certificate.create ================== Create a new Certificate Certificates are classified under following types and the necessary keywords to be passed for `create_type` attribute to create the respective type of certificate 1) Imported Certificate - CERTIFICATE_CREATE_IMPORTED 2) Certificate Signing Request - CERTIFICATE_CREATE_CSR 3) Imported Certificate Signing Request - CERTIFICATE_CREATE_IMPORTED_CSR 4) ACME Certificate - CERTIFICATE_CREATE_ACME By default, created CSRs use RSA keys. If an Elliptic Curve Key is desired, it can be specified with the `key_type` attribute. If the `ec_curve` attribute is not specified for the Elliptic Curve Key, then default to using "SECP384R1" curve. A type is selected by the Certificate Service based on `create_type`. The rest of the values in `data` are validated accordingly and finally a certificate is made based on the selected type. `cert_extensions` can be specified to set X509v3 extensions. .. examples(websocket):: Create an ACME based certificate :::javascript { "id": "6841f242-840a-11e6-a437-00e04d680384", "msg": "method", "method": "certificate.create", "params": [{ "tos": true, "csr_id": 1, "acme_directory_uri": "https://acme-staging-v02.api.letsencrypt.org/directory", "name": "acme_certificate", "dns_mapping": { "domain1.com": "1" }, "create_type": "CERTIFICATE_CREATE_ACME" }] } Create an Imported Certificate Signing Request :::javascript { "id": "6841f242-840a-11e6-a437-00e04d680384", "msg": "method", "method": "certificate.create", "params": [{ "name": "csr", "CSR": "CSR string", "privatekey": "Private key string", "create_type": "CERTIFICATE_CREATE_IMPORTED_CSR" }] } This method is a job. .. raw:: html
CertificateCreateArgs parameters.
No Additional PropertiesCertificate name.
Must be at least 1 characters long
Must be at most 120 characters long
Type of certificate creation operation.
Whether to add this certificate to the trusted certificate store.
PEM-encoded certificate to import or null.
Must be at least 1 characters long
PEM-encoded private key to import or null.
Must be at least 1 characters long
PEM-encoded certificate signing request to import or null.
Must be at least 1 characters long
RSA key length in bits or null.
Type of cryptographic key to generate.
Elliptic curve to use for EC keys.
Passphrase to protect the private key or null.
Must be at least 1 characters long
City or locality name for certificate subject or null.
Must be at least 1 characters long
Common name for certificate subject or null.
Must be at least 1 characters long
Country name for certificate subject or null.
Must be at least 1 characters long
Email address for certificate subject or null.
Organization name for certificate subject or null.
Must be at least 1 characters long
Organizational unit for certificate subject or null.
Must be at least 1 characters long
State or province name for certificate subject or null.
Must be at least 1 characters long
Hash algorithm for certificate signing.
Subject alternative names for the certificate.
No Additional ItemsMust be at least 1 characters long
Certificate extensions configuration.
No Additional PropertiesBasic Constraints extension configuration for certificate authority capabilities.
No Additional PropertiesWhether this certificate is authorized to sign other certificates as a Certificate Authority (CA).
Whether the Basic Constraints X.509 extension is present in the certificate.
Maximum number of intermediate CA certificates that may follow this certificate in a valid certificate chain.     null indicates no path length constraint.
Whether the Basic Constraints extension is marked as critical. If true, applications that do not understand     this extension must reject the certificate.
Extended Key Usage extension configuration specifying certificate purposes.
No Additional PropertiesArray of Extended Key Usage (EKU) purposes that define what the certificate may be used for (e.g., 'SERVERAUTH', 'CLIENTAUTH', 'CODE_SIGNING').
No Additional ItemsWhether the Extended Key Usage X.509 extension is present in the certificate.
Whether the Extended Key Usage extension is marked as critical. If true, applications that do not understand     this extension must reject the certificate.
Key Usage extension configuration defining permitted cryptographic operations.
No Additional PropertiesWhether the Key Usage X.509 extension is present in the certificate.
Whether the certificate may be used for digital signatures to verify identity or integrity.
Whether the certificate may be used for non-repudiation (proving content commitment).
Whether the certificate's public key may be used for encrypting symmetric keys.
Whether the certificate's public key may be used for directly encrypting raw data.
Whether the certificate's public key may be used for key agreement protocols (e.g., Diffie-Hellman).
Whether the certificate may be used to sign other certificates (CA functionality).
Whether the certificate may be used to sign Certificate Revocation Lists (CRLs).
Whether the public key may only be used for encryption when key_agreement is also set.
Whether the public key may only be used for decryption when key_agreement is also set.
Whether the Key Usage extension is marked as critical. If true, applications that do not understand     this extension must reject the certificate.
ACME directory URI to be used for ACME certificate creation.
Must be at least 1 characters long
CSR to be used for ACME certificate creation.
Set this when creating an ACME certificate to accept terms of service of the ACME service.
A mapping of domain to ACME DNS Authenticator ID for each domain listed in SAN or common name of the CSR.
Each additional property must conform to the following schema
Type: integerNumber of days before the certificate expiration date to attempt certificate renewal. If certificate renewal fails, renewal will be reattempted every day until expiration.
Value must be greater or equal to 1 and lesser or equal to 30
The created certificate configuration.
No Additional PropertiesUnique identifier for this certificate entry.
Internal certificate type identifier used to determine certificate capabilities.
Human-readable name for this certificate. Must be unique and contain only alphanumeric characters, dashes, and underscores.
Must be at least 1 characters long
PEM-encoded X.509 certificate data. null for certificate signing requests (CSR) that have not yet     been signed.
PEM-encoded private key corresponding to the certificate. null if no private key is available or for     imported certificates without keys.
PEM-encoded Certificate Signing Request (CSR) data. null for imported certificates or completed     ACME certificates.
ACME directory server URI used for automated certificate management. null for non-ACME certificates.
Mapping of domain names to ACME DNS authenticator IDs for domain validation. null for non-ACME     certificates.
Number of days before expiration to attempt automatic renewal. Only applicable for ACME certificates.     null for non-renewable certificates.
ACME registration and account information used for certificate lifecycle management. null for     non-ACME certificates.
Whether this certificate should be added to the system's trusted certificate store.
Filesystem path where certificate-related files are stored.
Must be at least 1 characters long
Filesystem path to the certificate file (.crt). null if no certificate is available.
Must be at least 1 characters long
Filesystem path to the private key file (.key). null if no private key is available.
Must be at least 1 characters long
Filesystem path to the certificate signing request file (.csr). null if no CSR is available.
Must be at least 1 characters long
Human-readable certificate type, typically 'CERTIFICATE' for standard certificates.
Must be at least 1 characters long
Whether this is an existing certificate (imported or generated).
Whether this entry represents a Certificate Signing Request (CSR) rather than a signed certificate.
Whether this certificate is a Certificate Authority (CA) certificate.
Array of PEM-encoded certificates in the certificate chain, starting with the leaf certificate.
No Additional ItemsSize of the cryptographic key in bits. null if key information is unavailable.
Type of cryptographic key algorithm (e.g., 'RSA', 'EC', 'DSA'). null if key information is unavailable.
Must be at least 1 characters long
ISO 3166-1 alpha-2 country code from the certificate subject. null if not specified.
State or province name from the certificate subject. null if not specified.
City or locality name from the certificate subject. null if not specified.
Organization name from the certificate subject. null if not specified.
Organizational unit from the certificate subject. null if not specified.
Common name (CN) from the certificate subject. null if not specified.
Subject Alternative Names (SAN) from the certificate extension. null if no SAN extension is present.
Email address from the certificate subject. null if not specified.
Distinguished Name (DN) of the certificate subject in RFC 2253 format. null if certificate parsing failed.
Hash of the certificate subject name. null if certificate parsing failed.
X.509 certificate extensions parsed into a dictionary structure.
Cryptographic hash algorithm used for certificate signing (e.g., 'SHA256'). null if unavailable.
Certificate validity period in seconds. null if certificate parsing failed.
Certificate validity start date in ISO 8601 format. null if certificate parsing failed.
Certificate validity end date in ISO 8601 format. null if certificate parsing failed.
Certificate serial number. null if certificate parsing failed.
Whether this certificate has an associated certificate chain. null if unavailable.
SHA-256 fingerprint of the certificate in hexadecimal format. null if certificate parsing failed.
Whether the certificate has expired. null if certificate parsing failed.
Whether the certificate data was successfully parsed and validated.