Static
createThe Client Certificate Authority object's attributes. *
Optional
opaqueAccept opaque attributes in the request or return opaque attributes in the response, encrypted with the specified password. See the documentation for the opaquePassword
parameter. *
Optional
select?: string[]Include in the response only selected attributes of the object, or exclude from the response selected attributes of the object. See the documentation for the select
parameter. *
Optional
xOptional context id the request is running. *
Static
createCreate an OCSP Responder Trusted Common Name object. Create an OCSP Responder Trusted Common Name object. Any attribute missing from the request will be set to its default value. The creation of instances of this object are synchronized to HA mates via config-sync.
When an OCSP override URL is configured, the OCSP responder will be required to sign the OCSP responses with certificates issued to these Trusted Common Names. A maximum of 8 common names can be configured as valid response signers.
Attribute | Identifying | Required | Read-Only | Write-Only | Deprecated | Opaque |
---|---|---|---|---|---|---|
certAuthorityName | x | x | ||||
ocspTlsTrustedCommonName | x | x |
A SEMP client authorized with a minimum access scope/level of "global/admin" is required to perform this operation.
This has been available since 2.19.
ClientCertAuthorityOcspTlsTrustedCommonNameResponse The OCSP Responder Trusted Common Name object's attributes after being created, and the request metadata.
SempMetaOnlyResponse The error response.
ApiError
The OCSP Responder Trusted Common Name object's attributes. *
The name of the Certificate Authority. *
Optional
opaqueAccept opaque attributes in the request or return opaque attributes in the response, encrypted with the specified password. See the documentation for the opaquePassword
parameter. *
Optional
select?: string[]Include in the response only selected attributes of the object, or exclude from the response selected attributes of the object. See the documentation for the select
parameter. *
Optional
xOptional context id the request is running. *
Static
deleteDelete a Client Certificate Authority object. Delete a Client Certificate Authority object. The deletion of instances of this object are synchronized to HA mates via config-sync.
Clients can authenticate with the message broker over TLS by presenting a valid client certificate. The message broker authenticates the client certificate by constructing a full certificate chain (from the client certificate to intermediate CAs to a configured root CA). The intermediate CAs in this chain can be provided by the client, or configured in the message broker. The root CA must be configured on the message broker.
A SEMP client authorized with a minimum access scope/level of "global/admin" is required to perform this operation.
This has been available since 2.19.
SempMetaOnlyResponse The request metadata.
ApiError
The name of the Certificate Authority. *
Optional
xOptional context id the request is running. *
Static
deleteDelete an OCSP Responder Trusted Common Name object. Delete an OCSP Responder Trusted Common Name object. The deletion of instances of this object are synchronized to HA mates via config-sync.
When an OCSP override URL is configured, the OCSP responder will be required to sign the OCSP responses with certificates issued to these Trusted Common Names. A maximum of 8 common names can be configured as valid response signers.
A SEMP client authorized with a minimum access scope/level of "global/admin" is required to perform this operation.
This has been available since 2.19.
SempMetaOnlyResponse The request metadata.
ApiError
The name of the Certificate Authority. *
The expected Trusted Common Name of the OCSP responder remote certificate. *
Optional
xOptional context id the request is running. *
Static
getGet a list of Client Certificate Authority objects. Get a list of Client Certificate Authority objects.
Clients can authenticate with the message broker over TLS by presenting a valid client certificate. The message broker authenticates the client certificate by constructing a full certificate chain (from the client certificate to intermediate CAs to a configured root CA). The intermediate CAs in this chain can be provided by the client, or configured in the message broker. The root CA must be configured on the message broker.
Attribute | Identifying | Write-Only | Deprecated | Opaque |
---|---|---|---|---|
certAuthorityName | x |
A SEMP client authorized with a minimum access scope/level of "global/read-only" is required to perform this operation.
This has been available since 2.19.
ClientCertAuthoritiesResponse The list of Client Certificate Authority objects' attributes, and the request metadata.
SempMetaOnlyResponse The error response.
ApiError
Optional
count?: numberLimit the count of objects in the response. See the documentation for the count
parameter. *
Optional
cursor?: stringThe cursor, or position, for the next page of objects. See the documentation for the cursor
parameter. *
Optional
opaqueAccept opaque attributes in the request or return opaque attributes in the response, encrypted with the specified password. See the documentation for the opaquePassword
parameter. *
Optional
select?: string[]Include in the response only selected attributes of the object, or exclude from the response selected attributes of the object. See the documentation for the select
parameter. *
Optional
where?: string[]Include in the response only objects where certain conditions are true. See the the documentation for the where
parameter. *
Optional
xOptional context id the request is running. *
Static
getGet a Client Certificate Authority object. Get a Client Certificate Authority object.
Clients can authenticate with the message broker over TLS by presenting a valid client certificate. The message broker authenticates the client certificate by constructing a full certificate chain (from the client certificate to intermediate CAs to a configured root CA). The intermediate CAs in this chain can be provided by the client, or configured in the message broker. The root CA must be configured on the message broker.
Attribute | Identifying | Write-Only | Deprecated | Opaque |
---|---|---|---|---|
certAuthorityName | x |
A SEMP client authorized with a minimum access scope/level of "global/read-only" is required to perform this operation.
This has been available since 2.19.
ClientCertAuthorityResponse The Client Certificate Authority object's attributes, and the request metadata.
SempMetaOnlyResponse The error response.
ApiError
The name of the Certificate Authority. *
Optional
opaqueAccept opaque attributes in the request or return opaque attributes in the response, encrypted with the specified password. See the documentation for the opaquePassword
parameter. *
Optional
select?: string[]Include in the response only selected attributes of the object, or exclude from the response selected attributes of the object. See the documentation for the select
parameter. *
Optional
xOptional context id the request is running. *
Static
getGet an OCSP Responder Trusted Common Name object. Get an OCSP Responder Trusted Common Name object.
When an OCSP override URL is configured, the OCSP responder will be required to sign the OCSP responses with certificates issued to these Trusted Common Names. A maximum of 8 common names can be configured as valid response signers.
Attribute | Identifying | Write-Only | Deprecated | Opaque |
---|---|---|---|---|
certAuthorityName | x | |||
ocspTlsTrustedCommonName | x |
A SEMP client authorized with a minimum access scope/level of "global/read-only" is required to perform this operation.
This has been available since 2.19.
ClientCertAuthorityOcspTlsTrustedCommonNameResponse The OCSP Responder Trusted Common Name object's attributes, and the request metadata.
SempMetaOnlyResponse The error response.
ApiError
The name of the Certificate Authority. *
The expected Trusted Common Name of the OCSP responder remote certificate. *
Optional
opaqueAccept opaque attributes in the request or return opaque attributes in the response, encrypted with the specified password. See the documentation for the opaquePassword
parameter. *
Optional
select?: string[]Include in the response only selected attributes of the object, or exclude from the response selected attributes of the object. See the documentation for the select
parameter. *
Optional
xOptional context id the request is running. *
Static
getGet a list of OCSP Responder Trusted Common Name objects. Get a list of OCSP Responder Trusted Common Name objects.
When an OCSP override URL is configured, the OCSP responder will be required to sign the OCSP responses with certificates issued to these Trusted Common Names. A maximum of 8 common names can be configured as valid response signers.
Attribute | Identifying | Write-Only | Deprecated | Opaque |
---|---|---|---|---|
certAuthorityName | x | |||
ocspTlsTrustedCommonName | x |
A SEMP client authorized with a minimum access scope/level of "global/read-only" is required to perform this operation.
This has been available since 2.19.
ClientCertAuthorityOcspTlsTrustedCommonNamesResponse The list of OCSP Responder Trusted Common Name objects' attributes, and the request metadata.
SempMetaOnlyResponse The error response.
ApiError
The name of the Certificate Authority. *
Optional
opaqueAccept opaque attributes in the request or return opaque attributes in the response, encrypted with the specified password. See the documentation for the opaquePassword
parameter. *
Optional
select?: string[]Include in the response only selected attributes of the object, or exclude from the response selected attributes of the object. See the documentation for the select
parameter. *
Optional
where?: string[]Include in the response only objects where certain conditions are true. See the the documentation for the where
parameter. *
Optional
xOptional context id the request is running. *
Static
replaceReplace a Client Certificate Authority object. Replace a Client Certificate Authority object. Any attribute missing from the request will be set to its default value, subject to the exceptions in note 4.
Clients can authenticate with the message broker over TLS by presenting a valid client certificate. The message broker authenticates the client certificate by constructing a full certificate chain (from the client certificate to intermediate CAs to a configured root CA). The intermediate CAs in this chain can be provided by the client, or configured in the message broker. The root CA must be configured on the message broker.
Attribute | Identifying | Const | Read-Only | Write-Only | Requires-Disable | Deprecated | Opaque |
---|---|---|---|---|---|---|---|
certAuthorityName | x | x | |||||
crlUrl | x |
The following attributes in the request may only be provided in certain combinations with other attributes:
Class | Attribute | Requires | Conflicts |
---|---|---|---|
ClientCertAuthority | crlDayList | crlTimeList | |
ClientCertAuthority | crlTimeList | crlDayList |
A SEMP client authorized with a minimum access scope/level of "global/admin" is required to perform this operation.
This has been available since 2.19.
ClientCertAuthorityResponse The Client Certificate Authority object's attributes after being replaced, and the request metadata.
SempMetaOnlyResponse The error response.
ApiError
The Client Certificate Authority object's attributes. *
The name of the Certificate Authority. *
Optional
opaqueAccept opaque attributes in the request or return opaque attributes in the response, encrypted with the specified password. See the documentation for the opaquePassword
parameter. *
Optional
select?: string[]Include in the response only selected attributes of the object, or exclude from the response selected attributes of the object. See the documentation for the select
parameter. *
Optional
xOptional context id the request is running. *
Static
updateUpdate a Client Certificate Authority object. Update a Client Certificate Authority object. Any attribute missing from the request will be left unchanged.
Clients can authenticate with the message broker over TLS by presenting a valid client certificate. The message broker authenticates the client certificate by constructing a full certificate chain (from the client certificate to intermediate CAs to a configured root CA). The intermediate CAs in this chain can be provided by the client, or configured in the message broker. The root CA must be configured on the message broker.
Attribute | Identifying | Read-Only | Write-Only | Requires-Disable | Deprecated | Opaque |
---|---|---|---|---|---|---|
certAuthorityName | x | x | ||||
crlUrl | x |
The following attributes in the request may only be provided in certain combinations with other attributes:
Class | Attribute | Requires | Conflicts |
---|---|---|---|
ClientCertAuthority | crlDayList | crlTimeList | |
ClientCertAuthority | crlTimeList | crlDayList |
A SEMP client authorized with a minimum access scope/level of "global/admin" is required to perform this operation.
This has been available since 2.19.
ClientCertAuthorityResponse The Client Certificate Authority object's attributes after being updated, and the request metadata.
SempMetaOnlyResponse The error response.
ApiError
The Client Certificate Authority object's attributes. *
The name of the Certificate Authority. *
Optional
opaqueAccept opaque attributes in the request or return opaque attributes in the response, encrypted with the specified password. See the documentation for the opaquePassword
parameter. *
Optional
select?: string[]Include in the response only selected attributes of the object, or exclude from the response selected attributes of the object. See the documentation for the select
parameter. *
Optional
xOptional context id the request is running. *
Create a Client Certificate Authority object. Create a Client Certificate Authority object. Any attribute missing from the request will be set to its default value. The creation of instances of this object are synchronized to HA mates via config-sync.
Clients can authenticate with the message broker over TLS by presenting a valid client certificate. The message broker authenticates the client certificate by constructing a full certificate chain (from the client certificate to intermediate CAs to a configured root CA). The intermediate CAs in this chain can be provided by the client, or configured in the message broker. The root CA must be configured on the message broker.
The following attributes in the request may only be provided in certain combinations with other attributes:
A SEMP client authorized with a minimum access scope/level of "global/admin" is required to perform this operation.
This has been available since 2.19.
Returns
ClientCertAuthorityResponse The Client Certificate Authority object's attributes after being created, and the request metadata.
Returns
SempMetaOnlyResponse The error response.
Throws
ApiError