This open source project is community-supported. To report a problem or share an idea, use
Issues; and if you have a suggestion for fixing the issue, please include those details, too.
In addition, use Pull Requests to contribute actual bug fixes or proposed enhancements.
We welcome and appreciate all contributions. Got questions or want to discuss something with our team?
Join us on Slack!
VCert is a Go library, SDK, and command line utility designed to simplify key generation and enrollment of machine identities (also known as SSL/TLS certificates and keys) that comply with enterprise security policy by using the CyberArk Certificate Manager, Self-Hosted or CyberArk Certificate Manager, SaaS or CyberArk Workload Identity Manager.
See VCert CLI for CyberArk Certificate Manager, Self-Hosted or VCert CLI for CyberArk Certificate Manager, SaaS or VCert CLI for CyberArk Workload Identity Manager to get started with the command line utility.
VCert releases are tested using the latest version of CyberArk Certificate Manager, Self-Hosted. General functionality of the latest VCert release should be compatible with CyberArk Certificate Manager, Self-Hosted 17.3 or higher. Custom Fields and Instance Tracking require CyberArk Certificate Manager, Self-Hosted 18.2 or higher, and Token Authentication requires CyberArk Certificate Manager, Self-Hosted 20.1 or higher.
-
Configure your Go environment according to https://golang.org/doc/install.
-
Verify that GOPATH environment variable is set correctly
-
Download the source code:
go get github.com/Venafi/vcert/v5
or pre Go 1.13
git clone https://github.com/Venafi/vcert.git $GOPATH/src/github.com/Venafi/vcert/v5Go 1.11 with go modules enabled or go 1.13 and up make sure to clone outside of
$GOPATH/srcgit clone https://github.com/Venafi/vcert.git
-
Build the command line utilities for Linux, macOS, and Windows:
make build
For code samples of programmatic use, please review the files in examples folder.
- In your
main.gofile, make the following import declarations:import ( "github.com/Venafi/vcert/v5" "github.com/Venafi/vcert/v5/pkg/certificate" "github.com/Venafi/vcert/v5/pkg/endpoint" )
- Create a configuration object of type
&vcert.Configthat specifies the CyberArk connection details. Solutions are typically designed to get those details from a secrets vault, .ini file, environment variables, or command line parameters.
- Instantiate a client by calling the
NewClientmethod of the vcert class with the configuration object. - Compose a certificate request object of type
&certificate.Request. - Generate a key pair and CSR for the certificate request by calling the
GenerateRequestmethod of the client. - Submit the request by passing the certificate request object to the
RequestCertificatemethod of the client. - Use the request ID to pickup the certificate using the
RetrieveCertificatemethod of the client.
- Call
vcert.ConfigmethodNewListenerwith list of domains as arguments. For example("test.example.com:8443", "example.com") - Use gotten
net.Listeneras argument to built-inhttp.Serveor other https servers.
Samples are in a state where you can build/execute them using the following commands (after setting the environment variables discussed later):
go build -o cli ./example
go test -v ./example -run TestRequestCertificate- A user account that has been granted WebSDK Access
- A folder (zone) where the user has been granted the following permissions:
View,Read,Write,Create,Revoke(for the revoke action), andPrivate Key Read(for the pickup action when CSR is service generated) - Policy applied to the folder which specifies:
- CA Template that CyberArk Certificate Manager, Self-Hosted will use to enroll certificate requests submitted by VCert
- Subject DN values for Organizational Unit (OU), Organization (O), City (L), State (ST) and Country (C)
- Management Type not locked or locked to 'Enrollment'
- Certificate Signing Request (CSR) Generation unlocked or not locked to 'Service Generated CSR'
- Generate Key/CSR on Application not locked or locked to 'No'
- (Recommended) Disable Automatic Renewal set to 'Yes'
- (Recommended) Key Bit Strength set to 2048 or higher
- (Recommended) Domain Whitelisting policy appropriately assigned
The requirement for the CA Template to be assigned by policy follows a long-standing CyberArk best practice which also met our design objective to keep the certificate request process simple for VCert users. If you require the ability to specify the CA Template with the request you can use the CyberArk Certificate Manager, Self-Hosted REST APIs but please be advised this goes against CyberArk recommendations.
Unit tests:
make testIntegration tests for CyberArk Certificate Manager, Self-Hosted and CyberArk Certificate Manager, SaaS require access to those products. Environment
variables are used to specify required settings including credentials. The CyberArk Certificate Manager, SaaS API key and zone value
fragments (i.e. Application Name\Issuing Template API Alias) are readily available in the web interface.
export TPP_URL=https://cmsh.cyberark.example/vedsdk
export TPP_USER=tpp-user
export TPP_PASSWORD=tpp-password
export TPP_ZONE='some\suggested_policy'
export TPP_ZONE_RESTRICTED='some\locked_policy'
export TPP_ZONE_ECDSA='some\ecdsa_policy'
make tpp_testexport CLOUD_URL=https://api.venafi.cloud/v1
export CLOUD_APIKEY=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx
export CLOUD_ZONE='My Application\Permissive CIT'
export CLOUD_ZONE_RESTRICTED='Your Application\Restrictive CIT'
make cloud_testCommand line utility tests make use of Cucumber & Aruba feature files.
-
To run tests for all features in parallel:
make cucumber
-
To run tests only for a specific feature:
make cucumber FEATURE=./features/basic/version.feature
Available features are:
basicconfigenrollformatgencsrrenewrevoke
When run, these tests will be executed in their own Docker container using the Ruby version of Cucumber.
The completed test run will report on the number of test scenarios and steps that passed, failed, or were skipped.
For detailed explanations about the playbook and how it is build please check here: Readme Playbook
CyberArk welcomes contributions from the developer community.
- Fork it to your account (https://github.com/Venafi/vcert/fork)
- Clone your fork:
git clone git@github.com:youracct/vcert.git
- Create a feature branch:
git checkout -b your-branch-name
- Implement and test your changes
- Commit your changes:
git commit -am 'Added some cool functionality' - Push to the branch
git push origin your-branch-name
- Create a new Pull Request at https://github.com/youracct/vcert/pull/new/your-branch-name
Copyright © Venafi, Inc. and CyberArk Software Ltd. ("CyberArk")
VCert is licensed under the Apache License, Version 2.0. See LICENSE for the full license text.
Please direct questions/comments to mis-opensource@cyberark.com.