Managing orchestration gateways
Add a keystore
-
Open the Windows command line.
-
Navigate to the orchestration gateway installation directory.
-
(Optional) To list keystores, run the following command.
sectigo-og.exe keystore list -
Run the following command to add a keystore. Replace
<type>with one of the following keystore types:-
jks— for a JKS keystore -
p12— for a PKCS#12 keystoresectigo-og.exe keystore add <type> --name <name> --password <password>
-
-
Navigate to SCM and select your orchestration gateway.
-
Click Sync Modules and you will see a successful synchronization message.
-
Click Keystores and the new keystore should be listed.
-
Navigate to the orchestration gateway installation directory.
cd /opt/sectigo-orchestration-gateway/bin -
(Optional) To list keystores, run the following command.
./sectigo-og keystore list -
Run the following command to add a keystore. Replace
<type>with one of the following keystore types:-
jks— for a JKS keystore -
p12— for a PKCS#12 keystore./sectigo-og keystore add <type> --name <name> --password <password>
-
-
Navigate to SCM and select your orchestration gateway.
-
Click Sync Modules and you will see a successful synchronization message.
-
Click Keystores and the new keystore should be listed.
The keystore file is stored in /opt/sectigo-orchestration-gateway/config/.
-
(Optional) To list keystores and add a keystore, run the following command.
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og keystore list -
Run the following command to add a keystore. Replace
<type>with one of the following keystore types:-
jks— for a JKS keystore -
p12— for a PKCS#12 keystoredocker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og keystore add <type> --name <name> --password <password>
-
-
Navigate to SCM and select your orchestration gateway.
-
Click Sync Modules and you will see a successful synchronization message.
-
Click Keystores and the new keystore should be listed.
Delegate an orchestration gateway
-
Navigate to .
-
Select the orchestration gateway you want to delegate.
-
Click Delegate.
-
In the Delegate Orchestration Gateway dialog, choose one of the following delegation modes:
-
General — Makes the orchestration gateway available to all existing organizations.
-
Customized — Allows you to select the organizations and departments that can use the orchestration gateway.
-
-
If you selected Customized, select the required organizations or departments from the list.
Expand an organization to view and select its child departments, if applicable. -
Click Save.
Configuring credential stores
Sectigo orchestration gateways can be configured to utilize credential stores when connecting to remote endpoints. Using a credential store enables you to securely store and manage credentials for remote endpoints without ever providing the credentials in SCM directly.
Sectigo orchestration gateways support the following credential stores:
Adding credential stores
Once an orchestration gateway has been installed, you can add a connection between the gateway and a credential store.
Add a local credential store
-
In a command prompt window, navigate to the orchestration gateway install directory.
-
Modify the following command to include a name and password for your new local credential store.
sectigo-og.exe credstore add local --name <name> --encryption_password <password> -
Run the modified installation command.
| Once you have added a local credential store, you must add credentials before it can be used. |
-
In a terminal, navigate to the orchestration gateway install location.
-
Modify the following command to include a name and password for your new local credential store.
./sectigo-og credstore add local --name <name> --encryption_password <password> -
Run the modified installation command.
| Once you have added a local credential store, you must add credentials before it can be used. |
-
Modify the following command to include a name and passoword for your new local credential store.
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore add local --name <name> --encryption_password <password> -
Run the modified installation command.
| Once you have added a local credential store, you must add credentials before it can be used. |
Add a HashiCorp Vault credential store
-
In a command prompt window, navigate to the orchestration gateway install location.
-
Modify one of the following commands based on your preferred authentication method.
-
Token authentication:
sectigo-og.exe credstore add hashicorp --name <name> --vault_address <address> --secret_engine_path <path> --vault_auth_type token --token <token>Option Description --nameThe name of your HashiCorp Vault credential store.
--vault_addressThe URL of your HashiCorp Vault.
--secret_engine_pathThe subpath to KVP secrets engine.
--vault_auth_typeThe authentication type to use.
--tokenThe token to authenticate to vault with.
-
AppRoleSecret authentication:
sectigo-og.exe credstore add hashicorp --name <name> --vault_address <address> --secret_engine_path <path> --vault_auth_type app_role_secret --role_secret <role-secret>Option Description --nameThe name of your HashiCorp Vault credential store.
--vault_addressThe URL of your HashiCorp Vault.
--secret_engine_pathThe subpath to KVP secrets engine.
--vault_auth_typeThe authentication type to use.
--role_secretVault Role Secret.
-
AppRoleFile authentication:
sectigo-og.exe credstore add hashicorp --name <name> --vault_address <address> --secret_engine_path <path> --vault_auth_type app_role_file --role_file <role-file-path>Option Description --nameThe name of your HashiCorp Vault credential store.
--vault_addressThe URL of your HashiCorp Vault.
--secret_engine_pathThe subpath to KVP secrets engine.
--vault_auth_typeThe authentication type to use.
--role_fileThe path to a file containing the Secret ID for the HashiCorp Vault AppRole used by the orchestration gateway.
-
-
Run the modified installation command.
To view details for each option, you can use sectigo-og.exe credstore add hashicorp --help.
|
| Once you have added the credential store, you must add endpoints to the orchestration gateway and configure them to use the credential store. For more information, see Add an endpoint. |
-
In a terminal, navigate to the orchestration gateway install location.
-
Modify one of the following commands based on your preferred authentication method.
-
Token authentication:
./sectigo-og credstore add hashicorp --name <name> --vault_address <address> --secret_engine_path <path> --vault_auth_type token --token <token>Option Description --nameThe name of your HashiCorp Vault credential store.
--vault_addressThe URL of your HashiCorp Vault.
--secret_engine_pathThe subpath to KVP secrets engine.
--vault_auth_typeThe authentication type to use.
--role_secretVault Role Secret.
-
AppRoleSecret authentication:
./sectigo-og credstore add hashicorp --name <name> --vault_address <address> --secret_engine_path <path> --vault_auth_type app_role_secret --role_secret <role-secret>Option Description --nameThe name of your HashiCorp Vault credential store.
--vault_addressThe URL of your HashiCorp Vault.
--secret_engine_pathThe subpath to KVP secrets engine.
--vault_auth_typeThe authentication type to use.
--role_secretVault Role Secret.
-
AppRoleFile authentication:
./sectigo-og credstore add hashicorp --name <name> --vault_address <address> --secret_engine_path <path> --vault_auth_type app_role_file --role_file <role-file-path>Option Description --nameThe name of your HashiCorp Vault credential store.
--vault_addressThe URL of your HashiCorp Vault.
--secret_engine_pathThe subpath to KVP secrets engine.
--vault_auth_typeThe authentication type to use.
--role_filePath to Vault Role Secret file.
-
-
Run the modified installation command.
To view details for each option, you can use ./sectigo-og credstore add hashicorp --help.
|
| Once you have added the credential store, you must add endpoints to the orchestration gateway and configure them to use the credential store. For more information, see Add an endpoint. |
-
Modify one of the following commands based on your preferred authentication method.
-
Token authentication:
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore add hashicorp --name <name> --vault_address <address> --secret_engine_path <path> --vault_auth_type token --token <token>Option Description --nameThe name of your HashiCorp Vault credential store.
--vault_addressThe URL of your HashiCorp Vault.
--secret_engine_pathSub path to KVP secrets engine.
--vault_auth_typeThe authentication type to use.
--role_secretVault Role Secret.
-
AppRoleSecret authentication:
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore add hashicorp --name <name> --vault_address <address> --secret_engine_path <path> --vault_auth_type app_role_secret --role_secret <role-secret>Option Description --nameThe name of your HashiCorp Vault credential store.
--vault_addressThe URL of your HashiCorp Vault.
--secret_engine_pathSub path to KVP secrets engine.
--vault_auth_typeThe authentication type to use.
--role_secretVault Role Secret.
-
AppRoleFile authentication:
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore add hashicorp --name <name> --vault_address <address> --secret_engine_path <path> --vault_auth_type app_role_file --role_file <role-file-path>Option Description --nameThe name of your HashiCorp Vault credential store.
--vault_addressThe URL of your HashiCorp Vault.
--secret_engine_pathSub path to KVP secrets engine.
--vault_auth_typeThe authentication type to use.
--role_filePath to Vault Role Secret file.
-
-
Run the modified installation command.
To view details for each option, you can use docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore add hashicorp --help.
|
| Once you have added the credential store, you must add endpoints to the orchestration gateway and configure them to use the credential store. For more information, see Add an endpoint. |
Add a CyberArk Vault credential store
-
In a command prompt window, navigate to the orchestration gateway install location.
-
Modify one of the following commands based on your preferred authentication method.
sectigo-og.exe credstore add cyberark --name <name> --ccp_url <url> --app_id <app-id> --p12_file <file-path>Option Description --nameThe name of the credential storage provider.
--app_idCyberArk App ID.
--ccp_urlCyberArk CCP URL.
--p12_filePath to a p12 file with client auth certificate and key.
-
Run the modified installation command.
To view details for each option, you can use sectigo-og.exe credstore add cyberark --help.
|
| Once you have added the credential store, you must add endpoints to the orchestration gateway and configure them to use the credential store. For more information, see Add an endpoint. |
-
In a terminal, navigate to the orchestration gateway install location.
-
Modify one of the following commands based on your preferred authentication method.
./sectigo-og credstore add cyberark --name <name> --ccp_url <url> --app_id <app-id> --p12_file <file-path>Option Description --nameThe name of the credential storage provider.
--app_idCyberArk App ID.
--ccp_urlCyberArk CCP URL.
--p12_filePath to a p12 file with client auth certificate and key.
-
Run the modified installation command.
To view details for each option, you can use sectigo-og.exe credstore add cyberark --help.
|
| Once you have added the credential store, you must add endpoints to the orchestration gateway and configure them to use the credential store. For more information, see Add an endpoint. |
-
Modify one of the following commands based on your preferred authentication method.
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore add cyberark --name <name> --ccp_url <url> --app_id <app-id> --p12_file <file-path>Option Description --nameThe name of the credential storage provider.
--app_idCyberArk App ID.
--ccp_urlCyberArk CCP URL.
--p12_filePath to a p12 file with client auth certificate and key.
-
Run the modified installation command.
To view details for each option, you can use docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore add cyberark --help.
|
| Once you have added the credential store, you must add endpoints to the orchestration gateway and configure them to use the credential store. For more information, see Add an endpoint. |
Add a Delinea Secret Server credential store
-
In a command prompt window, navigate to the orchestration gateway install location.
-
Modify the add command as needed.
sectigo-og.exe credstore add delinea --username <username> --domain <domain> --password <password> --server_url <server-url>Option Description --usernameThe username for the user account used by the orchestration gateway to authenticate to the Secret Server.
--domainThe domain associated with the user account.
--passwordThe password for the user account used by the orchestration gateway to authenticate to the Secret Server.
--server_urlThe URL of the Delinea Secret Server. Either this parameter or
--api_tenantis required.--api_tenantThe Delinea API tenant identifier. Either this parameter or
--server_urlis required. -
Run the modified installation command.
To view details for each option, you can use sectigo-og.exe credstore add delinea --help.
|
| Once you have added the credential store, you must add endpoints to the orchestration gateway and configure them to use the credential store. For more information, see Add an endpoint. |
-
In a terminal, navigate to the orchestration gateway install location.
-
Modify the add command as needed.
./sectigo-og credstore add delinea --username <username> --domain <domain> --password <password> --server_url <server-url>Option Description --usernameThe username for the user account used by the orchestration gateway to authenticate to the Secret Server.
--domainThe domain associated with the user account.
--passwordThe password for the user account used by the orchestration gateway to authenticate to the Secret Server.
--server_urlThe URL of the Delinea Secret Server. Either this parameter or
--api_tenantis required.--api_tenantThe Delinea API tenant identifier. Either this parameter or
--server_urlis required. -
Run the modified installation command.
To view details for each option, you can use ./sectigo-og credstore add delinea --help.
|
| Once you have added the credential store, you must add endpoints to the orchestration gateway and configure them to use the credential store. For more information, see Add an endpoint. |
-
Modify the add command as needed.
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore add delinea --username <username> --domain <domain> --password <password> --server_url <server-url>Option Description --usernameThe username for the user account used by the orchestration gateway to authenticate to the Secret Server.
--domainThe domain associated with the user account.
--passwordThe password for the user account used by the orchestration gateway to authenticate to the Secret Server.
--server_urlThe URL of the Delinea Secret Server. Either this parameter or
--api_tenantis required.--api_tenantThe Delinea API tenant identifier. Either this parameter or
--server_urlis required. -
Run the modified installation command.
To view details for each option, you can use docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore add delinea --help.
|
| Once you have added the credential store, you must add endpoints to the orchestration gateway and configure them to use the credential store. For more information, see Add an endpoint. |
Viewing credential stores and credentials
View credential stores
-
In a command prompt window, navigate to the orchestration gateway install location.
-
View all credential stores associated with the orchestration gateway.
sectigo-og.exe credstore list
-
In a terminal, navigate to the orchestration gateway install location.
-
View all credential stores associated with the orchestration gateway.
./sectigo-og credstore list
-
View all credential stores associated with the orchestration gateway.
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore list
View credentials
-
In a terminal, navigate to the orchestration gateway install location.
-
View credentials in a specific credential store.
sectigo-og.exe credstore get --id <credential-store-id>
-
In a terminal, navigate to the orchestration gateway install location.
-
View credentials in a specific credential store.
./sectigo-og credstore get --id <credential-store-id>
-
View credentials in a specific credential store.
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore get --id <credential-store-id>
Remove a credential store
-
In SCM, verify that the credential store you want to remove is not in use by an added endpoint.
-
In a command prompt window, navigate to the orchestration gateway install location.
-
Modify the following command to include the mandatory
--storenameof the credential store you want to remove.sectigo-og.exe credstore remove --id <credential-store-id> -
Run the modified command.
-
In SCM, verify that the credential store you want to remove is not in use by an added endpoint.
-
In a terminal, navigate to the orchestration gateway install location.
-
Modify the following command to include the mandatory
--idof the credential store you want to remove../sectigo-og credstore remove --id <credential-store-id> -
Run the modified command.
-
In SCM, verify that the credential store you want to remove is not in use by an added endpoint.
-
Modify the following command to include the mandatory
--idof the credential store you want to remove.docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og credstore remove --id <credential-store-id> -
Run the modified command.
Update proxy server details
The following proxy authentication schemes are supported:
-
Digest
-
NTLM (requires a domain to be provided)
-
Basic
To update the proxy server information for your existing orchestration gateway, do the following:
-
In a command prompt, navigate to the orchestration gateway install location.
-
(Optional) View the current orchestration gateway configuration.
sectigo-og.exe proxy get -
Update the orchestration gateway proxy configuration.
Action Command Clear proxy settings
sectigo-og.exe proxy resetSet proxy schema
The valid schema options are:
-
http: Plain HTTP proxy -
socks5: SOCKS5 proxy (no TLS) -
spnego: HTTP Negotiate (Kerberos) with fallback to NTLM
The command is:
sectigo-og proxy set --schema <schema>Set proxy host and port without access credentials
sectigo-og.exe proxy set --url <url:port>Set proxy host and port with access credentials
sectigo-og.exe proxy set --url <url:port> --user <username> --password <password>User can set the proxy schema and URL with username and password at the same time using the combination of command sectigo-og.exe proxy set --schema <schema> --url <url:port> --user <username> --password <password>. -
-
Restart the orchestration gateway service.
sc stop SectigoOGsc start SectigoOG -
Confirm the updated orchestration gateway configuration.
sectigo-og.exe proxy get
To update the proxy server information for your existing orchestration gateway, do the following:
-
In a terminal, navigate to the orchestration gateway install location.
-
(Optional) View the current orchestration gateway configuration.
./sectigo-og proxy get -
Update the orchestration gateway configuration.
Action Command Clear proxy settings
./sectigo-og proxy resetSet proxy schema
The valid schema options are:
-
http: Plain HTTP proxy -
socks5: SOCKS5 proxy (no TLS) -
spnego: HTTP Negotiate (Kerberos) with fallback to NTLM
The command is:
./sectigo-og proxy set --schema <schema>Set proxy host and port without access credentials
./sectigo-og proxy set --url <url:port>Set proxy host and port with access credentials
./sectigo-og proxy set --url <url:port> --user <username> --password <password>User can set the proxy schema and url with username and password at the same time using the combination of command ./sectigo-og proxy set --schema <schema> --url <url:port> --user <username> --password <password>. -
-
Restart the orchestration gateway service.
sudo systemctl restart sectigo-orchestration-gateway -
Confirm the updated orchestration gateway configuration.
./sectigo-og proxy get
To update the proxy server information for your existing orchestration gateway, do the following:
-
(Optional) View the current orchestration gateway configuration.
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og proxy get -
Update the orchestration gateway configuration.
Action Command Clear proxy settings
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og proxy resetSet proxy schema
The valid schema options are:
-
http: Plain HTTP proxy -
socks5: SOCKS5 proxy (no TLS) -
spnego: HTTP Negotiate (Kerberos) with fallback to NTLM
The command is:
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og proxy set --schema <schema>Set proxy host and port without access credentials
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og proxy set --url <url:port>Set proxy host and port with access credentials
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og proxy set --url <url:port> --user <username> --password <password>User can set the proxy schema and url with username and password at the same time using the combination of command docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og proxy set --schema <schema> --url <url:port> --user <username> --password <password>. -
-
Restart the docker container.
docker exec service sectigo-orchestration-gateway restart -
Confirm the updated orchestration gateway configuration.
docker exec <container> /opt/sectigo-orchestration-gateway/bin/sectigo-og proxy get
Add a trusted CA certificate
| To download a CA certificate, see Download a CA certificate. |
-
Run Manage Computer Certificates.
In the Windows search bar, search for Manage Computer Certificates. -
In the left-hand list, select Trusted Root Certification Authorities.
-
Right-click Certificates and select .
In the Certificate Import Wizard, ensure Store Location is set to Local Machine. -
Click Next.
-
Click Browse and add your certificate file.
-
Click Next, Next, Finish.
-
Repeat the above steps to add the certificate to Intermediate Certification Authorities.
-
Navigate to the orchestration gateway installation directory.
-
Add your CA certificate to the trusted CA list.
./sectigo-og truststore add --path <your-path-of-ca-cert>
Uninstall an orchestration gateway
-
Navigate to .
-
Search for Sectigo Orchestration Gateway.
-
Select the Sectigo Orchestration Gateway and click Uninstall.
-
(Optional) Delete the files and logs associated with the orchestration gateway.
-
Navigate to
C:\ProgramData\Sectigo. -
Delete the
Sectigo Orchestration Gatewayfolder.This action cannot be undone. Only delete this folder if you want to completely remove all files and logs related to the orchestration gateway.
-
-
In SCM, navigate to .
-
Select the gateway you want to delete.
-
Click the Delete icon.
-
Click Delete to confirm deletion.
-
Remove the orchestration gateway.
sudo apt remove sectigo-orchestration-gateway -
(Optional) Delete the files and logs associated with the orchestration gateway.
-
Navigate to the
/var/optdirectory. -
Delete the
sectigo-orchestration-gatewaydirectory.This action cannot be undone. Delete this directory if you want to completely remove all files and logs related to the orchestration gateway.
-
-
In SCM, navigate to .
-
Select the orchestration gateway you want to delete.
-
Click Delete.
-
Click Delete to confirm deletion.
-
Remove the orchestration gateway.
sudo dnf remove sectigo-orchestration-gateway -
(Optional) Delete the files and logs associated with the orchestration gateway.
-
Navigate to the
/var/optdirectory. -
Delete the
sectigo-orchestration-gatewaydirectory.This action cannot be undone. Delete this directory if you want to completely remove all files and logs related to the orchestration gateway.
-
-
In SCM, navigate to .
-
Select the orchestration gateway you want to delete.
-
Click Delete.
-
Click Delete to confirm deletion.
Orchestration gateway service commands
| Command | Description |
|---|---|
Start |
Start an orchestration gateway:
|
Stop |
Stop an orchestration gateway:
|
Query |
Query the status of an orchestration gateway:
|
| Command | Description |
|---|---|
Start |
Start an orchestration gateway:
|
Stop |
Stop an orchestration gateway:
|
Restart |
Restart an orchestration gateway:
|
Status |
Query the status of an orchestration gateway:
|