Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support other names in SANs #3889

Merged
merged 22 commits into from
Feb 16, 2018
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Add docs for allowed_other_sans/other_sans
jefferai committed Feb 13, 2018
commit 5219323c59e2f79c0b0b1d4cd46ce19ce4d930cc
35 changes: 35 additions & 0 deletions website/source/api/secret/pki/index.html.md
Original file line number Diff line number Diff line change
@@ -435,6 +435,12 @@ can be set in a CSR are supported.
- `ip_sans` `(string: "")` – Specifies the requested IP Subject Alternative
Names, in a comma-delimited list.

- `other_sans` `(string: "")` – Specifies custom OID/UTF8-string SANs. These
must match values specified on the role in `allowed_other_sans` (globbing
allowed). The format is the same as OpenSSL: `<oid>;<type>:<value>` where the
only current valid type is `UTF8`. This can be a comma-delimited list or a
JSON string slice.

- `format` `(string: "")` – Specifies the format for returned data. This can be
`pem`, `der`, or `pem_bundle`; defaults to `pem`. If `der`, the output is
base64 encoded. If `pem_bundle`, the `csr` field will contain the private key
@@ -553,6 +559,12 @@ need to request a new certificate.**
in a comma-delimited list. Only valid if the role allows IP SANs (which is the
default).

- `other_sans` `(string: "")` – Specifies custom OID/UTF8-string SANs. These
must match values specified on the role in `allowed_other_sans` (globbing
allowed). The format is the same as OpenSSL: `<oid>;<type>:<value>` where the
only current valid type is `UTF8`. This can be a comma-delimited list or a
JSON string slice.

- `ttl` `(string: "")` – Specifies requested Time To Live. Cannot be greater
than the role's `max_ttl` value. If not provided, the role's `ttl` value will
be used. Note that the role values default to system values if not explicitly
@@ -720,6 +732,11 @@ request is denied.
Alternative Names. No authorization checking is performed except to verify
that the given values are valid IP addresses.

- `allowed_other_sans` `(string: "")` – Defines allowed custom OID/UTF8-string
SANs. This field supports globbing. The format is the same as OpenSSL:
`<oid>;<type>:<value>` where the only current valid type is `UTF8`. This can
be a comma-delimited list or a JSON string slice.

- `server_flag` `(bool: true)` – Specifies if certificates are flagged for
server use.

@@ -935,6 +952,12 @@ existing cert/key with new values.
- `ip_sans` `(string: "")` – Specifies the requested IP Subject Alternative
Names, in a comma-delimited list.

- `other_sans` `(string: "")` – Specifies custom OID/UTF8-string SANs. These
must match values specified on the role in `allowed_other_sans` (globbing
allowed). The format is the same as OpenSSL: `<oid>;<type>:<value>` where the
only current valid type is `UTF8`. This can be a comma-delimited list or a
JSON string slice.

- `ttl` `(string: "")` – Specifies the requested Time To Live (after which the
certificate will be expired). This cannot be larger than the engine's max (or,
if not set, the system max).
@@ -1053,6 +1076,12 @@ verbatim.
- `ip_sans` `(string: "")` – Specifies the requested IP Subject Alternative
Names, in a comma-delimited list.

- `other_sans` `(string: "")` – Specifies custom OID/UTF8-string SANs. These
must match values specified on the role in `allowed_other_sans` (globbing
allowed). The format is the same as OpenSSL: `<oid>;<type>:<value>` where the
only current valid type is `UTF8`. This can be a comma-delimited list or a
JSON string slice.

- `ttl` `(string: "")` – Specifies the requested Time To Live (after which the
certificate will be expired). This cannot be larger than the engine's max (or,
if not set, the system max). However, this can be after the expiration of the
@@ -1207,6 +1236,12 @@ root CA need be in a client's trust store.
they will be parsed into their respective fields. If any requested names do
not match role policy, the entire request will be denied.

- `other_sans` `(string: "")` – Specifies custom OID/UTF8-string SANs. These
must match values specified on the role in `allowed_other_sans` (globbing
allowed). The format is the same as OpenSSL: `<oid>;<type>:<value>` where the
only current valid type is `UTF8`. This can be a comma-delimited list or a
JSON string slice.

- `ip_sans` `(string: "")` – Specifies the requested IP Subject Alternative
Names, in a comma-delimited list. Only valid if the role allows IP SANs (which
is the default).