Create a Sectigo CA template

Creating a CA template is the first step in integrating Sectigo with Code Sign Manager - Self-Hosted.

Prerequisites

You'll need the following to complete this procedure:

  • Administrative access to your CyberArk Configuration Console or the Code Sign Manager - Self-Hosted MMC snap-in.

  • A supported Luna HSM. If your Luna HSM is not connected to Trust Protection Foundation, first go through the steps in Setting up Code Sign Manager - Self-Hosted to use HSM keys.

  • Sectigo code signing credentials (Client ID, Client Secret, and Endpoint URL) from your Sectigo Certificate Manager portal.

    NOTE  The Sectigo credentials required for Code Sign Manager - Self-Hosted are different from those used in Certificate Manager - Self-Hosted.

Create and configure a new Sectigo template object

  1. Open CyberArk Configuration Console or the Code Sign Manager - Self-Hosted MMC snap-in.

  2. From Code Signing > Certificate Authority Templates, click Create, and then select Sectigo Code Sign CA connector.

  3. Specify a name for the new CA template. This name displays when you add a CA template to an Environment Template.

  4. Click Create. The Configure New Connector screen appears.

  5. Add a Description and one or more Contacts for this CA template.

  6. Click the Client ID and Secret drop-down list.

  7. Enter the End Point URL from the Prerequisites section above.

  8. Select whether to enable SAN and allow reissuance.

    Option Description
    SAN Enabled

    Configures the current CA template object to support CSRs with DNS-based Subject Alt Name (SAN) values.

    Allow Reissuance

    Lets you reissue certificates so that you can add SANs to existing certificates without wasting certificate units or incurring unnecessary charges.

Next steps

Your Sectigo CA connector is now ready to be assigned to an Environment Template. Follow the steps to add a certificate template under the "Add a Single Template" heading.

Overall Sectigo configuration roadmap

The following table summarizes all of the steps needed to configure your Sectigo integration with Code Sign Manager - Self-Hosted. For the sake of completeness, it includes creating the CA template, which is documented above.

Overview of steps to complete Sectigo configuration
Step Task Notes
1 Create a CA template
  • See the steps above

2 Assign the CA temple to an Environment Template
  • Sectigo requires a Single Certificate Environment type.

  • Luna HSM supports only RSA and EC keys. When creating the Environment Template, be sure those key types are selected as available key types.

4 Create an Environment that uses the Sectigo Environment Template
  • This Environment can be added to a new Project or to and existing Project.

  • When creating the Environment, follow the steps for a Certificate & Key Environment. Select your new Sectigo template as the Environment Template.

5 Import attestation file
  • The attestation file is required to complete the CSR.

6 Approve certificate request in Sectigo Certificate Manager
  • Once the CSR is submitted to Sectigo, it must be approved in Sectigo Certificate Manager.

  • After approval, the certificate and key will be available to sync to Code Sign Clients