Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
6bf7542
chore(docs): Translate doc structure for compatibility with doctool a…
m8rmclaren Jul 3, 2024
8dfdfd9
chore(manifest): Re-create description fields in manifest to use Noun…
m8rmclaren Jul 3, 2024
7ad65e3
dual build and doc updates
bhillkeyfactor Oct 27, 2025
c4d6fa5
Update generated docs
Oct 27, 2025
23e576c
Update keyfactor-release-workflow.yml
bhillkeyfactor Oct 27, 2025
3115e05
Update integration-manifest.json
bhillkeyfactor Oct 27, 2025
9048773
Update generated docs
Oct 27, 2025
5d84b7b
Update integration-manifest.json
bhillkeyfactor Oct 27, 2025
e8db52e
Update kemp.md
bhillkeyfactor Oct 27, 2025
ec02542
Update generated docs
Oct 27, 2025
a289e88
Update kemp.md
bhillkeyfactor Oct 27, 2025
0db8783
Update generated docs
Oct 27, 2025
64f6f56
Delete docsource/kemp.md
bhillkeyfactor Oct 27, 2025
3cb7c6d
Update content.md
bhillkeyfactor Oct 27, 2025
8a4e1b6
Update generated docs
Oct 27, 2025
1d9d150
Update content.md
bhillkeyfactor Oct 27, 2025
3d4b309
Update generated docs
Oct 27, 2025
7514e2f
Update content.md
bhillkeyfactor Oct 27, 2025
89f30c0
Update generated docs
Oct 27, 2025
f07a6ce
Update README.md
bhillkeyfactor Oct 27, 2025
cd2f45a
Update generated docs
Oct 27, 2025
c6abc88
Update content.md
bhillkeyfactor Oct 27, 2025
6e37482
Update generated docs
Oct 27, 2025
a3c838d
Create CHANGELOG.md
bhillkeyfactor Oct 27, 2025
aad1ffd
Update CHANGELOG.md
bhillkeyfactor Oct 27, 2025
76e8734
Update kemp.md
bhillkeyfactor Oct 30, 2025
830a5ac
Update kemp.md
bhillkeyfactor Oct 30, 2025
d9ef33e
Update generated docs
Oct 30, 2025
f856eda
Delete docsource/kemp.md
bhillkeyfactor Nov 11, 2025
147c68f
Update integration-manifest.json
bhillkeyfactor Nov 11, 2025
62719fa
Update generated docs
Nov 11, 2025
dbce865
Update content.md
bhillkeyfactor Nov 11, 2025
93aa0ce
Update kemp.md
bhillkeyfactor Nov 11, 2025
961d7a6
Delete docsource/content.md
bhillkeyfactor Nov 11, 2025
ccb7ba2
Update generated docs
Nov 11, 2025
8e1c128
Update kemp.md
bhillkeyfactor Nov 11, 2025
ec70a29
Update content.md
bhillkeyfactor Nov 11, 2025
66537ca
Update generated docs
Nov 11, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 20 additions & 0 deletions .github/workflows/keyfactor-release-workflow.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
name: Keyfactor Bootstrap Workflow

on:
workflow_dispatch:
pull_request:
types: [opened, closed, synchronize, edited, reopened]
push:
create:
branches:
- 'release-*.*'

jobs:
call-starter-workflow:
uses: keyfactor/actions/.github/workflows/starter.yml@v3
secrets:
token: ${{ secrets.V2BUILDTOKEN}}
APPROVE_README_PUSH: ${{ secrets.APPROVE_README_PUSH}}
gpg_key: ${{ secrets.KF_GPG_PRIVATE_KEY }}
gpg_pass: ${{ secrets.KF_GPG_PASSPHRASE }}
scan_token: ${{ secrets.SAST_TOKEN }}
39 changes: 0 additions & 39 deletions .github/workflows/keyfactor-starter-workflow.yml

This file was deleted.

5 changes: 5 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
# v2.0.0
- .Net 6 and .Net 8 Support and Documentation Updates
# v1.0.0
- Initial extension release

4 changes: 2 additions & 2 deletions Kemp.sln
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@

Microsoft Visual Studio Solution File, Format Version 12.00
# Visual Studio Version 16
VisualStudioVersion = 16.0.30717.126
# Visual Studio Version 17
VisualStudioVersion = 17.11.35222.181
MinimumVisualStudioVersion = 10.0.40219.1
Project("{9A19103F-16F7-4668-BE54-9A1E7A4F7556}") = "Kemp", "Kemp\Kemp.csproj", "{33FBC5A1-3466-4F10-B9A6-7186F804A65A}"
EndProject
Expand Down
7 changes: 4 additions & 3 deletions Kemp/Kemp.csproj
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
<Project Sdk="Microsoft.NET.Sdk">

<PropertyGroup>
<TargetFramework>netcoreapp3.1</TargetFramework>
<RootNamespace>Keyfactor.Extensions.Orchestrator.Kemp</RootNamespace>
<AppendTargetFrameworkToOutputPath>true</AppendTargetFrameworkToOutputPath>
<TargetFrameworks>net6.0;net8.0</TargetFrameworks>
<CopyLocalLockFileAssemblies>true</CopyLocalLockFileAssemblies>
<ImplicitUsings>disable</ImplicitUsings>
</PropertyGroup>

<PropertyGroup Condition="'$(Configuration)|$(Platform)'=='Release|AnyCPU'">
Expand All @@ -22,7 +23,7 @@
<PackageReference Include="Keyfactor.Orchestrators.IOrchestratorJobExtensions" Version="0.6.0" />
<PackageReference Include="Newtonsoft.Json" Version="13.0.1" />
<PackageReference Include="Portable.BouncyCastle" Version="1.9.0" />
<PackageReference Include="RestSharp" Version="107.2.1" />
<PackageReference Include="RestSharp" Version="112.1.0" />
Copy link

Copilot AI Nov 11, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The RestSharp package is being updated from version 107.2.1 to 112.1.0. This is a major version upgrade (from v107 to v112) that may introduce breaking changes. Ensure that all RestSharp API calls in the codebase are compatible with version 112.1.0, as major version updates often include breaking API changes.

Copilot uses AI. Check for mistakes.
<PackageReference Include="System.Management.Automation" Version="7.0.5" />
</ItemGroup>

Expand Down
452 changes: 376 additions & 76 deletions README.md

Large diffs are not rendered by default.

4 changes: 4 additions & 0 deletions docsource/content.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
## Overview

The Kemp Load Balancer Universal Orchestrator extension enables remote management of cryptographic certificates on Kemp Load Balancers. Kemp Load Balancers use certificates to secure HTTP and HTTPS traffic efficiently, ensuring that sensitive data is encrypted during transit. This extension integrates with Keyfactor Command to automate the process of inventorying, adding, and removing certificates within Kemp Load Balancer environments. By leveraging this orchestrator, administrators can easily manage SSL/TLS certificates, ensuring the security and reliability of their load balancing infrastructure.

149 changes: 149 additions & 0 deletions docsource/kemp.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,149 @@
# Enabling API Access for Keyfactor on Kemp LoadMaster

This guide explains how to enable API access for a specific user on a Kemp LoadMaster appliance to allow Keyfactor Orchestrator integrations for certificate management and inventory operations.

---

## 🧩 Step-by-Step: Enabling API Access for a User

### 1. Log in to the Kemp Web UI
- In your browser, go to:
```
https://<loadmaster-hostname-or-ip>:8443
```
- Log in as an administrator account that can manage users.

---

### 2. Edit the User Permissions
1. In the left-hand menu, navigate to:
```
System Configuration → System Administration → User Management
```
2. Locate the user account that will be used by the Keyfactor Orchestrator (for example: `bhill`).
3. Click **Modify** next to that user to open the **Permissions for User** screen.
4. Under **Rules**, enable the following options:
- ✅ **Certificate Creation**
- ✅ **Intermediate Certificates**
5. Click **Set Permissions** to apply the changes.

These permissions allow the orchestrator to create and manage intermediate and server certificates.

---

### 3. Generate and Record the API Key
1. Scroll down to the **API Keys** section.
2. Click **Generate New APIKey** to create a new key for API authentication.
3. Copy and securely store this key — it will be used in your Keyfactor orchestrator configuration as the **ServerPassword** or **API Key**.
4. You can later use **Delete** to revoke it if needed.

---

### 4. Verify API Access
Use a command line or PowerShell session to verify connectivity:

#### Using curl:
```bash
curl -k -H "Authorization: <API_KEY>" https://<loadmaster-ip>:8443/access/list
```

#### Using PowerShell:
```powershell
Invoke-RestMethod -Uri "https://<loadmaster-ip>:8443/access/list" -Headers @{ Authorization = "<API_KEY>" } -SkipCertificateCheck
```

If you receive a JSON response, API access is successfully configured.

### ✅ Summary of Required Settings

| Setting | Location | Value |
|----------|-----------|--------|
| Certificate Creation | User Permissions | Enabled |
| Intermediate Certificates | User Permissions | Enabled |
| API Key | User Management (Modify user) | Generated |
| Allow Web Administrative Access | Remote Access | Enabled |
| Enable API Interface | Remote Access | Enabled |
| Port | Remote Access | 8443 |
| Authentication Method | Remote Access | Password Only (default) |

---

## Kemp LoadMaster Orchestrator – Behavior Summary

This document summarizes the observed behaviors of the **Kemp LoadMaster Orchestrator** integration during SSL and Intermediate Certificate management operations.
It details how the orchestrator interacts with the LoadMaster API, handles overwrite logic, manages bindings, and synchronizes data with Keyfactor Command.

---

### 🧩 Overall Integration Behavior

- The orchestrator communicates with the **Kemp LoadMaster REST API** using the configured **ServerUsername**, **API Key**, and **SSL (HTTPS)** over port 8443.
- Operations are driven by the **Overwrite flag** and **Alias Name** supplied in the job parameters.
- Certificates are managed in two categories:
- **SSL Certificates** – used by virtual services (may be bound/unbound).
- **Intermediate Certificates** – uploaded supporting CA chain files.
- The orchestrator validates overwrite rules, binding constraints, and synchronization with Keyfactor Command for each operation.

---

### 🧪 Test Case Behavior Summary

| # | Case Name | Behavior Summary | Outcome |
|---|------------|------------------|----------|
| **1** | **New Add New Alias SSL Certificates** | When a new alias (`TC1`) is provided and the certificate does not exist, the orchestrator successfully uploads a new SSL certificate to the LoadMaster and registers it in Keyfactor. | ✅ New certificate created successfully. |
| **2** | **Replace Alias SSL Certificates** | The orchestrator detects an existing alias (`TC1`) and, with **Overwrite=True**, replaces the existing SSL certificate. The old certificate file is overwritten. | ✅ Replacement successful. |
| **3** | **Replace Alias SSL Certificates (No Overwrite)** | Attempting to replace an existing alias without the overwrite flag causes the orchestrator to abort the operation and return an error indicating the flag is required. | ✅ Expected error: “Overwrite flag should be used.” |
| **4** | **Replace Alias Bound SSL Certificates** | When a certificate bound to a virtual service is replaced with **Overwrite=True**, the orchestrator updates the certificate file while maintaining the existing service binding. | ✅ Bound certificate replaced in place. |
| **5** | **Remove Bound SSL Certificate** | The orchestrator prevents removal of any certificate that is currently bound to a virtual service, returning an error message. | ✅ Error handled correctly (“cannot remove bound certificates”). |
| **6** | **Remove Unbound SSL Certificate** | The orchestrator removes an SSL certificate only if it is unbound, confirming removal through the LoadMaster API. | ✅ Certificate removed successfully. |
| **7** | **New Add New Alias Intermediate Certificates** | A new intermediate certificate (`TC8b`) is uploaded since no alias conflict exists. It appears under the Intermediate Certificates list. | ✅ Intermediate certificate created. |
| **8** | **Replace Alias Intermediate Certificates** | Kemp does not support overwriting intermediate certificates. The orchestrator logs and returns the expected API error (`Filename already exists`). | ✅ Expected failure recorded. |
| **9** | **Remove Intermediate Certificates** | The orchestrator deletes the intermediate certificate (`TC8b`) from the LoadMaster and synchronizes removal from Keyfactor Command. | ✅ Certificate removed successfully. |
| **10** | **Inventory Intermediate Certificates** | Performs an inventory scan of all intermediate certificates on the LoadMaster, importing them into Keyfactor Command. | ✅ Inventory successful. |
| **11** | **Inventory SSL Certificates** | Enumerates all SSL certificates (bound and unbound) on the LoadMaster and updates Keyfactor’s inventory accordingly. | ✅ Inventory successful. |

---

### ⚙️ Functional Insights

- **Overwrite Logic:** SSL certificates respect the `Overwrite` flag. Intermediate certificates cannot be overwritten.
- **Binding Awareness:** The orchestrator checks for bound services before delete or replace operations.
- **Error Handling:** Clear API error messages are surfaced in Keyfactor job logs.
- **Synchronization:** Add/Remove/Inventory maintain consistent state between Keyfactor and LoadMaster.
- **Security:** All operations occur over HTTPS using API Key authentication.

---

### ✅ Operation Coverage Summary

| Operation | Certificate Type | Supported | Notes |
|------------|------------------|------------|--------|
| Add | SSL | ✅ | Creates new alias or replaces with overwrite flag |
| Replace | SSL | ✅ | Requires `Overwrite=True` |
| Replace | Intermediate | ❌ | Unsupported – API rejects |
| Remove | SSL | ✅ | Allowed only if unbound |
| Remove | Intermediate | ✅ | Fully supported |
| Inventory | SSL | ✅ | Returns all SSL certificates |
| Inventory | Intermediate | ✅ | Returns all intermediate certificates |

---

## TEST CASES
Case Number|Case Name|Case Description|Overwrite Flag|Alias Name|Expected Results|Passed|Screenshots
------------|---------|----------------|--------------|----------|----------------|--------------|------------
1|New Add New Alias SSL Certificates|Will Create a new SSL Certificate|False|TC1|New SSL Certificate with Alias TC1 Created On Kemp LoadMaster|True|![](images/TC1Results.gif)
2|Replace Alias SSL Certificates|Will Replace SSL Certificate|True|TC1|SSL Certificate with Alias TC1 Replaced On Kemp LoadMaster|True|![](images/TC2Results.gif)
3|Replace Alias SSL Certificates no Overwrite|Will Replace SSL Certificate|False|TC1|Error should occur stating Overwrite flag should be used|True|![](images/TC3Results.gif)
4|Replace Alias Bound SSL Certificates|Will Replace Bound SSL Certificate|True|TC1|Bound Certificate should be replaced|True|![](images/TC4Results.gif)
5|Remove Bound SSL Certificate|Should fail as you cannot remove Bound Certificates|N/A|TC1|Error Occurs stating you cannot remove bound certificates.|True|![](images/TC5Results.gif)
6|Remove UnBound SSL Certificate|Try to remove SSL Certificate that is UnBound|N/A|TC8a|Unbound Certificate Is Removed from LoadMaster.|True|![](images/TC6Results.gif)
7|New Add New Alias Intermediate Certificates|Will Create a new Intermediate Certificate|False|TC8b|New Intermediate Certificate with Alias TC8b Created On Kemp LoadMaster|True|![](images/TC7Results.gif)
8|Replace Alias Intermediate Certificates|You cannot replace intermediate certificates|True|TC8b|Command Failed: Filename already exists|True|![](images/TC8Results.gif)
9|Remove Intermediate Certificates|Intermediate Certificate Will Be Removed|N/A|TC8b|Intermediate Certificate Is Removed From Keyfactor and the LoadMaster|True|![](images/TC9Results.gif)
10|Inventory Intermediate Certificates|Intermediate Certificate Will Be Inventoried|N/A|N/A|Intermediate Certificate Is Inventoried to Keyfactor|True|![](images/TC10Results.gif)
11|Inventory SSL Certificates|SSL Certificate Will Be Inventoried|N/A|N/A|SSL Certificate Is Inventoried to Keyfactor|True|![](images/TC11Results.gif)

## Overview

TODO Overview is a required section

123 changes: 96 additions & 27 deletions integration-manifest.json
Original file line number Diff line number Diff line change
@@ -1,29 +1,98 @@
{
"$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
"integration_type": "orchestrator",
"name": "Kemp Load Balancer",
"status": "production",
"description": "Kemp Load Balancer for Add, Remove and Inventory.",
"about": {
"orchestrator": {
"win": {
"supportsCreateStore": false,
"supportsDiscovery": false,
"supportsManagementAdd": true,
"supportsManagementRemove": true,
"supportsReenrollment": false,
"supportsInventory": true,
"platformSupport": "Unused"
},
"linux": {
"supportsCreateStore": false,
"supportsDiscovery": false,
"supportsManagementAdd": false,
"supportsManagementRemove": false,
"supportsReenrollment": false,
"supportsInventory": false,
"platformSupport": "Unused"
}
}
}
"$schema": "https://keyfactor.github.io/integration-manifest-schema.json",
"integration_type": "orchestrator",
"name": "Kemp Load Balancer Orchestrator",
"status": "production",
"update_catalog": true,
"link_github": true,
"support_level": "kf-supported",
"release_project": "Kemp/Kemp.csproj",
"release_dir": "Kemp/bin/Release",
"description": "Kemp Load Balancer for Add, Remove and Inventory.",
"about": {
"orchestrator": {
"UOFramework": "10.4",
"keyfactor_platform_version": "10.4",
"pam_support": true,
"win": {
"supportsCreateStore": false,
"supportsDiscovery": false,
"supportsManagementAdd": true,
"supportsManagementRemove": true,
"supportsReenrollment": false,
"supportsInventory": true,
"platformSupport": "Unused"
},
"linux": {
"supportsCreateStore": false,
"supportsDiscovery": false,
"supportsManagementAdd": false,
"supportsManagementRemove": false,
"supportsReenrollment": false,
"supportsInventory": false,
"platformSupport": "Unused"
},
"store_types": [
{
"Name": "Kemp",
"ShortName": "Kemp",
"Capability": "Kemp",
"LocalStore": false,
"SupportedOperations": {
"Add": true,
"Create": false,
"Discovery": false,
"Enrollment": false,
"Remove": true
},
"Properties": [
{
"Name": "ServerUsername",
"DisplayName": "Server Username",
"Type": "Secret",
"DependsOn": "",
"DefaultValue": "",
"Required": false,
"IsPAMEligible": true,
"Description": "Not used."
},
{
"Name": "ServerPassword",
"DisplayName": "Server Password",
"Type": "Secret",
"DependsOn": "",
"DefaultValue": "",
"Required": false,
"IsPAMEligible": true,
"Description": "Kemp Api Password. (or valid PAM key if the username is stored in a KF Command configured PAM integration)."
},
{
"Name": "ServerUseSsl",
"DisplayName": "Use SSL",
"Type": "Bool",
"DependsOn": "",
"DefaultValue": "true",
"Required": true,
"IsPAMEligible": false,
"Description": "Should be true, http is not supported."
}
],
"EntryParameters": [],
"ClientMachineDescription": "Kemp Load Balancer Client Machine and port example TestKemp:8443.",
"StorePathDescription": "Not used just put a /",
"PasswordOptions": {
"EntrySupported": false,
"StoreRequired": false,
"Style": "Default"
},
"PrivateKeyAllowed": "Optional",
"JobProperties": [],
"ServerRequired": true,
"PowerShell": false,
"BlueprintAllowed": false,
"CustomAliasAllowed": "Required"
}
]
}
}
}
Loading