Orchestrators

Keyfactor Command uses orchestrators (a.k.a. agents) to manage a wide variety of certificate store types. As of this writing, Keyfactor offers these orchestrators:

Table 20: Orchestrator Capabilities

 

Universal

Windows

Java

Android

Native

Mac

Bash

Amazon Web Services Add/Remove

1

 

 

 

 

 

Amazon Web Services Inventory

2

 

 

 

 

 

Certificate Auto-enrollmentClosed Certificate enrollment refers to the process by which a user requests a digital certificate. The user must submit the request to a certificate authority (CA).

 

 

 

 

 

 

Certificate Reenrollment

 

 

   

Certificate Renewal

 

 

F5 (Web Server, SSL Profiles, CAClosed A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA. Bundles) Add/Remove

3

 

 

 

 

 

F5 (Web Server & SSL Profiles, CA Bundles) Inventory

4

 

 

 

 

 
F5 (SSL Profiles & CA Bundles) Discovery 5          

File Transfer Protocol Add/Remove

 

 

 

 

 

File Transfer Protocol Inventory

 

 

 

 

 

IIS (Personal, Revoked, Trusted) Add/Remove

 

 

 

 

 

IIS (Personal, Revoked, Trusted) Inventory

 

 

 

 

 

Java KeystoreClosed A Java KeyStore (JKS) is a file containing security certificates with matching private keys. They are often used by Java-based applications for authentication and encryption. Add/Remove

6

 

 

 

 

Java KeystoreClosed A Java KeyStore (JKS) is a file containing security certificates with matching private keys. They are often used by Java-based applications for authentication and encryption. Create

7

 

 

 

 

Java Keystore Discovery

8

 

 

 

 

 

Java Keystore Inventory

9

 

 

 

 
Linux Logon Management            
Log Fetching          

NetScaler Add/Remove

10

 

 

 

 

 

NetScaler Inventory

11

 

 

 

 

 

PEM Add/Remove

12

 

 

 

PEM Discovery

13

 

 

 

 

 

PEM Inventory

14

 

 

 

Remote CA & TemplateClosed A certificate template defines the policies and rules that a CA uses when a request for a certificate is received. Synchronization

 

 

 

 

 

SSL Discovery & Monitoring

 

 

 

 

 
SSH Key Discovery            
SSH Key Generation            
SSH Key Management            

The options available in the Orchestrator Management section of the Management Portal are: