From 6108d9c3a9de8f7d8933406106fbac3cdf99a78e Mon Sep 17 00:00:00 2001 From: Hayden Roszell Date: Wed, 3 Jul 2024 20:06:02 +0100 Subject: [PATCH] chore(docs): Translate doc structure for compatibility with doctool and upgrade bootstrap workflow --- ...low.yml => keyfactor-release-workflow.yml} | 5 +- README.md | 179 +++++++----------- docs/gcpcertmgr.md | 116 ++++++++++++ docsource/gcpcertmgr.md | 14 ++ docsource/overview.md | 8 + integration-manifest.json | 139 ++++++-------- 6 files changed, 271 insertions(+), 190 deletions(-) rename .github/workflows/{keyfactor-bootstrap-workflow.yml => keyfactor-release-workflow.yml} (78%) create mode 100644 docs/gcpcertmgr.md create mode 100644 docsource/gcpcertmgr.md create mode 100644 docsource/overview.md diff --git a/.github/workflows/keyfactor-bootstrap-workflow.yml b/.github/workflows/keyfactor-release-workflow.yml similarity index 78% rename from .github/workflows/keyfactor-bootstrap-workflow.yml rename to .github/workflows/keyfactor-release-workflow.yml index 6d8de53..3071ff4 100644 --- a/.github/workflows/keyfactor-bootstrap-workflow.yml +++ b/.github/workflows/keyfactor-release-workflow.yml @@ -1,4 +1,4 @@ -name: Keyfactor Bootstrap Workflow +name: Keyfactor Release Workflow on: workflow_dispatch: @@ -11,9 +11,10 @@ on: jobs: call-starter-workflow: - uses: keyfactor/actions/.github/workflows/starter.yml@v2 + uses: keyfactor/actions/.github/workflows/starter.yml@v3 secrets: token: ${{ secrets.V2BUILDTOKEN}} APPROVE_README_PUSH: ${{ secrets.APPROVE_README_PUSH}} gpg_key: ${{ secrets.KF_GPG_PRIVATE_KEY }} gpg_pass: ${{ secrets.KF_GPG_PASSPHRASE }} + \ No newline at end of file diff --git a/README.md b/README.md index 436f000..dff2428 100644 --- a/README.md +++ b/README.md @@ -1,145 +1,102 @@ +

+ Google Cloud Provider Certificate Manager Universal Orchestrator Extension +

-# Google Cloud Provider Certificate Manager +

+ +Integration Status: production +Release +Issues +GitHub Downloads (all assets, all releases) +

-Google Certificate Manager Orchestrator for Add, Remove and Inventory. +

+ + + Support + + · + + Installation + + · + + License + + · + + Related Integrations + +

-#### Integration status: Production - Ready for use in production environments. -## About the Keyfactor Universal Orchestrator Extension +## Overview -This repository contains a Universal Orchestrator Extension which is a plugin to the Keyfactor Universal Orchestrator. Within the Keyfactor Platform, Orchestrators are used to manage “certificate stores” — collections of certificates and roots of trust that are found within and used by various applications. +The Google Cloud Provider (GCP) Certificate Manager Universal Orchestrator extension remotely manages certificates on the Google Cloud Platform Certificate Manager product. This extension facilitates three job types: Inventory, Management Add, and Management Remove. It supports adding certificates with private keys only. -The Universal Orchestrator is part of the Keyfactor software distribution and is available via the Keyfactor customer portal. For general instructions on installing Extensions, see the “Keyfactor Command Orchestrator Installation and Configuration Guide” section of the Keyfactor documentation. For configuration details of this specific Extension see below in this readme. +In the context of the GCP Certificate Manager, certificates are used to secure communications and authenticate identities for various services and applications. The GCP Certificate Manager simplifies the process of provisioning, managing, and deploying SSL/TLS certificates. -The Universal Orchestrator is the successor to the Windows Orchestrator. This Orchestrator Extension plugin only works with the Universal Orchestrator and does not work with the Windows Orchestrator. +Defined Certificate Stores of the Certificate Store Type represent a logical grouping or container of certificates that reside on the remote platform, in this case, the Google Cloud Platform. These Certificate Stores can include unbound certificates as well as certificates bound to existing map entries, enabling streamlined management of your certificates in the cloud environment. -## Support for Google Cloud Provider Certificate Manager +## Compatibility -Google Cloud Provider Certificate Manager is supported by Keyfactor for Keyfactor customers. If you have a support issue, please open a support ticket via the Keyfactor Support Portal at https://support.keyfactor.com +This integration is compatible with Keyfactor Universal Orchestrator version 10.4.1 and later. -###### To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, use the **[Pull requests](../../pulls)** tab. +## Support +The Google Cloud Provider Certificate Manager Universal Orchestrator extension is supported by Keyfactor for Keyfactor customers. If you have a support issue, please open a support ticket with your Keyfactor representative. If you have a support issue, please open a support ticket via the Keyfactor Support Portal at https://support.keyfactor.com. + +> To report a problem or suggest a new feature, use the **[Issues](../../issues)** tab. If you want to contribute actual bug fixes or proposed enhancements, use the **[Pull requests](../../pulls)** tab. ---- +## Installation +Before installing the Google Cloud Provider Certificate Manager Universal Orchestrator extension, it's recommended to install [kfutil](https://github.com/Keyfactor/kfutil). Kfutil is a command-line tool that simplifies the process of creating store types, installing extensions, and instantiating certificate stores in Keyfactor Command. ---- +1. Follow the [requirements section](docs/gcpcertmgr.md#requirements) to configure a Service Account and grant necessary API permissions. +
Requirements + No requirements found -## Keyfactor Version Supported -The minimum version of the Keyfactor Universal Orchestrator Framework needed to run this version of the extension is 10.4.1 -## Platform Specific Notes -The Keyfactor Universal Orchestrator may be installed on either Windows or Linux based platforms. The certificate operations supported by a capability may vary based what platform the capability is installed on. The table below indicates what capabilities are supported based on which platform the encompassing Universal Orchestrator is running. -| Operation | Win | Linux | -|-----|-----|------| -|Supports Management Add|✓ |✓ | -|Supports Management Remove|✓ |✓ | -|Supports Create Store| | | -|Supports Discovery| | | -|Supports Reenrollment| | | -|Supports Inventory|✓ |✓ | +
+2. Create Certificate Store Types for the Google Cloud Provider Certificate Manager Orchestrator extension. + * **Using kfutil**: + ```shell + # GCP Certificate Manager + kfutil store-types create GcpCertMgr + ``` + * **Manually**: + * [GCP Certificate Manager](docs/gcpcertmgr.md#certificate-store-type-configuration) ---- +3. Install the Google Cloud Provider Certificate Manager Universal Orchestrator extension. + + * **Using kfutil**: On the server that that hosts the Universal Orchestrator, run the following command: + ```shell + # Windows Server + kfutil orchestrator extension -e gcp-certmanager-orchestrator@latest --out "C:\Program Files\Keyfactor\Keyfactor Orchestrator\extensions" -## Google Cloud Platform Certificate Manager + # Linux + kfutil orchestrator extension -e gcp-certmanager-orchestrator@latest --out "/opt/keyfactor/orchestrator/extensions" + ``` -**Overview** + * **Manually**: Follow the [official Command documentation](https://software.keyfactor.com/Core-OnPrem/Current/Content/InstallingAgents/NetCoreOrchestrator/CustomExtensions.htm?Highlight=extensions) to install the latest [Google Cloud Provider Certificate Manager Universal Orchestrator extension](https://github.com/Keyfactor/gcp-certmanager-orchestrator/releases/latest). -The GCP Certificate Manager Orchestrator Extension remotely manages certificates on the Google Cloud Platform Certificate Manager Product +4. Create new certificate stores in Keyfactor Command for the Sample Universal Orchestrator extension. -This orchestrator extension implements three job types – Inventory, Management Add, and Management Remove. Below are the steps necessary to configure this Orchestrator Extension. It supports adding certificates with private keys only. The GCP Certificate Manager Orchestrator Extension supports the replacement of unbound certificates as well as certificates bound to existing map entries, but it does **not** support specifying map entry bindings when adding new certificates. + * [GCP Certificate Manager](docs/gcpcertmgr.md#certificate-store-configuration) -**Google Cloud Configuration** -1. Read up on [Google Certificate Manager](https://cloud.google.com/certificate-manager/docs) and how it works. +## License -2. Either a Google Service Account is needed with the following permissions (Note: Workload Identity Management Should be used but at the time of the writing it was not available in the .net library yet), or the virtual machine running the Keyfactor Orchestrator Service must reside within Google Cloud. -![](images/ServiceAccountSettings.gif) - -3. The following Api Access is needed: -![](images/ApiAccessNeeded.gif) - -4. If authenticating via service account, download the Json Credential file as shown below: -![](images/GoogleKeyJsonDownload.gif) - - -## Keyfactor Command Configuration - -**1. Create the New Certificate Store Type for the GCP Certificate Manager Orchestrator** - -In Keyfactor Command create a new Certificate Store Type similar to the one below: - -#### STORE TYPE CONFIGURATION -SETTING TAB | CONFIG ELEMENT | DESCRIPTION -------|-----------|------------------ -Basic |Name |Descriptive name for the Store Type. Example: Google Cloud Certificate Manager -Basic |Short Name |The name that identifies the registered functionality of the orchestrator. Must be GcpCertMgr -Basic |Custom Capability|Unchecked -Basic |Job Types |Inventory, Add, and Remove are the supported job types -Basic |Needs Server |Unchecked -Basic |Blueprint Allowed |Unchecked -Basic |Requires Store Password |Unchecked -Basic |Supports Entry Password |Unchecked -Advanced |Store Path Type| Fixed -Advanced |Store Path Type Value (the textbox that appears below Store Path Type when Store Path Type is set to "Fixed") |n/a -Advanced |Supports Custom Alias |Required -Advanced |Private Key Handling |Required -Advanced |PFX Password Style |Default -Custom Fields|Google Cloud Platform Project Location/Region|Name:Location, Display Name:Location, Type:String, Default Value:global, Required:False -Custom Fields|The file name of the Google Cloud Service Account Key File installed in the same folder as the orchestrator extension. Empty if the orchestrator server resides in GCP and you are not using a service account key |Name:Service Account Key File Name, Type:String, Default Value: (leave blank), Required:True -Entry Parameters|N/A| There are no Entry Parameters - -**Basic Settings:** - -![](images/CertStoreType-Basic.gif) - -**Advanced Settings:** - -![](images/CertStoreType-Advanced.gif) - -**Custom Fields:** - -![](images/CertStoreType-CustomFields.gif) -![](images/CertStoreType-CustomField-Location.gif) -![](images/CertStoreType-CustomField-ServiceAccountKey.gif) - -**Entry Params:** - -![](images/CertStoreType-EntryParameters.gif) - -**2. Register the GCP Certificate Manager Orchestrator with Keyfactor** -See Keyfactor InstallingKeyfactorOrchestrators.pdf Documentation. Get from your Keyfactor contact/representative. - -**3. Create a GCP Certificate Manager Certificate Store within Keyfactor Command** -In Keyfactor Command create a new Certificate Store similar to the one below - -![](images/CertStoreSettings.gif) - -#### STORE CONFIGURATION -CONFIG ELEMENT |DESCRIPTION -----------------|--------------- -Category |The type of certificate store to be configured. Select category based on the display name configured above "GCP Certificate Manager". -Container |This is a logical grouping of like stores. This configuration is optional and does not impact the functionality of the store. -Client Machine |Your GCP Project ID for your account. -Store Path |This is not used and should be defaulted to n/a per the certificate store type set up. -Orchestrator |This is the orchestrator server registered with the appropriate capabilities to manage this certificate store type. -Location|**global** is the default but could be another region based on the project. -Service Account Key File Name | The name of the file containing the GCP Service Account JSON formatted key previously downloaded. Keep this optional field blank if the Keyfactor Orchestrator Service is running from an authenticated VM within Google Cloud. -Update Server User Name |Click and select No Value. -Update Server Password |Click and select No Value. -Use SSL |This should be checked. -Inventory Schedule |The interval that the system will use to report on what certificates are currently in the store. - - - -When creating cert store type manually, that store property names and entry parameter names are case sensitive +Apache License 2.0, see [LICENSE](LICENSE). +## Related Integrations +See all [Keyfactor Universal Orchestrator extensions](https://github.com/orgs/Keyfactor/repositories?q=orchestrator). \ No newline at end of file diff --git a/docs/gcpcertmgr.md b/docs/gcpcertmgr.md new file mode 100644 index 0000000..0b736de --- /dev/null +++ b/docs/gcpcertmgr.md @@ -0,0 +1,116 @@ +## GCP Certificate Manager + +The GCP Certificate Manager Certificate Store Type in Keyfactor Command enables the seamless management of SSL/TLS certificates on the Google Cloud Platform Certificate Manager product. This Certificate Store Type represents a logical grouping of certificates managed within the GCP environment. It allows for various management operations on these certificates, including Inventory, Management Add, and Management Remove jobs. + +One of the critical capabilities of this Certificate Store Type is the support for adding certificates with private keys, facilitating more secure communications and authentication within the cloud platform. However, there are significant caveats to be aware of — the GCP Certificate Manager Certificate Store Type supports the replacement of both unbound certificates and certificates bound to existing map entries, but it does not support specifying map entry bindings when adding new certificates. + +This Certificate Store Type leverages a Google Service Account for authentication, requiring specific permissions and API access. Depending on the setup, either a service account JSON credential file or a VM residing within Google Cloud is needed for proper authentication. Be sure to configure the required custom fields and settings as specified, to avoid potential issues and confusion during deployment. + +By adhering to these guidelines and understanding the limitations and capabilities, users can effectively manage their certificates within the GCP Certificate Manager environment using Keyfactor Command. + + + +### Supported Job Types + +| Job Name | Supported | +| -------- | --------- | +| Inventory | ✅ | +| Management Add | ✅ | +| Management Remove | ✅ | +| Discovery | ✅ | +| Create | ✅ | +| Reenrollment | | + +## Requirements + +No requirements found + + + +## Certificate Store Type Configuration + +The recommended method for creating the `GcpCertMgr` Certificate Store Type is to use [kfutil](https://github.com/Keyfactor/kfutil). After installing, use the following command to create the `` Certificate Store Type: + +```shell +kfutil store-types create GcpCertMgr +``` + +
GcpCertMgr + +Create a store type called `GcpCertMgr` with the attributes in the tables below: + +### Basic Tab +| Attribute | Value | Description | +| --------- | ----- | ----- | +| Name | GCP Certificate Manager | Display name for the store type (may be customized) | +| Short Name | GcpCertMgr | Short display name for the store type | +| Capability | GcpCertMgr | Store type name orchestrator will register with. Check the box to allow entry of value | +| Supported Job Types (check the box for each) | Add, Discovery, Remove | Job types the extension supports | +| Supports Add | ✅ | Check the box. Indicates that the Store Type supports Management Add | +| Supports Remove | ✅ | Check the box. Indicates that the Store Type supports Management Remove | +| Supports Discovery | ✅ | Check the box. Indicates that the Store Type supports Discovery | +| Supports Reenrollment | | Indicates that the Store Type supports Reenrollment | +| Supports Create | ✅ | Check the box. Indicates that the Store Type supports store creation | +| Needs Server | | Determines if a target server name is required when creating store | +| Blueprint Allowed | | Determines if store type may be included in an Orchestrator blueprint | +| Uses PowerShell | | Determines if underlying implementation is PowerShell | +| Requires Store Password | | Determines if a store password is required when configuring an individual store. | +| Supports Entry Password | | Determines if an individual entry within a store can have a password. | + +The Basic tab should look like this: + +![GcpCertMgr Basic Tab](../docsource/images/GcpCertMgr-basic-store-type-dialog.png) + +### Advanced Tab +| Attribute | Value | Description | +| --------- | ----- | ----- | +| Supports Custom Alias | Required | Determines if an individual entry within a store can have a custom Alias. | +| Private Key Handling | Required | This determines if Keyfactor can send the private key associated with a certificate to the store. Required because IIS certificates without private keys would be invalid. | +| PFX Password Style | Default | 'Default' - PFX password is randomly generated, 'Custom' - PFX password may be specified when the enrollment job is created (Requires the Allow Custom Password application setting to be enabled.) | + +The Advanced tab should look like this: + +![GcpCertMgr Advanced Tab](../docsource/images/GcpCertMgr-advanced-store-type-dialog.png) + +### Custom Fields Tab +Custom fields operate at the certificate store level and are used to control how the orchestrator connects to the remote target server containing the certificate store to be managed. The following custom fields should be added to the store type: + +| Name | Display Name | Type | Default Value/Options | Required | Description | +| ---- | ------------ | ---- | --------------------- | -------- | ----------- | + + +The Custom Fields tab should look like this: + +![GcpCertMgr Custom Fields Tab](../docsource/images/GcpCertMgr-custom-fields-store-type-dialog.png) + + + +
+ +## Certificate Store Configuration + +After creating the `GcpCertMgr` Certificate Store Type and installing the Google Cloud Provider Certificate Manager Universal Orchestrator extension, you can create new [Certificate Stores](https://software.keyfactor.com/Core-OnPrem/Current/Content/ReferenceGuide/Certificate%20Stores.htm?Highlight=certificate%20store) to manage certificates in the remote platform. + +The following table describes the required and optional fields for the `GcpCertMgr` certificate store type. + +| Attribute | Description | Attribute is PAM Eligible | +| --------- | ----------- | ------------------------- | +| Category | Select "GCP Certificate Manager" or the customized certificate store name from the previous step. | | +| Container | Optional container to associate certificate store with. | | +| Client Machine | For the Client Machine field, enter your GCP Project ID associated with your Google Cloud account. For example, you can use 'my-gcp-project-id' as the value. | | +| Store Path | For the Store Path field, enter 'n/a' as this field is not used for Certificate Stores of type 'GCP Certificate Manager'. | | +| Orchestrator | Select an approved orchestrator capable of managing `GcpCertMgr` certificates. Specifically, one with the `GcpCertMgr` capability. | | + +* **Using kfutil** + + ```shell + # Generate a CSV template for the AzureApp certificate store + kfutil stores import generate-template --store-type-name GcpCertMgr --outpath GcpCertMgr.csv + + # Open the CSV file and fill in the required fields for each certificate store. + + # Import the CSV file to create the certificate stores + kfutil stores import csv --store-type-name GcpCertMgr --file GcpCertMgr.csv + ``` + +* **Manually with the Command UI**: In Keyfactor Command, navigate to Certificate Stores from the Locations Menu. Click the Add button to create a new Certificate Store using the attributes in the table above. \ No newline at end of file diff --git a/docsource/gcpcertmgr.md b/docsource/gcpcertmgr.md new file mode 100644 index 0000000..96b2f6f --- /dev/null +++ b/docsource/gcpcertmgr.md @@ -0,0 +1,14 @@ +## Overview + +The GCP Certificate Manager Certificate Store Type in Keyfactor Command enables the seamless management of SSL/TLS certificates on the Google Cloud Platform Certificate Manager product. This Certificate Store Type represents a logical grouping of certificates managed within the GCP environment. It allows for various management operations on these certificates, including Inventory, Management Add, and Management Remove jobs. + +One of the critical capabilities of this Certificate Store Type is the support for adding certificates with private keys, facilitating more secure communications and authentication within the cloud platform. However, there are significant caveats to be aware of — the GCP Certificate Manager Certificate Store Type supports the replacement of both unbound certificates and certificates bound to existing map entries, but it does not support specifying map entry bindings when adding new certificates. + +This Certificate Store Type leverages a Google Service Account for authentication, requiring specific permissions and API access. Depending on the setup, either a service account JSON credential file or a VM residing within Google Cloud is needed for proper authentication. Be sure to configure the required custom fields and settings as specified, to avoid potential issues and confusion during deployment. + +By adhering to these guidelines and understanding the limitations and capabilities, users can effectively manage their certificates within the GCP Certificate Manager environment using Keyfactor Command. + +## Requirements + +No requirements found + diff --git a/docsource/overview.md b/docsource/overview.md new file mode 100644 index 0000000..d485558 --- /dev/null +++ b/docsource/overview.md @@ -0,0 +1,8 @@ +## Overview + +The Google Cloud Provider (GCP) Certificate Manager Universal Orchestrator extension remotely manages certificates on the Google Cloud Platform Certificate Manager product. This extension facilitates three job types: Inventory, Management Add, and Management Remove. It supports adding certificates with private keys only. + +In the context of the GCP Certificate Manager, certificates are used to secure communications and authenticate identities for various services and applications. The GCP Certificate Manager simplifies the process of provisioning, managing, and deploying SSL/TLS certificates. + +Defined Certificate Stores of the Certificate Store Type represent a logical grouping or container of certificates that reside on the remote platform, in this case, the Google Cloud Platform. These Certificate Stores can include unbound certificates as well as certificates bound to existing map entries, enabling streamlined management of your certificates in the cloud environment. + diff --git a/integration-manifest.json b/integration-manifest.json index a3ea0b9..7ba7efb 100644 --- a/integration-manifest.json +++ b/integration-manifest.json @@ -1,81 +1,66 @@ { - "$schema": "https://keyfactor.github.io/integration-manifest-schema.json", - "integration_type": "orchestrator", - "name": "Google Cloud Provider Certificate Manager", - "status": "production", - "update_catalog": false, - "support_level": "kf-supported", - "link_github": true, - "release_dir": "GcpCertManager/bin/release", - "description": "Google Certificate Manager Orchestrator for Add, Remove and Inventory.", - "about": { - "orchestrator": { - "UOFramework": "10.4.1", - "keyfactor_platform_version": "9.1.0", - "pam_support": false, - "win": { - "supportsCreateStore": false, - "supportsDiscovery": false, - "supportsManagementAdd": true, - "supportsManagementRemove": true, - "supportsReenrollment": false, - "supportsInventory": true, - "platformSupport": "Unused" - }, - "linux": { - "supportsCreateStore": false, - "supportsDiscovery": false, - "supportsManagementAdd": true, - "supportsManagementRemove": true, - "supportsReenrollment": false, - "supportsInventory": true, - "platformSupport": "Unused" - }, - "store_types": { - "GcpCertMgr": { - "Name": "GCP Certificate Manager", - "ShortName": "GcpCertMgr", - "Capability": "GcpCertMgr", - "ServerRequired": false, - "BlueprintAllowed": false, - "CustomAliasAllowed": "Required", - "PowerShell": false, - "PrivateKeyAllowed": "Required", - "StorePathType": "", - "StorePathValue": "n/a", - "SupportedOperations": { - "Add": true, - "Create": true, - "Discovery": true, - "Enrollment": false, - "Remove": true - }, - "PasswordOptions": { - "Style": "Default", - "EntrySupported": false, - "StoreRequired": false - }, - "Properties": [ - { - "Name": "Location", - "DisplayName": "Location", - "Type": "String", - "DependsOn": "", - "DefaultValue": "global", - "Required": true + "$schema": "/Users/hroszell/coding/dev/staff-tools/keyfactor.github.io/v2/integration-manifest-schema.json", + "integration_type": "orchestrator", + "name": "Google Cloud Provider Certificate Manager", + "status": "production", + "update_catalog": true, + "support_level": "kf-supported", + "link_github": true, + "release_dir": "GcpCertManager/bin/release", + "description": "Google Certificate Manager Orchestrator for Add, Remove and Inventory.", + "about": { + "orchestrator": { + "UOFramework": "10.4.1", + "keyfactor_platform_version": "9.1.0", + "pam_support": false, + "win": { + "supportsCreateStore": false, + "supportsDiscovery": false, + "supportsManagementAdd": true, + "supportsManagementRemove": true, + "supportsReenrollment": false, + "supportsInventory": true, + "platformSupport": "Unused" }, - { - "Name": "ServiceAccountKey", - "DisplayName": "Service Account Key File Path", - "Type": "String", - "DependsOn": "", - "DefaultValue": null, - "Required": false - } - ], - "EntryParameters": [] + "linux": { + "supportsCreateStore": false, + "supportsDiscovery": false, + "supportsManagementAdd": true, + "supportsManagementRemove": true, + "supportsReenrollment": false, + "supportsInventory": true, + "platformSupport": "Unused" + }, + "store_types": [ + { + "Name": "GCP Certificate Manager", + "ShortName": "GcpCertMgr", + "Capability": "GcpCertMgr", + "ServerRequired": false, + "BlueprintAllowed": false, + "CustomAliasAllowed": "Required", + "PowerShell": false, + "PrivateKeyAllowed": "Required", + "StorePathType": "", + "StorePathValue": "n/a", + "SupportedOperations": { + "Add": true, + "Create": true, + "Discovery": true, + "Enrollment": false, + "Remove": true + }, + "PasswordOptions": { + "Style": "Default", + "EntrySupported": false, + "StoreRequired": false + }, + "Properties": [], + "EntryParameters": [], + "ClientMachineDescription": "For the Client Machine field, enter your GCP Project ID associated with your Google Cloud account. For example, you can use 'my-gcp-project-id' as the value.", + "StorePathDescription": "For the Store Path field, enter 'n/a' as this field is not used for Certificate Stores of type 'GCP Certificate Manager'." + } + ] } - } } - } -} +} \ No newline at end of file