mirror of
https://github.com/fleetdm/fleet
synced 2026-05-23 08:58:41 +00:00
Best practice Hydrant certificates (#34465)
Feedback from `customer-cisneros` on 2025-10-17
This commit is contained in:
parent
304d581d87
commit
2f8f268073
1 changed files with 2 additions and 1 deletions
|
|
@ -466,7 +466,8 @@ jq -r .certificate response.json > /opt/company/certificate.pem
|
|||
|
||||
This script assumes that your company installs a custom Company Portal app or something similar at `/opt/company`, gathers the user's IdP session information, uses username and a password to protect the private key from `/opt/company/userinfo`, and installs that the certificate in `/opt/company`. You will want to modify it to match your company's requirements.
|
||||
|
||||
The `userinfo` file in the scripts looks like the below. However, the variables could be loaded from the output of a command or even a separate network request depending on your requirements:
|
||||
For simplicity, the scripts use a `userinfo` file (below). However, the best practice is to load variables from the output of a command or even a separate network request:
|
||||
|
||||
```shell
|
||||
PASSWORD="<Password-for-the-certificate-private-key>"
|
||||
USERNAME="<End-user-email>"
|
||||
|
|
|
|||
Loading…
Reference in a new issue