PUT Certificate Stores Server
The PUT /CertificateStores/Server method is used to update the server record for a certificate store in Keyfactor Command. This method returns HTTP 200 OK on a success with details of the server record.
Tip: The following permissions (see
Security Roles and Claims) are required to use this feature:
/certificate_stores/modify/
OR
/certificate_stores/modify/#/ (where # is a reference to a specific certificate store container ID)
Permissions for certificate stores can be set at either the global or certificate store container level. Updating certificate store server records requires permissions at the global level. See Container Permissions for more information about global vs container permissions.
Note: This method has been deprecated and will be removed from the
Keyfactor in a future release. This method is retained until that time for backwards compatibility. Continuing to use this with the latest
Keyfactor Command functionality could cause serious data issues such as, for instance, overwriting all certificate stores on the server. Certificate store server information is now found in the Properties field of the certificate store (see
PUT Certificate Stores. This endpoint has additional functionality, such as being able to set different credentials for different stores on the same server.
Important: Any previously populated fields that are not submitted with their full existing data using this method will be cleared of their existing data. When using this method, you should first do a GET to retrieve all the values for the record you want to update, enter corrected data into the field(s) you want to update, and then submit all the fields using PUT, including the fields that contain values but which you are not changing.
Table 334: PUT Certificate Stores Server Input Parameters
Id |
Body |
The ID of the server. |
Username |
Body |
Required. The username used to connect to the certificate store. Show username details.SecretValue | A string containing the username. This value only needs to be supplied if you're storing your username in the Keyfactor Command database. | Provider | An integer that identifies the PAM provider used to store the username. Use the GET /PamProviders method (see GET PAM Providers) to retrieve a list of your defined PAM providers to determine the PAM provider ID to use. See PAM Provider Configuration in Keyfactor Command in the Keyfactor Command Reference Guide for more information. This value only needs to be supplied if you're storing your username using a PAM provider. | Parameters | The parameters required by your PAM provider, containing the information that identifies the location of the username in the PAM solution. Use the GET /PamProviders method (see GET PAM Providers) to retrieve a list of the parameters used by your PAM provider. Only parameters where InstanceLevel is equal to true need to be supplied in the request. For example, for Delinea (formerly Thycotic), this might be: Copy"Username": { "Provider": 2, "Parameters": { "SecretId": 4 } },
For CyberArk, this might be: Copy"Username": { "Provider": 5, "Parameters": { "Folder": "Root", "Object": "F5Username" } },
|
|
Password |
Body |
Required. The password used to connect to the certificate store. Show password details.
SecretValue |
A string containing the password. This value only needs to be supplied if you're storing your password in the Keyfactor Command database. |
Provider |
An integer that identifies the PAM provider used to store the password. Use the GET /PamProviders method (see GET PAM Providers) to retrieve a list of your defined PAM providers to determine the PAM provider ID to use.
|
Parameters |
The parameters required by your PAM provider, containing the information that identifies the location of the password in the PAM solution. Use the GET /PamProviders method (see GET PAM Providers) to retrieve a list of the parameters used by your PAM provider. Only parameters where InstanceLevel is equal to true need to be supplied in the request.
For example, for Delinea, this might be:
Copy
"Password": { "Provider": 2, "Parameters": { "SecretId": 5 } },
For CyberArk, this might be:
Copy
"Password": { "Provider": 5, "Parameters": { "Folder": "Root", "Object": "F5Password" } },
|
|
UseSSL |
Body |
A Boolean that indicates whether Keyfactor Command will use SSL to communicate with the server (true) or not (false). The default is false. |
Name |
Body |
Required. The host name of the server. |
Container |
Body |
An integer that identifies the certificate store container into which the certificate store should be placed for organizational and management purposes.
|
Table 335: PUT Certificate Stores Server Response Data
Id |
The ID of the server. |
UseSSL |
A Boolean that indicates whether Keyfactor Command will use SSL to communicate with the server (true) or not (false). |
ServerType |
An integer indicating the type of server. Show server type details (your environment may include custom values not shown here).
0 |
F5 Web Server & F5 SSL Profiles (Deprecated) |
1 |
NetScaler (Deprecated) |
2 |
FTP (Deprecated) |
3 |
F5 Web Server REST |
4 |
F5 SSL Profiles REST |
5 |
F5 CA Bundles REST |
|
Name |
The host name of the server. |
Tip: See the
Keyfactor API Reference and Utility which provides a utility through which the
Keyfactor API endpoints can be called and results returned. It is intended to be used primarily for validation, testing and development. It also serves secondarily as documentation for the API. The link to the
Keyfactor API Reference and Utility is in the dropdown from the help icon (

) at the top of the
Management Portal page next to the
Log Out button.