Values File Settings for Containers Under Kubernetes

When Keyfactor Command is installed in a containerized implementation, there are a number of settings that can be configured in the values file to pass to the helm chart to provide customization. These are provided in the following table.

Table 112: Keyfactor Command Containerized Installation Values File Settings

Name

Description

Example Default
additional Environment Variables

Other environment variables that should be included for all containers.

See, for example:

   

appConfig

analysis

image

name

The name of the image for the Analysis container in the Keyfactor artifactory.   analysis

appConfig

api

image

name

The name of the image for the Keyfactor API container in the Keyfactor artifactory.   api

appConfig

api

image

path

The URL to which traffic is directed for the Keyfactor API application.

If you opt to change this, these values must match:

  • app Config > api > image > path

  • dbupgrade tool > api > virtual Folder (with the exception of the leading slash)

  • ingress > apiPath

  /Keyfactor API

appConfig

ca connector api

image

name

The name of the image for the CA Connector API container in the Keyfactor artifactory.   ca- connector- api

appConfig

ca connector api

image

path

The URL to which traffic is directed for the Keyfactor API application.

If you opt to change this, these values must match:

  • appConfig > caconnector api > image > path

  • dbupgradetool > caConnector > virtualFolder (with the exception of the leading slash)

  • ingress > caConnectorPath

  /Keyfactor CA Connectors

appConfig

claims proxy

image

name

The name of the image for the Claims Proxy container in the Keyfactor artifactory.   claims-proxy

appConfig

claims proxy

image

path

The URL to which traffic is directed for the Keyfactor API application.

If you opt to change this, these values must match:

  • appConfig > claimsproxy > image > path

  • dbupgradetool > proxy > virtualFolder (with the exception of the leading slash)

  • ingress > claimsProxyPath

  /Keyfactor Proxy

appConfig

orchestrator api

image

name

The name of the image for the Orchestrator API container in the Keyfactor artifactory.   orchestrator- api

appConfig

orchestrator api

image

path

The URL to which traffic is directed for the Keyfactor API application.

If you opt to change this, these values must match:

  • appConfig > orchestratorapi > image > path

  • dbupgradetool > agents > virtualFolder (with the exception of the leading slash)

  • ingress > orchApiPath

  /Keyfactor Agents

appConfig

portal

image

name

The name of the image for the Management Portal container in the Keyfactor artifactory.   console

appConfig

portal

image

path

The URL to which traffic is directed for the Keyfactor API application.

If you opt to change this, these values must match:

  • appConfig > portal > image > path

  • dbupgradetool > webConsole > virtualFolder (with the exception of the leading slash)

  • ingress > portalPath

  /Keyfactor Portal

appConfig

timer service

image

name

The name of the image for the Keyfactor Command Service (timer service) container in the Keyfactor artifactory.   timer- service

appConfig

timer service

limits

cpu

The maximum CPU the Keyfactor Command Service container may use.

  500m

appConfig

timer service

service

enabled

The Keyfactor Command Service controls CA synchronization jobs, alert generation, reporting, and database cleanup tasks, among other jobs. The parameter enables the service (true) or not (false).   false

appConfig

timerservice

limits

memory

The maximum memory the Keyfactor Command Service container may use.

  2G

connection Strings

database

The plain text name of the database in SQL server for Keyfactor Command.

The database will be created if it does not already exist.

This value is required if a Kubernetes secret is not used to provide this information as part of a connection string.

To provide the connection strings as a secret, see:

  • connection Strings > existing Secret Name

  • connection Strings > existing Secret EFKey

  • connection Strings > existing Sql DirectKey

   

connection Strings

ef Template

The template for generating entity framework connection strings using plain text values.

This value is used if a Kubernetes secret is not used to provide a connection string.

To provide the connection strings as a secret, see:

  • connection Strings > existing Secret Name

  • connection Strings > existing Secret EFKey

  • connection Strings > existing Sql DirectKey

  metadata= res://*/EFModels.csdl \\|res://*/EFModels.ssdl \\|res://*/EFModels.msl; provider= Microsoft. Data. SqlClient; provider connection string= ’Data Source=%s; Initial Catalog=%s; Integrated Security=False; User ID=%s; Password=%s; Encrypt=true;Persist Security Info=True; Command Timeout=360; Multiple Active Result Sets=True; Application Name= Entity Framework'

connection Strings

existing Secret EFKey

The Kubernetes secret key name given to the secret for the entity framework connection string.

This parameter is required if plain text values are not provided.

ef  

connection Strings

existing Secret Name

The Kubernetes secret name that contains the connection string values.

This parameter is required if plain text values are not provided.

connection- strings  

connection Strings

existing Sql Direct Key

The Kubernetes secret key name given to the secret for the SQL connection string.

This parameter is required if plain text values are not provided.

sqlDirect  

connection Strings

hostname

The plain text name, IP address, or fully qualified domain name (FQDN) of the Microsoft SQL server.

This value is required if a Kubernetes secret is not used to provide this information as part of a connection string.

To provide the connection strings as a secret, see:

  • connection Strings > existing Secret Name

  • connection Strings > existing Secret EFKey

  • connection Strings > existing Sql DirectKey

   

connection Strings

password

The plain text password for the SQL user (see connection Strings > username).

This value is required if a Kubernetes secret is not used to provide this information as part of a connection string.

To provide the connection strings as a secret, see:

  • connection Strings > existing Secret Name

  • connection Strings > existing Secret EFKey

  • connection Strings > existing Sql DirectKey

   

connection Strings

sql Direct Template

The template for generating SQL connection strings using plain text values for the connection string.

This value is used if a Kubernetes secret is not used to provide a connection string.

To provide the connection strings as a secret, see:

  • connection Strings > existing Secret Name

  • connection Strings > existing Secret EFKey

  • connection Strings > existing Sql DirectKey

  Data Source=%s; Initial Catalog=%s; Integrated Security=False; Persist Security Info=True; Command Timeout=360; User ID=%s; Password=%s; Encrypt=true;

connection Strings

username

The plain text username for a SQL user with sufficient permissions to complete the install (see Grant Permissions in SQL).

This value is required if a Kubernetes secret is not used to provide this information as part of a connection string.

To provide the connection strings as a secret, see:

  • connection Strings > existing Secret Name

  • connection Strings > existing Secret EFKey

  • connection Strings > existing Sql DirectKey

   

container Security Context

allow Privilege Escalation

The container security context to use for all containers.   false

dbPoller

image Pull Policy

Retrieve a fresh copy of the Keyfactor Command images from the Keyfactor artifactory on start?   Always

dbPoller

polling Interval

The interval of time between checks to the SQL database to confirm that it’s online and not in maintenance mode before the application containers are allowed to start.   5

dbPoller

resources

limits

cpu

The maximum CPU the database polling container may use.

  200m

dbPoller

resources

limits

memory

The maximum memory the database polling container may use.

  500M

dbPoller

resources

requests

cpu

The baseline amount of CPU allocated for use by the database polling container.

  5m

dbPoller

resources

requests

memory

The baseline amount of memory allocated for use by the database polling container.

  300M

dbupgrade tool

admin User

claim Type

The claim type for the initial administrative user or group to be created in Keyfactor Command. The supported values are:

  • OAuthOid

    An open authorization claim of a type not covered by client, role or subject.

  • OAuthRole

    An open authorization group claim.

  • OAuthSubject

    An open authorization user claim.

  • OAuthClientId

    An open authorization client application claim.

This parameter is required.

   

dbupgrade tool

admin User

claim Value

The value for the for the initial administrative user or group to be created in Keyfactor Command.

For example, a GUID for a user account sub, a role name for a role, or a client ID for a client (see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation for more information).

This parameter is required.

   

dbupgrade tool

admin User

description

A description for the initial administrative user or group to be created in Keyfactor Command to override the default, if desired.   Default Administrator

dbupgrade tool

admin User

identity Provider

The name set by dbupgrade tool > idp > display Name for the initial administrative user or group to be created in Keyfactor Command.

This parameter is required.

Command OIDC  

dbupgrade tool

agents

use SSL

Use SSL for connections to the Orchestrator API application.   true

dbupgrade tool

agents

virtual Folder

The virtual folder name for the Orchestrator API application.

If you opt to change this, these values must match:

  • appConfig > orchestrator api > image > path

  • dbupgrade tool > agents > virtual Folder (with the exception of the leading slash)

  • ingress > orch Api Path

  Keyfactor Agents

dbupgrade tool

api

use SSL

Use SSL for connections to the Keyfactor API application.   true

dbupgrade tool

api

virtual Folder

The virtual folder name for the Keyfactor API application.

If you opt to change this, these values must match:

  • appConfig > api > image > path

  • dbupgradetool > api > virtualFolder (with the exception of the leading slash)

  • ingress > apiPath

  Keyfactor API

dbupgrade tool

app Settings

console

general

cookie Expiration

The cookieExpiration value determines the length of time the authentication cookie for the Keyfactor Command Management Portal browser session is considered valid. After half of the setting's duration, Keyfactor Command will attempt to use a refresh token to update the cookie. If this fails, the user's session will be terminated. The cookie renewal is seamless from the user’s perspective (there is no prompt for credentials).    

dbupgrade tool

app Settings

console

general

session Expiration

The sessionExpiration value determines the length of time a Keyfactor Command browser session in the Management Portal will remain logged in before the user is prompted to re-authenticate regardless of whether the session is idle or in active use.

Note:  For Keyfactor Identity Provider, the cookieExpiration and sessionExpiration values should match those configured for the SSO Session Max and Access Token Lifespan in Keyfactor Identity Provider (see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation). If you’ve opted not to issue refresh tokens in Keyfactor Identity Provider, the cookieExpiration value should match the sessionExpiration value.
   

dbupgrade tool

backoff Limit

The number of attempts the database setup and configuration tool will make to run, if a failure occurs, before terminating.   5

dbupgrade tool

ca Connector

basic Auth

password

The plain text password for the RabbitMQ user (see also dbupgradetool > caConnector > basicAuth > username).

One of the following is required if dbupgradetool > caConnector > jobQueueUseOAuth is false and dbupgradetool > caConnector > configureCAConnector is true:

  • dbupgrade tool > caConnector > basicAuth > password

  • dbupgrade tool > caConnector > basicAuth > password Secret Key

   

dbupgrade tool

ca Connector

basic Auth

password Secret Key

The Kubernetes secret key name given to the secret for the basic authentication RabbitMQ user’s password.

One of the following is required if dbupgradetool > caConnector > jobQueueUseOAuth is false and dbupgradetool > caConnector > configureCAConnector is true:

  • dbupgrade tool > caConnector > basicAuth > password

  • dbupgrade tool > caConnector > basicAuth > password Secret Key

  password

dbupgrade tool

ca Connector

basic Auth

secret Name

The Kubernetes secret name that contains the basic authentication values to authenticate to RabbitMQ.

This parameter is required if dbupgradetool > caConnector > jobQueueUseOAuth is false, dbupgradetool > caConnector > configureCAConnector is true, and plain text values are not provided.

  rabbit- basic- auth

dbupgrade tool

ca Connector

basic Auth

username

The plain text username for the RabbitMQ user (see also dbupgradetool > caConnector > basicAuth > password).

One of the following is required if dbupgradetool > caConnector > jobQueueUseOAuth is false and dbupgradetool > caConnector > configureCAConnector is true:

  • dbupgrade tool > caConnector > basicAuth > username

  • dbupgrade tool > caConnector > basicAuth > username Secret Key

   

dbupgrade tool

ca Connector

basic Auth

username Secret Key

The Kubernetes secret key name given to the secret for the basic authentication RabbitMQ user’s username.

One of the following is required if dbupgradetool > caConnector > jobQueueUseOAuth is false and dbupgradetool > caConnector > configureCAConnector is true:

  • dbupgrade tool > caConnector > basicAuth > username

  • dbupgrade tool > caConnector > basicAuth > username Secret Key

  username

dbupgrade tool

ca Connector

configure CA Connector

Enable the CA connector option (true) or not (false).   true

dbupgrade tool

ca Connector

job Queue Audience

An audience value to be included in token requests delivered to your identity provider.

This is not required when using Keyfactor Identity Provider.

   

dbupgrade tool

ca Connector

job Queue Scope

One or more scopes that should be included in token requests delivered to your identity provider.

This is not required when using Keyfactor Identity Provider.

   

dbupgrade tool

ca Connector

job Queue Token URL

The URL of the token endpoint for your identity provider.

https:// my-keyidp-server .keyexample .com / realms/ Keyfactor/ protocol/ openid- connect/ token  

dbupgrade tool

ca Connector

job Queue Url

The amqp or amqps URL to the RabbitMQ instance. amqps:// appsrvr12. keyexample .com  

dbupgrade tool

ca Connector

job Queue Use OAuth

If set to true, uses OAuth client credentials to authenticate to RabbitMQ. If set to false, uses basic authentication (username/password) to authenticate to RabbitMQ.

Keyfactor strongly recommends that if you choose basic authentication, you connect to RabbitMQ over a secure channel (amqps).

  true

dbupgrade tool

ca Connector

job Queue Validate On Save

Validate the job queue connection and credentials before saving to the database during configuration (true) or not (false).   true

dbupgrade tool

ca Connector

oAuth

client Id

The plain text ID for the RabbitMQ client (see also dbupgradetool > caConnector > oAuth > clientSecret).

One of the following is required if dbupgradetool > caConnector > jobQueueUseOAuth is true and dbupgradetool > caConnector > configureCAConnector is true:

  • dbupgrade tool > caConnector > oAuth > client Id

  • dbupgrade tool > caConnector > oAuth > client Id Secret Key

   

dbupgrade tool

ca Connector

oAuth

client Id Secret Key

The Kubernetes secret key name given to the secret for the OAuth client credential RabbitMQ client’s ID.

One of the following is required if dbupgradetool > caConnector > jobQueueUseOAuth is true and dbupgradetool > caConnector > configureCAConnector is true:

  • dbupgrade tool > caConnector > oAuth > client Id

  • dbupgrade tool > caConnector > oAuth > client Id Secret Key

  client-id

dbupgrade tool

ca Connector

oAuth

client Secret

The plain text secret for the RabbitMQ client (see also dbupgradetool > caConnector > oAuth > clientId).

One of the following is required if dbupgradetool > caConnector > jobQueueUseOAuth is true and dbupgradetool > caConnector > configureCAConnector is true:

  • dbupgrade tool > caConnector > oAuth > client Secret

  • dbupgrade tool > caConnector > oAuth > client Secret Secret Key

   

dbupgrade tool

ca Connector

oAuth

client Secret Secret Key

The Kubernetes secret key name given to the secret for the OAuth client credential RabbitMQ client’s secret.

One of the following is required if dbupgradetool > caConnector > jobQueueUseOAuth is true and dbupgradetool > caConnector > configureCAConnector is true:

  • dbupgrade tool > caConnector > oAuth > client Secret

  • dbupgrade tool > caConnector > oAuth > client Secret Secret Key

  client-secret

dbupgrade tool

ca Connector

oAuth

secret Name

The Kubernetes secret name that contains the OAuth client credential values to authenticate to RabbitMQ.

This parameter is required if dbupgradetool > caConnector > jobQueueUseOAuth is true, dbupgradetool > caConnector > configureCAConnector is true, and plain text values are not provided.

  rabbit-oauth

dbupgrade tool

ca Connector

overwrite

Overwrite any existing CA connector configuration settings (true) or not (false).   false

dbupgrade tool

ca Connector

use SSL

Use SSL for connections to the Keyfactor Command CA Connector API application.   true

dbupgrade tool

ca Connector

virtual Folder

The virtual folder name for the CA Connector API application.

If you opt to change this, these values must match:

  • appConfig > caconnectorapi > image > path

  • dbupgradetool > caConnector > virtualFolder (with the exception of the leading slash)

  • ingress > caConnectorPath

  Keyfactor CA Connectors

dbupgrade tool

dbCommand Timeout

Custom timeout for the database connection during the database setup and configuration process.    

dbupgrade tool

force Secret Reencryption

Rotate the application-level encryption keys and re-encrypt the data identified for application-level encryption in the Keyfactor Command database (true) or not (false).

Application-level encryption is used to encrypt select sensitive data stored in the Keyfactor Command database using a separate encryption methodology on top of standard SQL server encryption. This additional layer of encryption protects the data in cases where the SQL Server master keys cannot be adequately protected.

If you enable application-level encryption, you must configure an encryption methodology (see Application-Level Encryption).

  false

dbupgrade tool

idp

api

client Id

The plain text ID for the service account (client) you have created in one of your identity providers to allow Keyfactor Command to make API requests to itself (see also dbupgradetool > idp > api > clientSecret).

One of the following is required:

  • dbupgrade tool > idp > api > client Id

  • dbupgrade tool > idp > api > client Id Secret Key

   

dbupgrade tool

idp

api

client Id Secret Key

The Kubernetes secret key name given to the ID for the service account (client) created to allow Keyfactor Command to make API requests to itself.

One of the following is required:

  • dbupgrade tool > idp > api > client Id

  • dbupgrade tool > idp > api > client Id Secret Key

  client-id

dbupgrade tool

idp

api

client Secret Secret Key

The Kubernetes secret key name given to the secret for the service account (client) created to allow Keyfactor Command to make API requests to itself.

One of the following is required:

  • dbupgrade tool > idp > api > client Secret

  • dbupgrade tool > idp > api > client Secret Secret Key

  client-secret

dbupgrade tool

idp

api

clientSecret

The plain text secret for the service account (client) you have created in one of your identity providers to allow Keyfactor Command to make API requests to itself (see also dbupgradetool > idp > api > clientId).

One of the following is required:

  • dbupgrade tool > idp > api > client Secret

  • dbupgrade tool > idp > api > client Secret Secret Key

   

dbupgrade tool

idp

api

secret Name

The Kubernetes secret name that contains the credential values for the service account (client) created to allow Keyfactor Command to make API requests to itself.

This parameter is required if plain text values are not provided.

  idp- api- secrets

dbupgrade tool

idp

audience

The audience value for tokens issued from the identity provider.

For Keyfactor Identity Provider, this should be set to the same value as the dbupgrade tool > idp > client Id.

This parameter is required.

Command- OIDC- Client  

dbupgrade tool

idp

auth0 Api Url

The unique identifier defined in Auth0 or a similar identity provider for the API.

This parameter is required if Auth0 is set as the type (see dbupgrade tool > idp > provider Type).

This value is not used for Keyfactor Identity Provider.

   

dbupgrade tool

idp

authentication Scheme

A unique authentication scheme (reference name) for the identity provider in Keyfactor Command. The authentication Scheme should be entered without spaces. This is used in constructing URLs that reference the identity provider from Keyfactor Command.

For Keyfactor Identity Provider, the authentication Scheme you enter here must match the name you used when configuring the redirect URLs for Keyfactor Identity Provider (see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation).

This parameter is required.

Tip:  An identity provider hint can be given in the Keyfactor Command URL to indicate a specific identity provider—referenced by an authentication Scheme—at login. For example:
https://keyfactor. keyexample.com/ KeyfactorPortal/ Login/ Signin? idpHint= Command-OIDC-3

Where keyfactor. keyexample.com is the fully qualified domain name of the Keyfactor Command server, KeyfactorPortal is the virtual directory for the Management Portal on that server, and Command-OIDC-3 is the authentication scheme for the identity provider to use for authentication.

Command- OIDC  

dbupgrade tool

idp

authority

The issuer/authority endpoint URL for the identity provider.

For Keyfactor Identity Provider, this is included among the information that can be found on the OpenID Endpoint Configuration page, a link to which can be found on the Realm Settings page (see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation).

This parameter is required. If the discovery document endpoint (see dbupgrade tool > idp > discovery Document Endpoint) is provided in the values file, the authority will automatically be retrieved and does not need to be provided separately.

Tip:  When you add or update an identity provider, the provider’s discovery document is validated based on this authority URL. The discovery document is also validated periodically in the background. The following are validated:
  • That the discovery document is reachable using the Authority value provided and can be parsed into a valid discovery document.

  • That the Authority URL matches the Issuer returned in the discovery document.

  • That all the URLs on the discovery document are using HTTPS.

  • That the JSONWebKeySetUri value is included on the discovery document.

  • That any endpoint configuration values (Authorization Endpoint, Token Endpoint, UserInfo Endpoint, JSONWebKeySetUri) that have been saved or are being saved match—including case—the values returned in the discovery document. The UserInfo Endpoint is not a required configuration field, but if a value is provided, it must match what’s in the discovery document.

If any of these validation tests fail, any identity provider changes in process will not be saved and an error will be displayed or logged.

https:// my- keyidp- server .keyexample .com /realms /Keyfactor  

dbupgrade tool

idp

authorization Endpoint

The authorization endpoint URL for the identity provider.

For Keyfactor Identity Provider, this is included among the information that can be found on the OpenID Endpoint Configuration page, a link to which can be found on the Realm Settings page (see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation).

This parameter is required. If the discovery document endpoint (see dbupgrade tool > idp > discovery Document Endpoint) is provided in the values file, the authorization Endpoint will automatically be retrieved and does not need to be provided separately.

https:// my- keyidp- server .keyexample.com /realms /Keyfactor /protocol /openid-connect /auth  

dbupgrade tool

idp

client Id

The plain text ID of the client application created in the identity provider for primary application use.

For more information, see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation.

One of the following is required:

  • dbupgrade tool > idp > client Id

  • dbupgrade tool > idp > client Id Secret Key

Command- OIDC- Client  

dbupgrade tool

idp

client Id Secret Key

The Kubernetes secret key name given to the ID of the client application created in the identity provider for primary application use.

One of the following is required:

  • dbupgrade tool > idp > client Id

  • dbupgrade tool > idp > client Id Secret Key

  client-id

dbupgrade tool

idp

client Secret

The plain text secret for the client application created in the identity provider for primary application use.

For Keyfactor Identity Provider, see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation for help locating this.

One of the following is required:

  • dbupgrade tool > idp > client Secret

  • dbupgrade tool > idp > client Secret Secret Key

   

dbupgrade tool

idp

client Secret Secret Key

The Kubernetes secret key name given to the secret for the client application created in the identity provider for primary application use.

One of the following is required:

  • dbupgrade tool > idp > client Secret

  • dbupgrade tool > idp > client Secret Secret Key

  client-secret

dbupgrade tool

idp

discovery Document Endpoint

The discovery URL for the identity provider.

For Keyfactor Identity Provider, this is the link to the OpenID Endpoint Configuration page, which can be found on the Realm Settings page (see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation).

https:// my-keyidp-server .keyexample.com /realms /Keyfactor /.well-known /openid-configuration  

dbupgrade tool

idp

display Name

A display name for the identity provider in Keyfactor Command. The display name may contain spaces.

This parameter is required.

Command OIDC  

dbupgrade tool

idp

fallback Unique Claim Type

A type of user claim for the identity provider containing a backup unique name for the user. This is provided in case the primary referenced name (see dbupgrade tool > idp > unique Claim Type) does not contain a value. Some OAuth providers may provide one type of claim for users/clients of one type and another type of claim for users/clients of another type.

The cid (client ID) user claim type is commonly used by OAuth providers.

This parameter is required.

cid  

dbupgrade tool

idp

json Web Key Set Uri

The JWKS (JSON Web Key Set) URL for the identity provider.

For Keyfactor Identity Provider, this is included among the information that can be found on the OpenID Endpoint Configuration page, a link to which can be found on the Realm Settings page (see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation).

This parameter is required. If the discovery document endpoint (see dbupgrade tool > idp > discovery Document Endpoint) is provided in the values file, the json Web Key Set Uri will automatically be retrieved and does not need to be provided separately.

https:// my-keyidp-server .keyexample.com /realms /Keyfactor /protocol /openid-connect /certs  

dbupgrade tool

idp

name Claim Type

A type of user claim for the identity provider containing a friendly name for the user. Although the value for this field may not necessarily be unique within your identity provider (so might resolve to John Smith and the organization might have two users called John Smith), this can be confusing in Keyfactor Command, since the value is used as the user’s display name in areas such as the requester of a certificate, actors in audit logs, and users referenced in workflow instances. It is best to avoid duplicates.

For Okta, this might be preferred_ names (e.g. john.smith@ keyexample.com) or just name (e.g. John Smith). For Auth0 this might be name (e.g. johnsmith@ keyexample.com).

This parameter is required.

Tip:  The value in this parameter is used as the first choice to populate the username in the Keyfactor Command Management Portal header, if available. This is not the value to use when logging into Keyfactor Command. For that, see dbupgrade tool > idp > unique Claim Type.
preferred_ username  

dbupgrade tool

idp

overwrite

Overwrite existing settings for the named authentication Scheme on run.   false

dbupgrade tool

idp

provider Type

The provider type defined for the identity provider in Keyfactor Command. Supported values are:

  • Generic

  • Auth0

Most identity providers can be supported with the Generic type. For Auth0, use the Auth0 type.

Generic  

dbupgrade tool

idp

role Claim Type

The value used to reference the type of group claim for the identity provider.

This parameter is required.

groups  

dbupgrade tool

idp

scope

One or more scopes that are requested during the OIDC protocol when Keyfactor Command is the relying party. Multiple scopes should be separated by spaces.

This value is not used for Keyfactor Identity Provider.

   

dbupgrade tool

idp

secret Name

The Kubernetes secret name that contains the credential values for the client application created in the identity provider for primary application use.

This parameter is required if plain text values are not provided.

  idp-secrets

dbupgrade tool

idp

sign Out Url

The signout URL for the identity provider.

This parameter is required if Auth0 is set as the dbupgradetool > idp > providerType.

This value is not used for Keyfactor Identity Provider.

   

dbupgrade tool

idp

timeout

The number of seconds a request to the identity provider is allowed to process before timing out with an error.    

dbupgrade tool

idp

token Audience

An audience value to be included in token requests delivered to the identity provider when making a token request where Keyfactor Command is acting as the OAuth client.

This value is not used for Keyfactor Identity Provider.

   

dbupgrade tool

idp

token Endpoint

The token endpoint URL for the identity provider.

For Keyfactor Identity Provider, this is included among the information that can be found on the OpenID Endpoint Configuration page, a link to which can be found on the Realm Settings page (see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation).

This parameter is required. If the discovery document endpoint (see dbupgrade tool > idp > discovery Document Endpoint) is provided in the values file, the tokenEndpoint will automatically be retrieved and does not need to be provided separately.

https:// my-keyidp-server .keyexample.com /realms /Keyfactor /protocol /openid-connect /token  

dbupgrade tool

idp

token Scope

One or more scopes that should be included in token requests delivered to the identity provider when making a token request where Keyfactor Command is acting as the OAuth client. Multiple scopes should be separated by spaces.

This value is not used for Keyfactor Identity Provider.

   

dbupgrade tool

idp

unique Claim Type

A type of user claim for the identity provider containing a unique name for the user.

The sub (subject) user claim type is commonly used by OAuth providers.

In Keyfactor Identity Provider, the sub is a GUID uniquely identifying the user.

See also dbupgradetool > idp > fallbackUniqueClaimType.

This parameter is required.

Tip:  The value in this field is used as the second choice to populate the username in the Keyfactor CommandManagement Portal header if the dbupgradetool > idp > nameClaimType does not contain a value in the token.

The value in this field is the one to use when logging into Keyfactor Command.

sub  

dbupgrade tool

idp

user Info Endpoint

The user info endpoint URL for the identity provider.

For Keyfactor Identity Provider, this is included among the information that can be found on the OpenID Endpoint Configuration page, a link to which can be found on the Realm Settings page (see Configuring Keyfactor Identity Provider and Collecting Data for the Keyfactor Command Installation).

This parameter is required. If the discovery document endpoint (see dbupgrade tool > idp > discovery Document Endpoint) is provided in the values file, the userInfoEndpoint will automatically be retrieved and does not need to be provided separately.

https:// my-keyidp-server .keyexample.com /realms /Keyfactor /protocol /openid-connect /certs  

dbupgrade tool

license

plain text

The plain text Keyfactor Command license. This is provided as the raw XML content of the license file

One of the following is required:

  • dbupgrade tool > license > plaintext

  • dbupgrade tool > license > secretName and dbupgrade tool > license > secretKey

<?xml version="1.0" encoding="utf-8"?><LicenseData> [data removed for display] </LicenseData>  

dbupgrade tool

license

secret Key

The Kubernetes secret key name given to the secret for the Keyfactor Command license.

One of the following is required:

  • dbupgrade tool > license > plaintext

  • dbupgrade tool > license > secretName and dbupgrade tool > license > secretKey

  license- content

dbupgrade tool

license

secret Name

The Kubernetes secret name given to the secret for the Keyfactor Command license.

One of the following is required:

  • dbupgrade tool > license > plaintext

  • dbupgrade tool > license > secretName and dbupgrade tool > license > secretKey

  command- license

dbupgrade tool

logi

use SSL

Use SSL for connections to the Analysis application.   true

dbupgrade tool

logi

virtual Folder

The virtual folder name for the Analysis application.

If you opt to change this, these values must match:

  • dbupgradetool > logi > virtualFolder (with the exception of the leading slash)

  • ingress > analyticsPath

  Keyfactor Analysis

dbupgrade tool

proxy

use SSL

Use SSL for connections to the Claims Proxy application.   true

dbupgrade tool

proxy

virtual Folder

The virtual folder name for the Claims Proxy application.

If you opt to change this, these values must match:

  • appConfig > claimsproxy > image > path

  • dbupgradetool > proxy > virtualFolder (with the exception of the leading slash)

  • ingress > claimsProxyPath

  Keyfactor Proxy

dbupgrade tool

resources

limits

cpu

The maximum CPU the database setup and configuration container may use.

  500m

dbupgrade tool

resources

limits

memory

The maximum memory the database setup and configuration container may use.

  2G

dbupgrade tool

resources

requests

cpu

The baseline amount of CPU allocated for use by the database setup and configuration container.

  50m

dbupgrade tool

resources

requests

memory

The baseline amount of memory allocated for use by the database setup and configuration container.

  300M

dbupgrade tool

web Console

use SSL

Use SSL for connections to the Management Portal application.   true

dbupgrade tool

web Console

virtual Folder

The virtual folder name for the Management Portal application.

If you opt to change this, these values must match:

  • appConfig > portal > image > path

  • dbupgradetool > webConsole > virtualFolder (with the exception of the leading slash)

  • ingress > portalPath

  Keyfactor Portal

hostName

The Keyfactor Command hostname parameter. Set this to a value that resolves in DNS to your Kubernetes server. This is the hostname that will make up part of the URL you will use to reach the Keyfactor Command Management Portal and Keyfactor API. The SSL certificate to secure connections to the server needs to contain this name.

This parameter is required.

“command185 .keyexample .com” your .k8s .cluster .hostname .here

ingress

analytics Path

The inbound URL to the Analysis application.

If you opt to change this, these values must match:

  • dbupgradetool > logi > virtualFolder (with the exception of the leading slash)

  • ingress > analyticsPath

  /Keyfactor Analysis

ingress

api Path

The inbound URL to the Keyfactor API application.

If you opt to change this, these values must match:

  • appConfig > api > image > path

  • dbupgradetool > api > virtualFolder (with the exception of the leading slash)

  • ingress > apiPath

  /Keyfactor API

ingress

ca Connector Path

The inbound URL to the CA Connector API application.

If you opt to change this, these values must match:

  • appConfig > caconnectorapi > image > path

  • dbupgradetool > caConnector > virtualFolder (with the exception of the leading slash)

  • ingress > caConnectorPath

  /Keyfactor CA Connectors

ingress

claims Proxy Path

The inbound URL to the Claims Proxy application.

If you opt to change this, these values must match:

  • appConfig > claimsproxy > image > path

  • dbupgradetool > proxy > virtualFolder (with the exception of the leading slash)

  • ingress > claimsProxyPath

  /Keyfactor Proxy

ingress

class Name

The ingress class name to use.   nginx

ingress

enabled

Creation of the ingress controller is enabled (true) or disabled (false).   true

ingress

orch Api Path

The inbound URL to the Orchestrator API application.

If you opt to change this, these values must match:

  • appConfig > orchestratorapi > image > path

  • dbupgradetool > agents > virtualFolder (with the exception of the leading slash)

  • ingress > orchApiPath

  /Keyfactor Agents

ingress

portal Path

The inbound URL to the Management Portal application.

If you opt to change this, these values must match:

  • appConfig > portal > image > path

  • dbupgradetool > webConsole > virtualFolder (with the exception of the leading slash)

  • ingress > portalPath

  /Keyfactor Portal

ingress

tls Secret Name

The Kubernetes secret name given to the TLS certificate used to secure HTTPS connections to Keyfactor Command.   ingress-tls
init Containers

For more information on this data structure, see:

https://kubernetes.io/docs/concepts/workloads/pods/init-containers/

By default, one init container is included that polls the database to check whether it is online and in an operational state before allowing any deployments to begin.

   

jobConfig

dbupgrade tool

image

name

The name of the image for the database setup and configuration container in the Keyfactor artifactory.   database- upgrade- tool

jobConfig

dbupgrade tool

limits

cpu

The maximum CPU the database setup and configuration container may use.

  500m

jobConfig

dbupgrade tool

limits

memory

The maximum memory the database setup and configuration container may use.

  2G

metadata

annotations

Additional annotations to add to all resources deployed by the helm chart.    

metadata

labels

Additional labels to add to all resources deployed by the helm chart.    

pod Security Context

run As Non Root

The security context to use for all pods in all deployments—run as root (false) or not (true).   true

pod Security Context

run As User

The security context to use for all pods in all deployments—run as the specified user, if runAsNonRoot is true.   1000

service Account

annotations

Additional annotations for a created service account.    

service Account

create

Create a new service account (true) or not (false).

For more information on service accounts, see:

https://kubernetes.io/docs/concepts/security/service-accounts/

  true

service Account

name

The name of an existing service account to use, or the name to give to a service account to be created.

If create is true but the name is not provided, the default name will be used.

   
sidecar Containers

For more information on this data structure, see:

https://kubernetes.io/docs/concepts/workloads/pods/sidecar-containers/

No sidecar containers are included by default. A PKCS#11 container may be utilized as a sidecar container.

   
sql Root Fingerprint The thumbprint for the root CA certificate that issued the certificate used to secure the connection to your SQL server.    
topology Spread Constraints

For more information on this data structure, see:

https://kubernetes.io/docs/concepts/scheduling-eviction/topology-spread-constraints/

No topology spread constraints are included by default.

   

volume Mounts

- name

An array of volume mounts to use on all deployments. This parameter specifies the name of the volume mount. This value should match the value set by volumes > -name.

The example values file (see Helm Chart Customization) includes a volume mount for the config map ca-roots to mount trusted CA certificates.

For more information on this data structure, see:

https://kubernetes.io/docs/concepts/storage/volumes/

root-cas  

volume Mounts

mount Path

The path, and file name for a single file, in the container to which to mount the file or directory. /etc /ssl /certs /ca-certificates .crt  

volume Mounts

sub Path

The file or subdirectory within the container volume to mount to the container. ca-certificates.crt  

volumes

- name

An array of volumes to use on all deployments. This parameter specifies the name of the volume.

The example values file (see Helm Chart Customization) includes a volume mount for the config map ca-roots to mount trusted CA certificates.

root-cas  

volumes

config Map

items

- key

The Kubernetes config map key name given to the reference value in the config map.

ca-certificates.crt  

volumes

config Map

items

path

The name of the mounted file, referenced by the Kubernetes config map, as it will appear in the volume.

In the example values file, the data from the config map key ca-certificates.crt will be written to a file called ca-certificates.crt in the container volume.

ca-certificates.crt  

volumes

config Map

name

The name given to the Kubernetes config map for the volume. ca-roots  

workload Defaults

enabled

Enables or disables resources associated with given workload.   true

workload Defaults

image

name

The name of the image to retrieve from the Keyfactor artifactory.

Important:  Because the Keyfactor Command installation consists of multiple containers supported by multiple images, the name cannot be set at this level. See the parameters for appConfig > [application] > image > name and jobConfig > dbupgradetool > image > name.
   

workload Defaults

image

path

The path in the Keyfactor artifactory from which to retrieve the Keyfactor Command images.   charts/ command

workload Defaults

image

pull Policy

Retrieve a fresh copy of the Keyfactor Command images from the Keyfactor artifactory on start?   Always

workload Defaults

image

pull Secrets

- name

The Kubernetes secret name given to the credentials used to authenticate to the Keyfactor artifactory to retrieve the Keyfactor Command components.

This parameter is required.

image-creds  

workload Defaults

image

repo

The name of the Keyfactor artifactory from which to retrieve the Keyfactor Command images.   repo .keyfactor .com

workload Defaults

image

version

The version of Keyfactor Command to retrieve from the Keyfactor artifactory.   24.4

workload Defaults

labels

Labels that should be applied to deployment/stateful set and pods.    

workload Defaults

log Level

The level of logging output for all containers.

Supported values are:

  • OFF

    No logging

  • FATAL

    Log severe errors that cause early termination

  • ERROR

    Log severe errors and other runtime errors or unexpected conditions that may not cause early termination

  • WARN

    Log errors and use of deprecated APIs, poor use of APIs, almost errors, and other runtime situations that are undesirable or unexpected but not necessarily wrong

  • INFO

    Log all of the above plus runtime events (startup/shutdown)

  • DEBUG

    Log all of the above plus detailed information on the flow through the system

  • TRACE

    Maximum log information—this option can generate VERY large log files

If desired, this may be set on an application container basis using appConfig.

 

INFO

workload Defaults

path

The path to the network service.

This should only have a value if workloadDefaults > service > enabled is true.

   

workload Defaults

replica Count

The number of replicas created for deployment/stateful set.   1

workload Defaults

resources

limits

cpu

The maximum CPU each of the application containers may use.

If desired, this may be set on an application container basis using appConfig.

  250m

workload Defaults

resources

limits

memory

The maximum memory each of the application containers may use.

If desired, this may be set on an application container basis using appConfig.

  1G

workload Defaults

resources

requests

cpu

The baseline amount of CPU allocated for use by each of the application containers.

If desired, this may be set on an application container basis using appConfig.

  50m

workload Defaults

resources

requests

memory

The baseline amount of memory allocated for use by each of the application containers.

If desired, this may be set on an application container basis using appConfig.

  300M

workload Defaults

service

enabled

Enable the network service for each of the application containers (true) or not (false).   true

workload Defaults

service

session Affinity

The setting for session affinity for the network service for each of the application containers.   None

workload Defaults

service

type

The service type to use for the network service for each of the application containers.

For information about the service types, see:

https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services-service-types

  ClusterIP