
460
+
- **Root**: ISRG Root X1
461
+
- **Intermediate**: R3
476
462
477
-
3. Follow the [official Keyfactor documentation](https://software.keyfactor.com/Guides/AnyCAGatewayREST/Content/AnyCAGatewayREST/AddCA-Keyfactor.htm) to add each defined Certificate Authority to Keyfactor Command and import the newly defined Certificate Templates.
463
+
**How to Get:**
464
+
- Browse to: https://letsencrypt.org/certificates/
465
+
- Download both the **ISRG Root X1** and **R3 Intermediate Certificate (PEM format)**.
478
466
467
+
#### Google Certificate Authority Service (CAS)
479
468
480
-
## Compatibility
469
+
- **Root** and **Intermediate** are custom per CA Pool.
481
470
482
-
The Acme AnyCA Gateway REST plugin is compatible with the Keyfactor AnyCA Gateway REST 24.2 and later.
471
+
**How to Get:**
472
+
1. In the [Google Cloud Console](https://console.cloud.google.com/security/privateca), navigate to your CA pool.
473
+
2. Click the CA name and go to the **Certificates** tab.
474
+
3. Download the **root** and **intermediate** certificates forthe issuing CAin PEM format.
483
475
484
-
## Support
485
-
The Acme AnyCA Gateway REST plugin is supported by Keyfactor for Keyfactor customers. If you have a support issue, please open a support ticket with your Keyfactor representative. If you have a support issue, please open a support ticket via the Keyfactor Support Portal at https://support.keyfactor.com.
476
+
#### ZeroSSL
486
477
487
-
> To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, use the **[Pull requests](../../pulls)** tab.
478
+
- **Root**: USERTrust RSA Certification Authority
479
+
- **Intermediate**: ZeroSSL RSA Domain Secure Site CA
488
480
489
-
## Installation
481
+
**How to Get:**
482
+
- Visit: https://zerossl.com
483
+
- Download the full certificate chain in PEM format.
484
+
- Extract individual certs if needed using OpenSSL or a text editor.
490
485
491
-
1. Install the AnyCA Gateway REST per the [official Keyfactor documentation](https://software.keyfactor.com/Guides/AnyCAGatewayREST/Content/AnyCAGatewayREST/InstallIntroduction.htm).
486
+
#### Buypass
492
487
493
-
2. On the server hosting the AnyCA Gateway REST, download and unzip the latest [Acme AnyCA Gateway REST plugin](https://github.com/Keyfactor/acme-caplugin/releases/latest) from GitHub.
488
+
- **Root**: Buypass Class 3 Root CA
489
+
- **Intermediate**: Buypass Class 3 CA 1 / G2 (depends on issuance)
494
490
495
-
3. Copy the unzipped directory (usually called `net6.0`) to the Extensions directory:
491
+
**How to Get:**
492
+
- Go to: https://www.buypass.com
493
+
- Download both root and intermediate in PEM or DER format.
496
494
497
-
```shell
498
-
Program Files\Keyfactor\AnyCA Gateway\AnyGatewayREST\net6.0\Extensions
499
-
```
495
+
---
500
496
501
-
> The directory containing the Acme AnyCA Gateway REST plugin DLLs (`net6.0`) can be named anything, as long as it is unique within the `Extensions` directory.
497
+
### 🧩 Installing Certificates on the Keyfactor Gateway Server
502
498
503
-
4. Restart the AnyCA Gateway REST service.
499
+
Once downloaded, the **root and intermediate certificates must be installed**in the proper Windows certificate stores on the Gateway server.
504
500
505
-
5. Navigate to the AnyCA Gateway REST portal and verify that the Gateway recognizes the Acme plugin by hovering over the ⓘ symbol to the right of the Gateway on the top left of the portal.
1. Follow the [official AnyCA Gateway REST documentation](https://software.keyfactor.com/Guides/AnyCAGatewayREST/Content/AnyCAGatewayREST/AddCA-Gateway.htm) to define a new Certificate Authority, and use the notes below to configure the **Gateway Registration** and **CA Connection** tabs:
509
+
You can import certificates using the GUI or PowerShell:
- You must specify the **thumbprint** of the Intermediate CA certificate.
523
+
- This is used to associate issued certificates with the correct issuing chain.
524
+
525
+
**How to Get the Thumbprint:**
526
+
527
+
1. In `certlm.msc`, open the certificate under **Intermediate Certification Authorities**.
528
+
2. Go to **Details** tab → Scroll to **Thumbprint**.
529
+
3. Copy the hex string (ignore spaces).
530
+
531
+
---
532
+
533
+
⚠️ All certificate chains must be trusted by the Gateway OS. If the intermediate is missing or untrusted, issuance will fail or returned certificates may not chain properly.
514
534
515
535
***CA Connection**
516
536
@@ -533,113 +553,16 @@ The Acme AnyCA Gateway REST plugin is supported by Keyfactor for Keyfactor custo
533
553
* **AwsRoute53_SecretKey** - Aws DNS: Secret Key only if using AWS DNS and not using default AWS Chain Creds on AWS (Optional)
534
554
* **Ns1_ApiKey** - Ns1 DNS: Api Key only if Using Ns1 DNS (Optional)
535
555
536
-
2. The ACME Gateway Plugin does not require specific certificate templates to be mapped to individual ACME providers in Keyfactor. Instead, you have the flexibility to define templates based on your organization's needs or the specific capabilities of the ACME provider.
537
-
538
-
Key considerations:
539
-
- There is no required or hardcoded template for enrollment.
540
-
- The **default template** configured in Keyfactor Command will work for the majority of cases.
541
-
- You may create additional templates with specific **key types and sizes** (e.g., RSA 2048, RSA 4096, ECC P-256) to match the requirements or limitations of your chosen ACME CA.
542
-
543
-
This allows you to support a variety of use cases or certificate profiles without being tightly coupled to the ACME provider’s template logic. The ACME Gateway simply passes the CSR (generated using the selected Keyfactor template) to the ACME provider.
556
+
2. Define [Certificate Profiles](https://software.keyfactor.com/Guides/AnyCAGatewayREST/Content/AnyCAGatewayREST/AddCP-Gateway.htm) and [Certificate Templates](https://software.keyfactor.com/Guides/AnyCAGatewayREST/Content/AnyCAGatewayREST/AddCA-Gateway.htm) for the Certificate Authority as required. One Certificate Profile must be defined per Certificate Template. It's recommended that each Certificate Profile be named after the Product ID. The Acme plugin supports the following product IDs:
544
557
545
-
> ✅ The plugin will accept any Keyfactor template that produces a valid CSR in a format compatible with the selected ACME provider.
558
+
***default**
546
559
547
560
3. Follow the [official Keyfactor documentation](https://software.keyfactor.com/Guides/AnyCAGatewayREST/Content/AnyCAGatewayREST/AddCA-Keyfactor.htm) to add each defined Certificate Authority to Keyfactor Command and import the newly defined Certificate Templates.
548
561
549
-
## Root CA Configuration
550
-
551
-
Each ACME CA issues certificates that chain to a specific intermediate and root certificate. For trust validation and proper integration with the Keyfactor Gateway, the following steps are required for**every ACME CA** usedin your environment.
552
-
553
-
---
554
-
555
-
### 🔍 Retrieving Root and Intermediate Certificates
556
-
557
-
Here is how to obtain the root and intermediate CA certificates from supported ACME providers:
558
-
559
-
#### Let's Encrypt
560
-
561
-
- **Root**: ISRG Root X1
562
-
- **Intermediate**: R3
563
-
564
-
**How to Get:**
565
-
- Browse to: https://letsencrypt.org/certificates/
566
-
- Download both the **ISRG Root X1** and **R3 Intermediate Certificate (PEM format)**.
567
-
568
-
#### Google Certificate Authority Service (CAS)
569
-
570
-
- **Root** and **Intermediate** are custom per CA Pool.
571
-
572
-
**How to Get:**
573
-
1. In the [Google Cloud Console](https://console.cloud.google.com/security/privateca), navigate to your CA pool.
574
-
2. Click the CA name and go to the **Certificates** tab.
575
-
3. Download the **root** and **intermediate** certificates forthe issuing CAin PEM format.
576
-
577
-
#### ZeroSSL
578
-
579
-
- **Root**: USERTrust RSA Certification Authority
580
-
- **Intermediate**: ZeroSSL RSA Domain Secure Site CA
581
-
582
-
**How to Get:**
583
-
- Visit: https://zerossl.com
584
-
- Download the full certificate chain in PEM format.
585
-
- Extract individual certs if needed using OpenSSL or a text editor.
586
-
587
-
#### Buypass
588
-
589
-
- **Root**: Buypass Class 3 Root CA
590
-
- **Intermediate**: Buypass Class 3 CA 1 / G2 (depends on issuance)
591
-
592
-
**How to Get:**
593
-
- Go to: https://www.buypass.com
594
-
- Download both root and intermediate in PEM or DER format.
595
-
596
-
---
597
-
598
-
### 🧩 Installing Certificates on the Keyfactor Gateway Server
599
562
600
-
Once downloaded, the **root and intermediate certificates must be installed**in the proper Windows certificate stores on the Gateway server.
- You must specify the **thumbprint** of the Intermediate CA certificate.
624
-
- This is used to associate issued certificates with the correct issuing chain.
625
-
626
-
**How to Get the Thumbprint:**
627
-
628
-
1. In `certlm.msc`, open the certificate under **Intermediate Certification Authorities**.
629
-
2. Go to **Details** tab → Scroll to **Thumbprint**.
630
-
3. Copy the hex string (ignore spaces).
631
-
632
-
---
633
-
634
-
⚠️ All certificate chains must be trusted by the Gateway OS. If the intermediate is missing or untrusted, issuance will fail or returned certificates may not chain properly.
635
-
636
-
## License
637
-
638
-
Apache License 2.0, see [LICENSE](LICENSE).
639
-
640
-
## Related Integrations
563
+
## Compatibility
641
564
642
-
See all [Keyfactor Any CA Gateways (REST)](https://github.com/orgs/Keyfactor/repositories?q=anycagateway).
565
+
The Acme AnyCA Gateway REST plugin is compatible with the Keyfactor AnyCA Gateway REST 24.2 and later.
0 commit comments