-
Notifications
You must be signed in to change notification settings - Fork 492
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deploy certificates from DigiCert #22709
Comments
@noahtalerman I updated the description to add a little more detail to the demo items. |
Hey @georgekarrv @lukeheath now that drafting is wrapped up for this user story, do you think we're ready to move this to the release board? (off drafting) Heads up that there's no estimate on it yet. |
@noahtalerman That makes sense, I'm moving to the release board since it's already being worked on. @georgekarrv @getvictor When you have a moment, please add an overall estimate to the user story based on the total effort of completing the end-to-end flow with DigiCert per the Figma wireframes. Thanks! |
Leaving Mike's UI feedback here for when we come back to the next iteration of the DigiCert feature. |
@noahtalerman after the Product design check-in meeting I wanted to compile some thoughts and bring a little clarity to PKI in general. Created doc here: PKI Implementation Notes - General understanding and QA perspective |
@georgekarrv @noahtalerman @getvictor I'm removing the priority label on this for now. |
@georgekarrv @lukeheath @getvictor @gillespi314 sounds like we need to estimate the remaining work so I moved this story back to the drafting board and assigned myself. I think we want a PR to the API reference docs before we re-estimate this story. Victor, do we already have the API changes spec'd somewhere? |
No, we are just changing the configs, similar to NDES. The server will convert a PKCS12 payload with Fleet variables into a payload with a Digicert certificate. If a Fleet admin clicks reload icon to reload the policy, we will go to Digicert and fetch a new certificate. Should we also revoke the old certificate? Also, here is the Digicert API that we will use. |
@noahtalerman One additional requirement for Jamf handles this for admins as such:
Do you want this tracked as a separate issue or user story? |
@allenhouchins thanks! No need for a new issue/story for now. I tracked this in the original request so we don't lose it.
|
Closing this one as we'll implement this as part of #25822 |
Certificates weave, |
Goal
Key results
Deliver customer promises and prioritized requests
Original requests
Context
Product designer: @noahtalerman
Jamf docs for the equivalent integration: https://learn.jamf.com/en-US/bundle/technical-paper-digicert-current/page/Distributing_Certificates_Using_the_Certificate_API_Protocol.html
Omnissa docs: https://docs.omnissa.com/bundle/CertificateAuthorityIntegrations/page/DigiCertPKIManagementPortalPlatform.html
Changes
Product
We won't document these in the REST API docs yetEngineering
QA
Risk assessment
Manual testing steps
Spot-check NDES SCEP proxy to make sure we didn't break it with this feature.
Testing notes
Confirmation
The text was updated successfully, but these errors were encountered: