Skip to content

Commit

Permalink
Added missing content about creating the CA
Browse files Browse the repository at this point in the history
  • Loading branch information
tr1ck3r authored Oct 28, 2022
1 parent fb8c8bf commit f0ad0f0
Showing 1 changed file with 6 additions and 0 deletions.
6 changes: 6 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -272,6 +272,12 @@ and enhanced with features for integrating with Trust Protection Platform and Ve
import_roles="venafi-role" venafi_secret="vaas" zone="Business App\\Enterprise CIT"
```
1. The final step is to make your PKI secrets engine a certificate authority by generating a new
key pair and CSR which you will either sign locally (root CA) or have signed by another CA.
See steps 1 and 2 of the
[Building Your Own Certificate Authority](https://developer.hashicorp.com/vault/tutorials/secrets-management/pki-engine)
tutorial by HashiCorp.
## Usage
Venafi Policy limits the PKI role based on Trust Protection Platform policies or Venafi as a
Expand Down

0 comments on commit f0ad0f0

Please sign in to comment.