You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: README.md
+31-2
Original file line number
Diff line number
Diff line change
@@ -36,9 +36,9 @@ The project also comes with two bash scripts at its root, called `generate-certs
36
36
37
37
### read-certificate-data
38
38
39
-
Reads a certificate that is on disk. Either the path to the certificate on disk is provided with the `--certificate` parameter, or the `--cert-selector` flag is provided to select a certificate within an OS certificate store. Further details about the flag are provided below.
39
+
Reads a certificate. Either the path to the certificate on disk or PKCS#11 URI to identify the certificate is provided with the `--certificate` parameter, or the `--cert-selector` flag is provided to select a certificate within an OS certificate store. Further details about the`--cert-selector` flag are provided below.
40
40
41
-
If there are multiple certificates that match a given `--cert-selector`, information about each of them is printed.
41
+
If there are multiple certificates that match a given `--cert-selector` or PKCS#11 URI (as specified through the `--certificate` parameter), information about each of them is printed. For PKCS#11, URIs for each matched certificate is also printed in the hopes that it will be useful in uniquely identifying a certificate.
42
42
43
43
#### cert-selector flag
44
44
@@ -129,6 +129,35 @@ The above command will import the PFX file into the user's "MY" certificate stor
129
129
130
130
Also note that the above step can be done through a [Powershell cmdlet](https://learn.microsoft.com/en-us/powershell/module/pki/import-pfxcertificate?view=windowsserver2022-ps) or through [Windows CNG/Cryptography APIs](https://learn.microsoft.com/en-us/windows/win32/api/wincrypt/nf-wincrypt-pfximportcertstore).
131
131
132
+
#### PKCS#11 Integration
133
+
134
+
As you should expect from all applications which use keys and certificates, you can simply give a
135
+
[PKCS#11 URI](https://datatracker.ietf.org/doc/html/rfc7512) in place of a filename in order to
136
+
use certificates and/or keys from hardware or software PKCS#11 tokens / HSMs. A hybrid mode
137
+
using a certificate from a file but only the key in PKCS#11 is also supported. Some examples:
For systems or containers which lack p11-kit, a specific PKCS#11
159
+
provider library can be specified using the `--pkcs11-lib` parameter.
160
+
132
161
### update
133
162
134
163
Updates temporary credentials in the [credential file](https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-files.html). Parameters for this command include those for the `credential-process` command, as well as `--profile`, which specifies the named profile for which credentials should be updated (if the profile doesn't already exist, it will be created), and `--once`, which specifies that credentials should be updated only once. Both arguments are optional. If `--profile` isn't specified, the default profile will have its credentials updated, and if `--once` isn't specified, credentials will be continuously updated. In this case, credentials will be updated through a call to `CreateSession` five minutes before the previous set of credentials are set to expire. Please note that running the `update` command multiple times, creating multiple processes, may not work as intended. There may be issues with concurrent writes to the credentials file.
0 commit comments