Deployment Tasks
Deployment Tasks are a powerful new feature introduced in Certify Certificate Manager v5.x and above. Once you have a certificate issued by a certificate authority you can go ahead and use that certificate for it's intended purpose. This is generally anything that might require a valid verified domain (such as a webserver, mail server, ftp service, remote access etc).
By default the app supports Auto deployment to the local machine certificate store and will auto configure/update https bindings in IIS on the local server.
If you need to perform more custom steps using the certificate, or if you just want to perform certain workflows after the certificate has been renewed (such as a restarting a local or remote service), you can use Deployment Tasks.
Pre-Request Tasks
You may wish to run a custom task before you renew your certificate. For instance, you may wish to to make automated firewall changes or call a custom Web Hook/API. These are called 'Pre-Request Tasks'.
Deployment Tasks
You may want to run any number of tasks after you have renewed your certificate or after it has been automatically deployed. For instance, running scripts, exporting for different server types (Apache, nginx), copying to remote servers etc. These are called 'Deployment Tasks' or Post-Request Tasks.
Task Triggers
You can configure a task to run either when a certificate request was successful or on error, or you can opt to run the task manually.
Manually running a task is useful when you want to avoid restarting a service outside of maintenance hours, or if you wish to run the tasks from the command line, a script or a scheduled task. Example command line arguments are shown in the UI to help with scripting.
Built-in Task Types
Built-in deployment task types, each with UI to configure the task parameters etc, include:
Name | Description |
---|---|
Deploy Certificate to ADFS | Applies the certificate a local Active Directory Federation Services installation |
Deploy to Apache | Export the certificate components in PEM file format for use with the Apache webserver. |
Deploy to Apache Tomcat | Export the certificate as a pkcs12 key store for use with Apache Tomcat application server. |
Deploy to Azure App Service | Note that setting a PFX password (Certificate> Advanced > Signing & Security) is required for this deployment. |
Deploy to Azure Key Vault | Export the certificate to your choice of Azure Key Vault for use with other Azure services or sharing with other systems. Supports service variations such as Azure Cloud, Azure US Government, Azure China etc. |
Deploy to Centralized Certificate Store (CCS) | Copies to a chosen UNC share using the credentials you provide, automatically naming the files as required by IIS for each domain. You then configure the IIS CCS feature to pick up certs from the share. |
Deploy to Doppler | Deploys the chosen certificate components to the Doppler secrets storage service. |
Deploy to Microsoft Exchange | Export the certificate to a local MS Exchange services and apply it to an optional list of services (IMAP, SMTP, IIS, POP etc). |
Deploy to Hashicorp Vault | Export the certificate to your Vault instance, with optional namespaces. |
Deploy to nginx | Export the certificate components in PEM file format for use with the nginx webserver. |
Deploy to RAS (Direct Access, VNP, SSTP VPN etc) | Provides a basic deployment for RAS. You may require your own script for more sophisticated deployments. |
Deploy to RDP Gateway Service | Provides a basic deployment for a local RDP Gateway. You may require your own script for more sophisticated deployments. |
Deploy to RDP Listener Service | Provides a basic deployment for a local RDP Listener (Terminal Services). |
Run a Script | Execute an environment specific script (such as as a windows batch file or a linux bash script). |
Stop, Start or Restart a Service | Select a local service to restart. Usually used in conjunction with another deployment task to cause the new certificate to new applied. |
Set Certificate Key Permissions | Although not usually required, some services may need read permission granted for the certificate private key. This task adds read permission for the nominated account. |
Update Port Binding | Provides a standard way to perform netsh IP:port bindings without custom scripting. |
Run a Powershell script
Execute a custom PowerShell script.
Some example scripts (e.g. for Web Management Service
) are provided under C:\Program Files\CertifyTheWeb\Scripts\Common
. If you use any of these you should copy the script to your own choice of folder outside of Program Files as any app updates will overwrite the files in this Program Files location and any edits you make will be lost.
Passing custom arguments
Note if passing additional arguments to your script these should be in the format arg=value;arg2=value and ;
characters required as parameter values need to be escaped with \
, like key=abc\;123h;othervalue=test
. The \
character can be escaped as \\
e.g. to pass an couple of arguments and the first is path
with value c:\temp\folder
you could use path=c:\temp\folder\\;other=test
Call a custom Webhook
The Webhook task can call a webhook with details of the latest certificate request status. Your custom Body template can use variables, e.g.:
{
"Success": "$Success",
"PrimaryDomain": "$PrimaryDomain",
"SANs": "$SubjectAlternativeNames"
}
For advanced webhook scenarios, a custom script is recommended (see Run a Powershell Script above).
Deploy to Apache, nginx, Generic Server, Certificate Export
Export the certificate to local or remote locations (including SSH/SFTP) as PEM format with Key file and optional chain file.
For a general introduction to certificates and their file types see Certificates.
We currently use the ssh.net library for .net to provide our SSH related features within Tasks. If using an ssh private key file for authentication please ensure the file is in PEM (text) format. Multiple key types are supported but only aes256-cbc key encryption is supported by ssh.net.
Deploy to Certificate Store (Local)
This task is deprecated and is not generally required. This imports the certificate into the local certificate store with your choice of store type (Personal, Web Hosting) and choice of Friendly Name. Note that the default auto deployment system in Certify will already store certificates in the My/Personal certificate store.