tls-self-signed-cert.SelfSignedCertificate
Explore with Pulumi AI
This resources helps you create a self signed certificate.
Example Usage
Self Signed Certificate
using System.Collections.Generic;
using Pulumi;
using TlsSelfSignedCert = Pulumi.TlsSelfSignedCert;
return await Deployment.RunAsync(() =>
{
var cert = new TlsSelfSignedCert.SelfSignedCertificate("cert", new()
{
DnsName = "cert.example.com",
ValidityPeriodHours = 807660,
LocalValidityPeriodHours = 17520,
Subject = %!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference),
});
return new Dictionary<string, object?>
{
["pem"] = cert.Pem,
["privateKey"] = cert.PrivateKey,
["caCert"] = cert.CaCert,
};
});
package main
import (
selfSignedCert "github.com/pulumi/pulumi-tls-self-signed-cert/sdk/go/tls-self-signed-cert"
"github.com/pulumi/pulumi-tls/sdk/v4/go/tls"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
cert, err := selfSignedCert.NewSelfSignedCertificate(ctx, "cert", &selfSignedCert.SelfSignedCertificateArgs{
DnsName: pulumi.String("cert.example.com"),
ValidityPeriodHours: pulumi.Int(807660),
LocalValidityPeriodHours: pulumi.Int(17520),
Subject: tls.SelfSignedCertSubjectArgs{
CommonName: pulumi.String("example-cert"),
Organization: pulumi.String("example-cert LLC"),
},
})
if err != nil {
return err
}
ctx.Export("pem", cert.Pem)
ctx.Export("privateKey", cert.PrivateKey)
ctx.Export("caCert", cert.CaCert)
})
}
Coming soon!
import pulumi
import pulumi_tls_self_signed_cert as tls_self_signed_cert
cert = tls_self_signed_cert.SelfSignedCertificate("cert",
dns_name="cert.example.com",
validity_period_hours=807660,
local_validity_period_hours=17520,
subject=%!v(PANIC=Format method: interface conversion: interface {} is json.RawMessage, not python.PackageInfo))
pulumi.export("pem", cert.pem)
pulumi.export("privateKey", cert.private_key)
pulumi.export("caCert", cert.ca_cert)
import * as pulumi from "@pulumi/pulumi";
import * as tls_self_signed_cert from "@pulumi/tls-self-signed-cert";
const cert = new tls_self_signed_cert.SelfSignedCertificate("cert", {
dnsName: "cert.example.com",
validityPeriodHours: 807660,
localValidityPeriodHours: 17520,
subject: {
commonName: "example-cert",
organization: "example-cert LLC",
},
});
export const pem = cert.pem;
export const privateKey = cert.privateKey;
export const caCert = cert.caCert;
name: tls-self-signed-cert
runtime: yaml
resources:
cert:
type: "tls-self-signed-cert:index:SelfSignedCertificate"
properties:
dnsName: "cert.example.com"
validityPeriodHours: 807660
localValidityPeriodHours: 17520
subject:
commonName: "example-cert"
organization: "example-cert LLC"
outputs:
pem: ${cert.pem}
privateKey: ${cert.privateKey}
caCert: ${cert.caCert}
Create SelfSignedCertificate Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SelfSignedCertificate(name: string, args: SelfSignedCertificateArgs, opts?: ComponentResourceOptions);
@overload
def SelfSignedCertificate(resource_name: str,
args: SelfSignedCertificateArgs,
opts: Optional[ResourceOptions] = None)
@overload
def SelfSignedCertificate(resource_name: str,
opts: Optional[ResourceOptions] = None,
local_validity_period_hours: Optional[int] = None,
subject: Optional[pulumi_tls.SelfSignedCertSubjectArgs] = None,
validity_period_hours: Optional[int] = None,
algorithm: Optional[Algorithm] = None,
allowed_uses: Optional[Sequence[AllowedUses]] = None,
dns_name: Optional[str] = None,
ecdsa_curve: Optional[EcdsaCurve] = None,
ip_address: Optional[str] = None,
rsa_bits: Optional[int] = None)
func NewSelfSignedCertificate(ctx *Context, name string, args SelfSignedCertificateArgs, opts ...ResourceOption) (*SelfSignedCertificate, error)
public SelfSignedCertificate(string name, SelfSignedCertificateArgs args, ComponentResourceOptions? opts = null)
public SelfSignedCertificate(String name, SelfSignedCertificateArgs args)
public SelfSignedCertificate(String name, SelfSignedCertificateArgs args, ComponentResourceOptions options)
type: tls-self-signed-cert:SelfSignedCertificate
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SelfSignedCertificateArgs
- The arguments to resource properties.
- opts ComponentResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SelfSignedCertificateArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SelfSignedCertificateArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SelfSignedCertificateArgs
- The arguments to resource properties.
- opts ComponentResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SelfSignedCertificateArgs
- The arguments to resource properties.
- options ComponentResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var selfSignedCertificateResource = new TlsSelfSignedCert.SelfSignedCertificate("selfSignedCertificateResource", new()
{
LocalValidityPeriodHours = 0,
Subject = new Tls.Inputs.SelfSignedCertSubjectArgs
{
CommonName = "string",
Country = "string",
Locality = "string",
Organization = "string",
OrganizationalUnit = "string",
PostalCode = "string",
Province = "string",
SerialNumber = "string",
StreetAddresses = new[]
{
"string",
},
},
ValidityPeriodHours = 0,
Algorithm = TlsSelfSignedCert.Algorithm.RSA,
AllowedUses = new[]
{
TlsSelfSignedCert.AllowedUses.Any_extended,
},
DnsName = "string",
EcdsaCurve = TlsSelfSignedCert.EcdsaCurve.P224,
IpAddress = "string",
RsaBits = 0,
});
example, err := tlsselfsignedcert.NewSelfSignedCertificate(ctx, "selfSignedCertificateResource", &tlsselfsignedcert.SelfSignedCertificateArgs{
LocalValidityPeriodHours: pulumi.Int(0),
Subject: &tls.SelfSignedCertSubjectArgs{
CommonName: pulumi.String("string"),
Country: pulumi.String("string"),
Locality: pulumi.String("string"),
Organization: pulumi.String("string"),
OrganizationalUnit: pulumi.String("string"),
PostalCode: pulumi.String("string"),
Province: pulumi.String("string"),
SerialNumber: pulumi.String("string"),
StreetAddresses: pulumi.StringArray{
pulumi.String("string"),
},
},
ValidityPeriodHours: pulumi.Int(0),
Algorithm: tlsselfsignedcert.AlgorithmRSA,
AllowedUses: tls - self - signed - cert.AllowedUsesArray{
tlsselfsignedcert.AllowedUses_Any_extended,
},
DnsName: pulumi.String("string"),
EcdsaCurve: tlsselfsignedcert.EcdsaCurveP224,
IpAddress: pulumi.String("string"),
RsaBits: pulumi.Int(0),
})
var selfSignedCertificateResource = new SelfSignedCertificate("selfSignedCertificateResource", SelfSignedCertificateArgs.builder()
.localValidityPeriodHours(0)
.subject(SelfSignedCertSubjectArgs.builder()
.commonName("string")
.country("string")
.locality("string")
.organization("string")
.organizationalUnit("string")
.postalCode("string")
.province("string")
.serialNumber("string")
.streetAddresses("string")
.build())
.validityPeriodHours(0)
.algorithm("RSA")
.allowedUses("any_extended")
.dnsName("string")
.ecdsaCurve("P224")
.ipAddress("string")
.rsaBits(0)
.build());
self_signed_certificate_resource = tls_self_signed_cert.SelfSignedCertificate("selfSignedCertificateResource",
local_validity_period_hours=0,
subject={
"common_name": "string",
"country": "string",
"locality": "string",
"organization": "string",
"organizational_unit": "string",
"postal_code": "string",
"province": "string",
"serial_number": "string",
"street_addresses": ["string"],
},
validity_period_hours=0,
algorithm=tls_self_signed_cert.Algorithm.RSA,
allowed_uses=[tls_self_signed_cert.AllowedUses.ANY_EXTENDED],
dns_name="string",
ecdsa_curve=tls_self_signed_cert.EcdsaCurve.P224,
ip_address="string",
rsa_bits=0)
const selfSignedCertificateResource = new tls_self_signed_cert.SelfSignedCertificate("selfSignedCertificateResource", {
localValidityPeriodHours: 0,
subject: {
commonName: "string",
country: "string",
locality: "string",
organization: "string",
organizationalUnit: "string",
postalCode: "string",
province: "string",
serialNumber: "string",
streetAddresses: ["string"],
},
validityPeriodHours: 0,
algorithm: tls_self_signed_cert.Algorithm.RSA,
allowedUses: [tls_self_signed_cert.AllowedUses.Any_extended],
dnsName: "string",
ecdsaCurve: tls_self_signed_cert.EcdsaCurve.P224,
ipAddress: "string",
rsaBits: 0,
});
type: tls-self-signed-cert:SelfSignedCertificate
properties:
algorithm: RSA
allowedUses:
- any_extended
dnsName: string
ecdsaCurve: P224
ipAddress: string
localValidityPeriodHours: 0
rsaBits: 0
subject:
commonName: string
country: string
locality: string
organization: string
organizationalUnit: string
postalCode: string
province: string
serialNumber: string
streetAddresses:
- string
validityPeriodHours: 0
SelfSignedCertificate Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SelfSignedCertificate resource accepts the following input properties:
- Local
Validity intPeriod Hours - Number of hours, after initial issuing, that the local certificate will remain valid for.
- Subject
Pulumi.
Tls. Inputs. Self Signed Cert Subject The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
This type is defined in the TLS package.
- Validity
Period intHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- Algorithm
Pulumi.
Tls Self Signed Cert. Algorithm - Name of the algorithm to use when generating the private key. Currently-supported values are
RSA
,ECDSA
andED25519
(default:RSA
). - Allowed
Uses List<Pulumi.Tls Self Signed Cert. Allowed Uses> - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - Dns
Name string - The DNS name for which a certificate is being requested (i.e. certificate subjects).
- Ecdsa
Curve Pulumi.Tls Self Signed Cert. Ecdsa Curve - When
algorithm
isECDSA
, the name of the elliptic curve to use. Currently-supported values areP224
,P256
,P384
orP521
(default:P224
). - Ip
Address string - The IP address for which a certificate is being requested (i.e. certificate subjects).
- Rsa
Bits int - When
algorithm
isRSA
, the size of the generated RSA key, in bits (default:2048
).
- Local
Validity intPeriod Hours - Number of hours, after initial issuing, that the local certificate will remain valid for.
- Subject
Self
Signed Cert Subject Args The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
This type is defined in the TLS package.
- Validity
Period intHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- Algorithm Algorithm
- Name of the algorithm to use when generating the private key. Currently-supported values are
RSA
,ECDSA
andED25519
(default:RSA
). - Allowed
Uses []AllowedUses - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - Dns
Name string - The DNS name for which a certificate is being requested (i.e. certificate subjects).
- Ecdsa
Curve EcdsaCurve - When
algorithm
isECDSA
, the name of the elliptic curve to use. Currently-supported values areP224
,P256
,P384
orP521
(default:P224
). - Ip
Address string - The IP address for which a certificate is being requested (i.e. certificate subjects).
- Rsa
Bits int - When
algorithm
isRSA
, the size of the generated RSA key, in bits (default:2048
).
- local
Validity IntegerPeriod Hours - Number of hours, after initial issuing, that the local certificate will remain valid for.
- subject
Self
Signed Cert Subject The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
This type is defined in the TLS package.
- validity
Period IntegerHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- algorithm Algorithm
- Name of the algorithm to use when generating the private key. Currently-supported values are
RSA
,ECDSA
andED25519
(default:RSA
). - allowed
Uses List<AllowedUses> - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - dns
Name String - The DNS name for which a certificate is being requested (i.e. certificate subjects).
- ecdsa
Curve EcdsaCurve - When
algorithm
isECDSA
, the name of the elliptic curve to use. Currently-supported values areP224
,P256
,P384
orP521
(default:P224
). - ip
Address String - The IP address for which a certificate is being requested (i.e. certificate subjects).
- rsa
Bits Integer - When
algorithm
isRSA
, the size of the generated RSA key, in bits (default:2048
).
- local
Validity numberPeriod Hours - Number of hours, after initial issuing, that the local certificate will remain valid for.
- subject
pulumi
Tlstypesinput Self Signed Cert Subject The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
This type is defined in the TLS package.
- validity
Period numberHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- algorithm Algorithm
- Name of the algorithm to use when generating the private key. Currently-supported values are
RSA
,ECDSA
andED25519
(default:RSA
). - allowed
Uses AllowedUses[] - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - dns
Name string - The DNS name for which a certificate is being requested (i.e. certificate subjects).
- ecdsa
Curve EcdsaCurve - When
algorithm
isECDSA
, the name of the elliptic curve to use. Currently-supported values areP224
,P256
,P384
orP521
(default:P224
). - ip
Address string - The IP address for which a certificate is being requested (i.e. certificate subjects).
- rsa
Bits number - When
algorithm
isRSA
, the size of the generated RSA key, in bits (default:2048
).
- local_
validity_ intperiod_ hours - Number of hours, after initial issuing, that the local certificate will remain valid for.
- subject
pulumi_
tls. Self Signed Cert Subject Args The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
This type is defined in the TLS package.
- validity_
period_ inthours - Number of hours, after initial issuing, that the certificate will remain valid for.
- algorithm Algorithm
- Name of the algorithm to use when generating the private key. Currently-supported values are
RSA
,ECDSA
andED25519
(default:RSA
). - allowed_
uses Sequence[AllowedUses] - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - dns_
name str - The DNS name for which a certificate is being requested (i.e. certificate subjects).
- ecdsa_
curve EcdsaCurve - When
algorithm
isECDSA
, the name of the elliptic curve to use. Currently-supported values areP224
,P256
,P384
orP521
(default:P224
). - ip_
address str - The IP address for which a certificate is being requested (i.e. certificate subjects).
- rsa_
bits int - When
algorithm
isRSA
, the size of the generated RSA key, in bits (default:2048
).
- local
Validity NumberPeriod Hours - Number of hours, after initial issuing, that the local certificate will remain valid for.
- subject Property Map
The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.
This type is defined in the TLS package.
- validity
Period NumberHours - Number of hours, after initial issuing, that the certificate will remain valid for.
- algorithm "RSA" | "ECDSA" | "ED25519"
- Name of the algorithm to use when generating the private key. Currently-supported values are
RSA
,ECDSA
andED25519
(default:RSA
). - allowed
Uses List<"any_extended" | "cert_ signing" | "client_ auth" | "code_ signing" | "content_ commitment" | "crl_ signing" | "data_ encipherment" | "decipher_ only" | "digital_ signature" | "email_ protection" | "encipher_ only" | "ipsec_ end_ system" | "ipsec_ tunnel" | "ipsec_ user" | "key_ agreement" | "key_ encipherment" | "microsoft_ commercial_ code_ signing" | "microsoft_ kernel_ code_ signing" | "microsoft_ server_ gated_ crypto" | "netscape_ server_ gated_ crypto" | "ocsp_ signing" | "server_ auth" | "timestamping"> - List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values:
any_extended
,cert_signing
,client_auth
,code_signing
,content_commitment
,crl_signing
,data_encipherment
,decipher_only
,digital_signature
,email_protection
,encipher_only
,ipsec_end_system
,ipsec_tunnel
,ipsec_user
,key_agreement
,key_encipherment
,microsoft_commercial_code_signing
,microsoft_kernel_code_signing
,microsoft_server_gated_crypto
,netscape_server_gated_crypto
,ocsp_signing
,server_auth
,timestamping
. - dns
Name String - The DNS name for which a certificate is being requested (i.e. certificate subjects).
- ecdsa
Curve "P224" | "P256" | "P384" | "P521" - When
algorithm
isECDSA
, the name of the elliptic curve to use. Currently-supported values areP224
,P256
,P384
orP521
(default:P224
). - ip
Address String - The IP address for which a certificate is being requested (i.e. certificate subjects).
- rsa
Bits Number - When
algorithm
isRSA
, the size of the generated RSA key, in bits (default:2048
).
Outputs
All input properties are implicitly available as output properties. Additionally, the SelfSignedCertificate resource produces the following output properties:
- Ca
Cert string - Your self signed cert.
- Pem string
- The PEM of your self signed cert.
- Private
Key string - The private key of your self signed cert.
- Ca
Cert string - Your self signed cert.
- Pem string
- The PEM of your self signed cert.
- Private
Key string - The private key of your self signed cert.
- ca
Cert String - Your self signed cert.
- pem String
- The PEM of your self signed cert.
- private
Key String - The private key of your self signed cert.
- ca
Cert string - Your self signed cert.
- pem string
- The PEM of your self signed cert.
- private
Key string - The private key of your self signed cert.
- ca_
cert str - Your self signed cert.
- pem str
- The PEM of your self signed cert.
- private_
key str - The private key of your self signed cert.
- ca
Cert String - Your self signed cert.
- pem String
- The PEM of your self signed cert.
- private
Key String - The private key of your self signed cert.
Supporting Types
Algorithm, AlgorithmArgs
- RSA
- RSA
- ECDSA
- ECDSA
- ED25519
- ED25519
- Algorithm
RSA - RSA
- Algorithm
ECDSA - ECDSA
- Algorithm
ED25519 - ED25519
- RSA
- RSA
- ECDSA
- ECDSA
- ED25519
- ED25519
- RSA
- RSA
- ECDSA
- ECDSA
- ED25519
- ED25519
- RSA
- RSA
- ECDSA
- ECDSA
- ED25519
- ED25519
- "RSA"
- RSA
- "ECDSA"
- ECDSA
- "ED25519"
- ED25519
AllowedUses, AllowedUsesArgs
- Any_
extended - any_extended
- Cert_
signing - cert_signing
- Client_
auth - client_auth
- Code_
signing - code_signing
- Content_
commitment - content_commitment
- Crl_
signing - crl_signing
- Data_
encipherment - data_encipherment
- Decipher_
only - decipher_only
- Digital_
signature - digital_signature
- Email_
protection - email_protection
- Encipher_
only - encipher_only
- Ipsec_
end_ system - ipsec_end_system
- Ipsec_
tunnel - ipsec_tunnel
- Ipsec_
user - ipsec_user
- Key_
agreement - key_agreement
- Key_
encipherment - key_encipherment
- Microsoft_
commercial_ code_ signing - microsoft_commercial_code_signing
- Microsoft_
kernel_ code_ signing - microsoft_kernel_code_signing
- Microsoft_
server_ gated_ crypto - microsoft_server_gated_crypto
- Netscape_
server_ gated_ crypto - netscape_server_gated_crypto
- Ocsp_
signing - ocsp_signing
- Server_
auth - server_auth
- Timestamping
- timestamping
- Allowed
Uses_Any_ extended - any_extended
- Allowed
Uses_Cert_ signing - cert_signing
- Allowed
Uses_Client_ auth - client_auth
- Allowed
Uses_Code_ signing - code_signing
- Allowed
Uses_Content_ commitment - content_commitment
- Allowed
Uses_Crl_ signing - crl_signing
- Allowed
Uses_Data_ encipherment - data_encipherment
- Allowed
Uses_Decipher_ only - decipher_only
- Allowed
Uses_Digital_ signature - digital_signature
- Allowed
Uses_Email_ protection - email_protection
- Allowed
Uses_Encipher_ only - encipher_only
- Allowed
Uses_Ipsec_ end_ system - ipsec_end_system
- Allowed
Uses_Ipsec_ tunnel - ipsec_tunnel
- Allowed
Uses_Ipsec_ user - ipsec_user
- Allowed
Uses_Key_ agreement - key_agreement
- Allowed
Uses_Key_ encipherment - key_encipherment
- Allowed
Uses_Microsoft_ commercial_ code_ signing - microsoft_commercial_code_signing
- Allowed
Uses_Microsoft_ kernel_ code_ signing - microsoft_kernel_code_signing
- Allowed
Uses_Microsoft_ server_ gated_ crypto - microsoft_server_gated_crypto
- Allowed
Uses_Netscape_ server_ gated_ crypto - netscape_server_gated_crypto
- Allowed
Uses_Ocsp_ signing - ocsp_signing
- Allowed
Uses_Server_ auth - server_auth
- Allowed
Uses Timestamping - timestamping
- Any_
extended - any_extended
- Cert_
signing - cert_signing
- Client_
auth - client_auth
- Code_
signing - code_signing
- Content_
commitment - content_commitment
- Crl_
signing - crl_signing
- Data_
encipherment - data_encipherment
- Decipher_
only - decipher_only
- Digital_
signature - digital_signature
- Email_
protection - email_protection
- Encipher_
only - encipher_only
- Ipsec_
end_ system - ipsec_end_system
- Ipsec_
tunnel - ipsec_tunnel
- Ipsec_
user - ipsec_user
- Key_
agreement - key_agreement
- Key_
encipherment - key_encipherment
- Microsoft_
commercial_ code_ signing - microsoft_commercial_code_signing
- Microsoft_
kernel_ code_ signing - microsoft_kernel_code_signing
- Microsoft_
server_ gated_ crypto - microsoft_server_gated_crypto
- Netscape_
server_ gated_ crypto - netscape_server_gated_crypto
- Ocsp_
signing - ocsp_signing
- Server_
auth - server_auth
- Timestamping
- timestamping
- Any_
extended - any_extended
- Cert_
signing - cert_signing
- Client_
auth - client_auth
- Code_
signing - code_signing
- Content_
commitment - content_commitment
- Crl_
signing - crl_signing
- Data_
encipherment - data_encipherment
- Decipher_
only - decipher_only
- Digital_
signature - digital_signature
- Email_
protection - email_protection
- Encipher_
only - encipher_only
- Ipsec_
end_ system - ipsec_end_system
- Ipsec_
tunnel - ipsec_tunnel
- Ipsec_
user - ipsec_user
- Key_
agreement - key_agreement
- Key_
encipherment - key_encipherment
- Microsoft_
commercial_ code_ signing - microsoft_commercial_code_signing
- Microsoft_
kernel_ code_ signing - microsoft_kernel_code_signing
- Microsoft_
server_ gated_ crypto - microsoft_server_gated_crypto
- Netscape_
server_ gated_ crypto - netscape_server_gated_crypto
- Ocsp_
signing - ocsp_signing
- Server_
auth - server_auth
- Timestamping
- timestamping
- ANY_EXTENDED
- any_extended
- CERT_SIGNING
- cert_signing
- CLIENT_AUTH
- client_auth
- CODE_SIGNING
- code_signing
- CONTENT_COMMITMENT
- content_commitment
- CRL_SIGNING
- crl_signing
- DATA_ENCIPHERMENT
- data_encipherment
- DECIPHER_ONLY
- decipher_only
- DIGITAL_SIGNATURE
- digital_signature
- EMAIL_PROTECTION
- email_protection
- ENCIPHER_ONLY
- encipher_only
- IPSEC_END_SYSTEM
- ipsec_end_system
- IPSEC_TUNNEL
- ipsec_tunnel
- IPSEC_USER
- ipsec_user
- KEY_AGREEMENT
- key_agreement
- KEY_ENCIPHERMENT
- key_encipherment
- MICROSOFT_COMMERCIAL_CODE_SIGNING
- microsoft_commercial_code_signing
- MICROSOFT_KERNEL_CODE_SIGNING
- microsoft_kernel_code_signing
- MICROSOFT_SERVER_GATED_CRYPTO
- microsoft_server_gated_crypto
- NETSCAPE_SERVER_GATED_CRYPTO
- netscape_server_gated_crypto
- OCSP_SIGNING
- ocsp_signing
- SERVER_AUTH
- server_auth
- TIMESTAMPING
- timestamping
- "any_
extended" - any_extended
- "cert_
signing" - cert_signing
- "client_
auth" - client_auth
- "code_
signing" - code_signing
- "content_
commitment" - content_commitment
- "crl_
signing" - crl_signing
- "data_
encipherment" - data_encipherment
- "decipher_
only" - decipher_only
- "digital_
signature" - digital_signature
- "email_
protection" - email_protection
- "encipher_
only" - encipher_only
- "ipsec_
end_ system" - ipsec_end_system
- "ipsec_
tunnel" - ipsec_tunnel
- "ipsec_
user" - ipsec_user
- "key_
agreement" - key_agreement
- "key_
encipherment" - key_encipherment
- "microsoft_
commercial_ code_ signing" - microsoft_commercial_code_signing
- "microsoft_
kernel_ code_ signing" - microsoft_kernel_code_signing
- "microsoft_
server_ gated_ crypto" - microsoft_server_gated_crypto
- "netscape_
server_ gated_ crypto" - netscape_server_gated_crypto
- "ocsp_
signing" - ocsp_signing
- "server_
auth" - server_auth
- "timestamping"
- timestamping
EcdsaCurve, EcdsaCurveArgs
- P224
- P224
- P256
- P256
- P384
- P384
- P521
- P521
- Ecdsa
Curve P224 - P224
- Ecdsa
Curve P256 - P256
- Ecdsa
Curve P384 - P384
- Ecdsa
Curve P521 - P521
- P224
- P224
- P256
- P256
- P384
- P384
- P521
- P521
- P224
- P224
- P256
- P256
- P384
- P384
- P521
- P521
- P224
- P224
- P256
- P256
- P384
- P384
- P521
- P521
- "P224"
- P224
- "P256"
- P256
- "P384"
- P384
- "P521"
- P521
Package Details
- Repository
- tls-self-signed-cert
- License