1. Packages
  2. Self Signed Certificate
  3. API Docs
  4. SelfSignedCertificate
Self Signed Certificate v0.1.3 published on Monday, Jan 9, 2023 by Pulumi

tls-self-signed-cert.SelfSignedCertificate

Explore with Pulumi AI

tls-self-signed-cert logo
Self Signed Certificate v0.1.3 published on Monday, Jan 9, 2023 by Pulumi

    This resources helps you create a self signed certificate.

    Example Usage

    Self Signed Certificate

    using System.Collections.Generic;
    using Pulumi;
    using TlsSelfSignedCert = Pulumi.TlsSelfSignedCert;
    
    return await Deployment.RunAsync(() => 
    {
        var cert = new TlsSelfSignedCert.SelfSignedCertificate("cert", new()
        {
            DnsName = "cert.example.com",
            ValidityPeriodHours = 807660,
            LocalValidityPeriodHours = 17520,
            Subject = %!v(PANIC=Format method: runtime error: invalid memory address or nil pointer dereference),
        });
    
        return new Dictionary<string, object?>
        {
            ["pem"] = cert.Pem,
            ["privateKey"] = cert.PrivateKey,
            ["caCert"] = cert.CaCert,
        };
    });
    
    package main
    
    import (
        selfSignedCert "github.com/pulumi/pulumi-tls-self-signed-cert/sdk/go/tls-self-signed-cert"
        "github.com/pulumi/pulumi-tls/sdk/v4/go/tls"
        "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
        pulumi.Run(func(ctx *pulumi.Context) error {
            cert, err := selfSignedCert.NewSelfSignedCertificate(ctx, "cert", &selfSignedCert.SelfSignedCertificateArgs{
                DnsName:                  pulumi.String("cert.example.com"),
                ValidityPeriodHours:      pulumi.Int(807660),
                LocalValidityPeriodHours: pulumi.Int(17520),
                Subject: tls.SelfSignedCertSubjectArgs{
                    CommonName:   pulumi.String("example-cert"),
                    Organization: pulumi.String("example-cert LLC"),
                },
            })
            if err != nil {
                return err
            }
    
            ctx.Export("pem", cert.Pem)
            ctx.Export("privateKey", cert.PrivateKey)
            ctx.Export("caCert", cert.CaCert)
        })
    }
    

    Coming soon!

    import pulumi
    import pulumi_tls_self_signed_cert as tls_self_signed_cert
    
    cert = tls_self_signed_cert.SelfSignedCertificate("cert",
        dns_name="cert.example.com",
        validity_period_hours=807660,
        local_validity_period_hours=17520,
        subject=%!v(PANIC=Format method: interface conversion: interface {} is json.RawMessage, not python.PackageInfo))
    pulumi.export("pem", cert.pem)
    pulumi.export("privateKey", cert.private_key)
    pulumi.export("caCert", cert.ca_cert)
    
    import * as pulumi from "@pulumi/pulumi";
    import * as tls_self_signed_cert from "@pulumi/tls-self-signed-cert";
    
    const cert = new tls_self_signed_cert.SelfSignedCertificate("cert", {
        dnsName: "cert.example.com",
        validityPeriodHours: 807660,
        localValidityPeriodHours: 17520,
        subject: {
            commonName: "example-cert",
            organization: "example-cert LLC",
        },
    });
    export const pem = cert.pem;
    export const privateKey = cert.privateKey;
    export const caCert = cert.caCert;
    
    name: tls-self-signed-cert
    runtime: yaml
    resources:
        cert:
            type: "tls-self-signed-cert:index:SelfSignedCertificate"
            properties:
                dnsName: "cert.example.com"
                validityPeriodHours: 807660
                localValidityPeriodHours: 17520
                subject:
                    commonName: "example-cert"
                    organization: "example-cert LLC"
    outputs:
        pem: ${cert.pem}
        privateKey: ${cert.privateKey}
        caCert: ${cert.caCert}
    

    Create SelfSignedCertificate Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SelfSignedCertificate(name: string, args: SelfSignedCertificateArgs, opts?: ComponentResourceOptions);
    @overload
    def SelfSignedCertificate(resource_name: str,
                              args: SelfSignedCertificateArgs,
                              opts: Optional[ResourceOptions] = None)
    
    @overload
    def SelfSignedCertificate(resource_name: str,
                              opts: Optional[ResourceOptions] = None,
                              local_validity_period_hours: Optional[int] = None,
                              subject: Optional[pulumi_tls.SelfSignedCertSubjectArgs] = None,
                              validity_period_hours: Optional[int] = None,
                              algorithm: Optional[Algorithm] = None,
                              allowed_uses: Optional[Sequence[AllowedUses]] = None,
                              dns_name: Optional[str] = None,
                              ecdsa_curve: Optional[EcdsaCurve] = None,
                              ip_address: Optional[str] = None,
                              rsa_bits: Optional[int] = None)
    func NewSelfSignedCertificate(ctx *Context, name string, args SelfSignedCertificateArgs, opts ...ResourceOption) (*SelfSignedCertificate, error)
    public SelfSignedCertificate(string name, SelfSignedCertificateArgs args, ComponentResourceOptions? opts = null)
    public SelfSignedCertificate(String name, SelfSignedCertificateArgs args)
    public SelfSignedCertificate(String name, SelfSignedCertificateArgs args, ComponentResourceOptions options)
    
    type: tls-self-signed-cert:SelfSignedCertificate
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SelfSignedCertificateArgs
    The arguments to resource properties.
    opts ComponentResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SelfSignedCertificateArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SelfSignedCertificateArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SelfSignedCertificateArgs
    The arguments to resource properties.
    opts ComponentResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SelfSignedCertificateArgs
    The arguments to resource properties.
    options ComponentResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var selfSignedCertificateResource = new TlsSelfSignedCert.SelfSignedCertificate("selfSignedCertificateResource", new()
    {
        LocalValidityPeriodHours = 0,
        Subject = new Tls.Inputs.SelfSignedCertSubjectArgs
        {
            CommonName = "string",
            Country = "string",
            Locality = "string",
            Organization = "string",
            OrganizationalUnit = "string",
            PostalCode = "string",
            Province = "string",
            SerialNumber = "string",
            StreetAddresses = new[]
            {
                "string",
            },
        },
        ValidityPeriodHours = 0,
        Algorithm = TlsSelfSignedCert.Algorithm.RSA,
        AllowedUses = new[]
        {
            TlsSelfSignedCert.AllowedUses.Any_extended,
        },
        DnsName = "string",
        EcdsaCurve = TlsSelfSignedCert.EcdsaCurve.P224,
        IpAddress = "string",
        RsaBits = 0,
    });
    
    example, err := tlsselfsignedcert.NewSelfSignedCertificate(ctx, "selfSignedCertificateResource", &tlsselfsignedcert.SelfSignedCertificateArgs{
    	LocalValidityPeriodHours: pulumi.Int(0),
    	Subject: &tls.SelfSignedCertSubjectArgs{
    		CommonName:         pulumi.String("string"),
    		Country:            pulumi.String("string"),
    		Locality:           pulumi.String("string"),
    		Organization:       pulumi.String("string"),
    		OrganizationalUnit: pulumi.String("string"),
    		PostalCode:         pulumi.String("string"),
    		Province:           pulumi.String("string"),
    		SerialNumber:       pulumi.String("string"),
    		StreetAddresses: pulumi.StringArray{
    			pulumi.String("string"),
    		},
    	},
    	ValidityPeriodHours: pulumi.Int(0),
    	Algorithm:           tlsselfsignedcert.AlgorithmRSA,
    	AllowedUses: tls - self - signed - cert.AllowedUsesArray{
    		tlsselfsignedcert.AllowedUses_Any_extended,
    	},
    	DnsName:    pulumi.String("string"),
    	EcdsaCurve: tlsselfsignedcert.EcdsaCurveP224,
    	IpAddress:  pulumi.String("string"),
    	RsaBits:    pulumi.Int(0),
    })
    
    var selfSignedCertificateResource = new SelfSignedCertificate("selfSignedCertificateResource", SelfSignedCertificateArgs.builder()
        .localValidityPeriodHours(0)
        .subject(SelfSignedCertSubjectArgs.builder()
            .commonName("string")
            .country("string")
            .locality("string")
            .organization("string")
            .organizationalUnit("string")
            .postalCode("string")
            .province("string")
            .serialNumber("string")
            .streetAddresses("string")
            .build())
        .validityPeriodHours(0)
        .algorithm("RSA")
        .allowedUses("any_extended")
        .dnsName("string")
        .ecdsaCurve("P224")
        .ipAddress("string")
        .rsaBits(0)
        .build());
    
    self_signed_certificate_resource = tls_self_signed_cert.SelfSignedCertificate("selfSignedCertificateResource",
        local_validity_period_hours=0,
        subject={
            "common_name": "string",
            "country": "string",
            "locality": "string",
            "organization": "string",
            "organizational_unit": "string",
            "postal_code": "string",
            "province": "string",
            "serial_number": "string",
            "street_addresses": ["string"],
        },
        validity_period_hours=0,
        algorithm=tls_self_signed_cert.Algorithm.RSA,
        allowed_uses=[tls_self_signed_cert.AllowedUses.ANY_EXTENDED],
        dns_name="string",
        ecdsa_curve=tls_self_signed_cert.EcdsaCurve.P224,
        ip_address="string",
        rsa_bits=0)
    
    const selfSignedCertificateResource = new tls_self_signed_cert.SelfSignedCertificate("selfSignedCertificateResource", {
        localValidityPeriodHours: 0,
        subject: {
            commonName: "string",
            country: "string",
            locality: "string",
            organization: "string",
            organizationalUnit: "string",
            postalCode: "string",
            province: "string",
            serialNumber: "string",
            streetAddresses: ["string"],
        },
        validityPeriodHours: 0,
        algorithm: tls_self_signed_cert.Algorithm.RSA,
        allowedUses: [tls_self_signed_cert.AllowedUses.Any_extended],
        dnsName: "string",
        ecdsaCurve: tls_self_signed_cert.EcdsaCurve.P224,
        ipAddress: "string",
        rsaBits: 0,
    });
    
    type: tls-self-signed-cert:SelfSignedCertificate
    properties:
        algorithm: RSA
        allowedUses:
            - any_extended
        dnsName: string
        ecdsaCurve: P224
        ipAddress: string
        localValidityPeriodHours: 0
        rsaBits: 0
        subject:
            commonName: string
            country: string
            locality: string
            organization: string
            organizationalUnit: string
            postalCode: string
            province: string
            serialNumber: string
            streetAddresses:
                - string
        validityPeriodHours: 0
    

    SelfSignedCertificate Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The SelfSignedCertificate resource accepts the following input properties:

    LocalValidityPeriodHours int
    Number of hours, after initial issuing, that the local certificate will remain valid for.
    Subject Pulumi.Tls.Inputs.SelfSignedCertSubject

    The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.

    This type is defined in the TLS package.

    ValidityPeriodHours int
    Number of hours, after initial issuing, that the certificate will remain valid for.
    Algorithm Pulumi.TlsSelfSignedCert.Algorithm
    Name of the algorithm to use when generating the private key. Currently-supported values are RSA, ECDSA and ED25519 (default: RSA).
    AllowedUses List<Pulumi.TlsSelfSignedCert.AllowedUses>
    List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values: any_extended, cert_signing, client_auth, code_signing, content_commitment, crl_signing, data_encipherment, decipher_only, digital_signature, email_protection, encipher_only, ipsec_end_system, ipsec_tunnel, ipsec_user, key_agreement, key_encipherment, microsoft_commercial_code_signing, microsoft_kernel_code_signing, microsoft_server_gated_crypto, netscape_server_gated_crypto, ocsp_signing, server_auth, timestamping.
    DnsName string
    The DNS name for which a certificate is being requested (i.e. certificate subjects).
    EcdsaCurve Pulumi.TlsSelfSignedCert.EcdsaCurve
    When algorithm is ECDSA, the name of the elliptic curve to use. Currently-supported values are P224, P256, P384 or P521 (default: P224).
    IpAddress string
    The IP address for which a certificate is being requested (i.e. certificate subjects).
    RsaBits int
    When algorithm is RSA, the size of the generated RSA key, in bits (default: 2048).
    LocalValidityPeriodHours int
    Number of hours, after initial issuing, that the local certificate will remain valid for.
    Subject SelfSignedCertSubjectArgs

    The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.

    This type is defined in the TLS package.

    ValidityPeriodHours int
    Number of hours, after initial issuing, that the certificate will remain valid for.
    Algorithm Algorithm
    Name of the algorithm to use when generating the private key. Currently-supported values are RSA, ECDSA and ED25519 (default: RSA).
    AllowedUses []AllowedUses
    List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values: any_extended, cert_signing, client_auth, code_signing, content_commitment, crl_signing, data_encipherment, decipher_only, digital_signature, email_protection, encipher_only, ipsec_end_system, ipsec_tunnel, ipsec_user, key_agreement, key_encipherment, microsoft_commercial_code_signing, microsoft_kernel_code_signing, microsoft_server_gated_crypto, netscape_server_gated_crypto, ocsp_signing, server_auth, timestamping.
    DnsName string
    The DNS name for which a certificate is being requested (i.e. certificate subjects).
    EcdsaCurve EcdsaCurve
    When algorithm is ECDSA, the name of the elliptic curve to use. Currently-supported values are P224, P256, P384 or P521 (default: P224).
    IpAddress string
    The IP address for which a certificate is being requested (i.e. certificate subjects).
    RsaBits int
    When algorithm is RSA, the size of the generated RSA key, in bits (default: 2048).
    localValidityPeriodHours Integer
    Number of hours, after initial issuing, that the local certificate will remain valid for.
    subject SelfSignedCertSubject

    The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.

    This type is defined in the TLS package.

    validityPeriodHours Integer
    Number of hours, after initial issuing, that the certificate will remain valid for.
    algorithm Algorithm
    Name of the algorithm to use when generating the private key. Currently-supported values are RSA, ECDSA and ED25519 (default: RSA).
    allowedUses List<AllowedUses>
    List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values: any_extended, cert_signing, client_auth, code_signing, content_commitment, crl_signing, data_encipherment, decipher_only, digital_signature, email_protection, encipher_only, ipsec_end_system, ipsec_tunnel, ipsec_user, key_agreement, key_encipherment, microsoft_commercial_code_signing, microsoft_kernel_code_signing, microsoft_server_gated_crypto, netscape_server_gated_crypto, ocsp_signing, server_auth, timestamping.
    dnsName String
    The DNS name for which a certificate is being requested (i.e. certificate subjects).
    ecdsaCurve EcdsaCurve
    When algorithm is ECDSA, the name of the elliptic curve to use. Currently-supported values are P224, P256, P384 or P521 (default: P224).
    ipAddress String
    The IP address for which a certificate is being requested (i.e. certificate subjects).
    rsaBits Integer
    When algorithm is RSA, the size of the generated RSA key, in bits (default: 2048).
    localValidityPeriodHours number
    Number of hours, after initial issuing, that the local certificate will remain valid for.
    subject pulumiTlstypesinputSelfSignedCertSubject

    The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.

    This type is defined in the TLS package.

    validityPeriodHours number
    Number of hours, after initial issuing, that the certificate will remain valid for.
    algorithm Algorithm
    Name of the algorithm to use when generating the private key. Currently-supported values are RSA, ECDSA and ED25519 (default: RSA).
    allowedUses AllowedUses[]
    List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values: any_extended, cert_signing, client_auth, code_signing, content_commitment, crl_signing, data_encipherment, decipher_only, digital_signature, email_protection, encipher_only, ipsec_end_system, ipsec_tunnel, ipsec_user, key_agreement, key_encipherment, microsoft_commercial_code_signing, microsoft_kernel_code_signing, microsoft_server_gated_crypto, netscape_server_gated_crypto, ocsp_signing, server_auth, timestamping.
    dnsName string
    The DNS name for which a certificate is being requested (i.e. certificate subjects).
    ecdsaCurve EcdsaCurve
    When algorithm is ECDSA, the name of the elliptic curve to use. Currently-supported values are P224, P256, P384 or P521 (default: P224).
    ipAddress string
    The IP address for which a certificate is being requested (i.e. certificate subjects).
    rsaBits number
    When algorithm is RSA, the size of the generated RSA key, in bits (default: 2048).
    local_validity_period_hours int
    Number of hours, after initial issuing, that the local certificate will remain valid for.
    subject pulumi_tls.SelfSignedCertSubjectArgs

    The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.

    This type is defined in the TLS package.

    validity_period_hours int
    Number of hours, after initial issuing, that the certificate will remain valid for.
    algorithm Algorithm
    Name of the algorithm to use when generating the private key. Currently-supported values are RSA, ECDSA and ED25519 (default: RSA).
    allowed_uses Sequence[AllowedUses]
    List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values: any_extended, cert_signing, client_auth, code_signing, content_commitment, crl_signing, data_encipherment, decipher_only, digital_signature, email_protection, encipher_only, ipsec_end_system, ipsec_tunnel, ipsec_user, key_agreement, key_encipherment, microsoft_commercial_code_signing, microsoft_kernel_code_signing, microsoft_server_gated_crypto, netscape_server_gated_crypto, ocsp_signing, server_auth, timestamping.
    dns_name str
    The DNS name for which a certificate is being requested (i.e. certificate subjects).
    ecdsa_curve EcdsaCurve
    When algorithm is ECDSA, the name of the elliptic curve to use. Currently-supported values are P224, P256, P384 or P521 (default: P224).
    ip_address str
    The IP address for which a certificate is being requested (i.e. certificate subjects).
    rsa_bits int
    When algorithm is RSA, the size of the generated RSA key, in bits (default: 2048).
    localValidityPeriodHours Number
    Number of hours, after initial issuing, that the local certificate will remain valid for.
    subject Property Map

    The subject for which a certificate is being requested. The acceptable arguments are all optional and their naming is based upon Issuer Distinguished Names (RFC5280) section.

    This type is defined in the TLS package.

    validityPeriodHours Number
    Number of hours, after initial issuing, that the certificate will remain valid for.
    algorithm "RSA" | "ECDSA" | "ED25519"
    Name of the algorithm to use when generating the private key. Currently-supported values are RSA, ECDSA and ED25519 (default: RSA).
    allowedUses List<"any_extended" | "cert_signing" | "client_auth" | "code_signing" | "content_commitment" | "crl_signing" | "data_encipherment" | "decipher_only" | "digital_signature" | "email_protection" | "encipher_only" | "ipsec_end_system" | "ipsec_tunnel" | "ipsec_user" | "key_agreement" | "key_encipherment" | "microsoft_commercial_code_signing" | "microsoft_kernel_code_signing" | "microsoft_server_gated_crypto" | "netscape_server_gated_crypto" | "ocsp_signing" | "server_auth" | "timestamping">
    List of key usages allowed for the issued certificate. Values are defined in RFC 5280 and combine flags defined by both Key Usages and Extended Key Usages. Accepted values: any_extended, cert_signing, client_auth, code_signing, content_commitment, crl_signing, data_encipherment, decipher_only, digital_signature, email_protection, encipher_only, ipsec_end_system, ipsec_tunnel, ipsec_user, key_agreement, key_encipherment, microsoft_commercial_code_signing, microsoft_kernel_code_signing, microsoft_server_gated_crypto, netscape_server_gated_crypto, ocsp_signing, server_auth, timestamping.
    dnsName String
    The DNS name for which a certificate is being requested (i.e. certificate subjects).
    ecdsaCurve "P224" | "P256" | "P384" | "P521"
    When algorithm is ECDSA, the name of the elliptic curve to use. Currently-supported values are P224, P256, P384 or P521 (default: P224).
    ipAddress String
    The IP address for which a certificate is being requested (i.e. certificate subjects).
    rsaBits Number
    When algorithm is RSA, the size of the generated RSA key, in bits (default: 2048).

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SelfSignedCertificate resource produces the following output properties:

    CaCert string
    Your self signed cert.
    Pem string
    The PEM of your self signed cert.
    PrivateKey string
    The private key of your self signed cert.
    CaCert string
    Your self signed cert.
    Pem string
    The PEM of your self signed cert.
    PrivateKey string
    The private key of your self signed cert.
    caCert String
    Your self signed cert.
    pem String
    The PEM of your self signed cert.
    privateKey String
    The private key of your self signed cert.
    caCert string
    Your self signed cert.
    pem string
    The PEM of your self signed cert.
    privateKey string
    The private key of your self signed cert.
    ca_cert str
    Your self signed cert.
    pem str
    The PEM of your self signed cert.
    private_key str
    The private key of your self signed cert.
    caCert String
    Your self signed cert.
    pem String
    The PEM of your self signed cert.
    privateKey String
    The private key of your self signed cert.

    Supporting Types

    Algorithm, AlgorithmArgs

    RSA
    RSA
    ECDSA
    ECDSA
    ED25519
    ED25519
    AlgorithmRSA
    RSA
    AlgorithmECDSA
    ECDSA
    AlgorithmED25519
    ED25519
    RSA
    RSA
    ECDSA
    ECDSA
    ED25519
    ED25519
    RSA
    RSA
    ECDSA
    ECDSA
    ED25519
    ED25519
    RSA
    RSA
    ECDSA
    ECDSA
    ED25519
    ED25519
    "RSA"
    RSA
    "ECDSA"
    ECDSA
    "ED25519"
    ED25519

    AllowedUses, AllowedUsesArgs

    Any_extended
    any_extended
    Cert_signing
    cert_signing
    Client_auth
    client_auth
    Code_signing
    code_signing
    Content_commitment
    content_commitment
    Crl_signing
    crl_signing
    Data_encipherment
    data_encipherment
    Decipher_only
    decipher_only
    Digital_signature
    digital_signature
    Email_protection
    email_protection
    Encipher_only
    encipher_only
    Ipsec_end_system
    ipsec_end_system
    Ipsec_tunnel
    ipsec_tunnel
    Ipsec_user
    ipsec_user
    Key_agreement
    key_agreement
    Key_encipherment
    key_encipherment
    Microsoft_commercial_code_signing
    microsoft_commercial_code_signing
    Microsoft_kernel_code_signing
    microsoft_kernel_code_signing
    Microsoft_server_gated_crypto
    microsoft_server_gated_crypto
    Netscape_server_gated_crypto
    netscape_server_gated_crypto
    Ocsp_signing
    ocsp_signing
    Server_auth
    server_auth
    Timestamping
    timestamping
    AllowedUses_Any_extended
    any_extended
    AllowedUses_Cert_signing
    cert_signing
    AllowedUses_Client_auth
    client_auth
    AllowedUses_Code_signing
    code_signing
    AllowedUses_Content_commitment
    content_commitment
    AllowedUses_Crl_signing
    crl_signing
    AllowedUses_Data_encipherment
    data_encipherment
    AllowedUses_Decipher_only
    decipher_only
    AllowedUses_Digital_signature
    digital_signature
    AllowedUses_Email_protection
    email_protection
    AllowedUses_Encipher_only
    encipher_only
    AllowedUses_Ipsec_end_system
    ipsec_end_system
    AllowedUses_Ipsec_tunnel
    ipsec_tunnel
    AllowedUses_Ipsec_user
    ipsec_user
    AllowedUses_Key_agreement
    key_agreement
    AllowedUses_Key_encipherment
    key_encipherment
    AllowedUses_Microsoft_commercial_code_signing
    microsoft_commercial_code_signing
    AllowedUses_Microsoft_kernel_code_signing
    microsoft_kernel_code_signing
    AllowedUses_Microsoft_server_gated_crypto
    microsoft_server_gated_crypto
    AllowedUses_Netscape_server_gated_crypto
    netscape_server_gated_crypto
    AllowedUses_Ocsp_signing
    ocsp_signing
    AllowedUses_Server_auth
    server_auth
    AllowedUsesTimestamping
    timestamping
    Any_extended
    any_extended
    Cert_signing
    cert_signing
    Client_auth
    client_auth
    Code_signing
    code_signing
    Content_commitment
    content_commitment
    Crl_signing
    crl_signing
    Data_encipherment
    data_encipherment
    Decipher_only
    decipher_only
    Digital_signature
    digital_signature
    Email_protection
    email_protection
    Encipher_only
    encipher_only
    Ipsec_end_system
    ipsec_end_system
    Ipsec_tunnel
    ipsec_tunnel
    Ipsec_user
    ipsec_user
    Key_agreement
    key_agreement
    Key_encipherment
    key_encipherment
    Microsoft_commercial_code_signing
    microsoft_commercial_code_signing
    Microsoft_kernel_code_signing
    microsoft_kernel_code_signing
    Microsoft_server_gated_crypto
    microsoft_server_gated_crypto
    Netscape_server_gated_crypto
    netscape_server_gated_crypto
    Ocsp_signing
    ocsp_signing
    Server_auth
    server_auth
    Timestamping
    timestamping
    Any_extended
    any_extended
    Cert_signing
    cert_signing
    Client_auth
    client_auth
    Code_signing
    code_signing
    Content_commitment
    content_commitment
    Crl_signing
    crl_signing
    Data_encipherment
    data_encipherment
    Decipher_only
    decipher_only
    Digital_signature
    digital_signature
    Email_protection
    email_protection
    Encipher_only
    encipher_only
    Ipsec_end_system
    ipsec_end_system
    Ipsec_tunnel
    ipsec_tunnel
    Ipsec_user
    ipsec_user
    Key_agreement
    key_agreement
    Key_encipherment
    key_encipherment
    Microsoft_commercial_code_signing
    microsoft_commercial_code_signing
    Microsoft_kernel_code_signing
    microsoft_kernel_code_signing
    Microsoft_server_gated_crypto
    microsoft_server_gated_crypto
    Netscape_server_gated_crypto
    netscape_server_gated_crypto
    Ocsp_signing
    ocsp_signing
    Server_auth
    server_auth
    Timestamping
    timestamping
    ANY_EXTENDED
    any_extended
    CERT_SIGNING
    cert_signing
    CLIENT_AUTH
    client_auth
    CODE_SIGNING
    code_signing
    CONTENT_COMMITMENT
    content_commitment
    CRL_SIGNING
    crl_signing
    DATA_ENCIPHERMENT
    data_encipherment
    DECIPHER_ONLY
    decipher_only
    DIGITAL_SIGNATURE
    digital_signature
    EMAIL_PROTECTION
    email_protection
    ENCIPHER_ONLY
    encipher_only
    IPSEC_END_SYSTEM
    ipsec_end_system
    IPSEC_TUNNEL
    ipsec_tunnel
    IPSEC_USER
    ipsec_user
    KEY_AGREEMENT
    key_agreement
    KEY_ENCIPHERMENT
    key_encipherment
    MICROSOFT_COMMERCIAL_CODE_SIGNING
    microsoft_commercial_code_signing
    MICROSOFT_KERNEL_CODE_SIGNING
    microsoft_kernel_code_signing
    MICROSOFT_SERVER_GATED_CRYPTO
    microsoft_server_gated_crypto
    NETSCAPE_SERVER_GATED_CRYPTO
    netscape_server_gated_crypto
    OCSP_SIGNING
    ocsp_signing
    SERVER_AUTH
    server_auth
    TIMESTAMPING
    timestamping
    "any_extended"
    any_extended
    "cert_signing"
    cert_signing
    "client_auth"
    client_auth
    "code_signing"
    code_signing
    "content_commitment"
    content_commitment
    "crl_signing"
    crl_signing
    "data_encipherment"
    data_encipherment
    "decipher_only"
    decipher_only
    "digital_signature"
    digital_signature
    "email_protection"
    email_protection
    "encipher_only"
    encipher_only
    "ipsec_end_system"
    ipsec_end_system
    "ipsec_tunnel"
    ipsec_tunnel
    "ipsec_user"
    ipsec_user
    "key_agreement"
    key_agreement
    "key_encipherment"
    key_encipherment
    "microsoft_commercial_code_signing"
    microsoft_commercial_code_signing
    "microsoft_kernel_code_signing"
    microsoft_kernel_code_signing
    "microsoft_server_gated_crypto"
    microsoft_server_gated_crypto
    "netscape_server_gated_crypto"
    netscape_server_gated_crypto
    "ocsp_signing"
    ocsp_signing
    "server_auth"
    server_auth
    "timestamping"
    timestamping

    EcdsaCurve, EcdsaCurveArgs

    P224
    P224
    P256
    P256
    P384
    P384
    P521
    P521
    EcdsaCurveP224
    P224
    EcdsaCurveP256
    P256
    EcdsaCurveP384
    P384
    EcdsaCurveP521
    P521
    P224
    P224
    P256
    P256
    P384
    P384
    P521
    P521
    P224
    P224
    P256
    P256
    P384
    P384
    P521
    P521
    P224
    P224
    P256
    P256
    P384
    P384
    P521
    P521
    "P224"
    P224
    "P256"
    P256
    "P384"
    P384
    "P521"
    P521

    Package Details

    Repository
    tls-self-signed-cert
    License
    tls-self-signed-cert logo
    Self Signed Certificate v0.1.3 published on Monday, Jan 9, 2023 by Pulumi