Sectigo API Dokumentation:
https://sectigo.com/knowledge-base/product/API_Documentation
$-Variablen sind die Platzhalter
Testen ob der User ausreichende Rechte hat:
Abfrage der Organisationen und Departments auf die der zugreifende User Rechte hat:
curl 'https://cert-manager.com/api/organization/v1' -X GET -H 'login: $USER' -H 'customerUri: $URI' -H 'password: $PASSWORD' | jq .
Abfrage der eigenen User Details inklusive USERID:
curl 'https://cert-manager.com/api/admin/v1/' -X GET -H 'login: $USER' -H 'customerUri: $URI' -H 'password: $PASSWORD' | jq .
Abfrage der erweiterten Details des Users mit der Nummer:
curl 'https://cert-manager.com/api/admin/v1/$USERID‘ -X GET -H 'login: $USER' -H 'customerUri: $URI' -H 'password: $PASSWORD' | jq .
Abfrage der erlaubten Domains:
curl 'https://cert-manager.com/api/domain/v1' -X GET -H 'login: $USER' -H 'customerUri: $URI' -H 'password: $PASSWORD' | jq .
Abfrage der erlaubten Zertifikatstypen:
curl 'https://cert-manager.com/api/smime/v1/types' -X GET -H 'login: $USER' -H 'customerUri: $URI' -H 'password: $PASSWORD' | jq .
Testen ob auch die Zertifikatserstellung funktioniert:
Beantragen eines S/MIME-Zertifikates:
curl 'https://cert-manager.com/api/smime/v1/enroll' -X POST -H 'login: $USER' -H 'customerUri: $URI' -H 'Content-Type: application/json;charset=utf-8' -H 'password: $PASSWORD' -d '{"orgId":$ORGID,"firstName":"Max","middleName":"","lastName":"Mustermann","email":"max.mustermann@$DOMAIN","phone":"","secondaryEmails":[],"csr":"-----BEGIN CERTIFICATE REQUEST-----\n....\n-----END CERTIFICATE REQUEST-----","certType":263,"term":365,"customFields":[],"commonName":"Common name"}'
Abholen des Zertifikates:
curl 'https://cert-manager.com/api/smime/v1/collect/<ID_vom_Antrag>' -X GET -H 'login: $USER' -H 'customerUri: $URI' -H 'password: $PASSWORD'