The following Linux deploy hooks are included:
haproxy-deploy-hook
: Copies certificate to /etc/haproxy/ssl
To download a certificate, copy to HAProxy, and reload the service
./keyvault-certsync download -v cscertificates -n mydomain -p /etc/keyvault --deploy-hook "/etc/keyvault-certsync/haproxy-deploy-hook" --post-hook "systemctl reload haproxy.service"
Be sure to specify crt /etc/haproxy/ssl/
in your /etc/haproxy/haproxy.cfg
frontend bind line.
The following Windows PowerShell deploy hooks are included:
DeployHookNTDS.ps1
: Copies certificate from LocalMachine to the Active Directory Domain Services storeDeployHookADFS.ps1
: Adds private key permission and assigns certificate to Active Directory Federation ServicesDeployHookWAP.ps1
: Assigns certificate to the Web Application ProxyDeployHookIIS.ps1
: Assigns certificate to all IIS bindings having an existing certificate with the same nameDeployHookView.ps1
: Sets certificate friendly name to vdm for VMware Horizon View
To download a certificate and install into the Active Directory service certificate store
.\keyvault-certsync download -v cscertificates -n mydomain -s LocalMachine --deploy-hook "PowerShell.exe -ExecutionPolicy Bypass -File C:\ProgramData\keyvault-certsync\DeployHookNTDS.ps1"
To download a certificate and update all IIS website bindings having the same certificate name
.\keyvault-certsync download -v cscertificates -n mydomain -s LocalMachine --deploy-hook "PowerShell.exe -ExecutionPolicy Bypass -File C:\ProgramData\keyvault-certsync\DeployHookIIS.ps1"
To download a certificate, mark it exportable, and configure for VMware Horizon View
.\keyvault-certsync download -v cscertificates -n mydomain -s LocalMachine --mark-exportable --deploy-hook "PowerShell.exe -ExecutionPolicy Bypass -File C:\ProgramData\keyvault-certsync\DeployHookView.ps1"