PcaConnectorAd / Client / update_template

update_template#

PcaConnectorAd.Client.update_template(**kwargs)#

Update template configuration to define the information included in certificates.

See also: AWS API Documentation

Request Syntax

response = client.update_template(
    Definition={
        'TemplateV2': {
            'CertificateValidity': {
                'RenewalPeriod': {
                    'Period': 123,
                    'PeriodType': 'HOURS'|'DAYS'|'WEEKS'|'MONTHS'|'YEARS'
                },
                'ValidityPeriod': {
                    'Period': 123,
                    'PeriodType': 'HOURS'|'DAYS'|'WEEKS'|'MONTHS'|'YEARS'
                }
            },
            'EnrollmentFlags': {
                'EnableKeyReuseOnNtTokenKeysetStorageFull': True|False,
                'IncludeSymmetricAlgorithms': True|False,
                'NoSecurityExtension': True|False,
                'RemoveInvalidCertificateFromPersonalStore': True|False,
                'UserInteractionRequired': True|False
            },
            'Extensions': {
                'ApplicationPolicies': {
                    'Critical': True|False,
                    'Policies': [
                        {
                            'PolicyObjectIdentifier': 'string',
                            'PolicyType': 'ALL_APPLICATION_POLICIES'|'ANY_PURPOSE'|'ATTESTATION_IDENTITY_KEY_CERTIFICATE'|'CERTIFICATE_REQUEST_AGENT'|'CLIENT_AUTHENTICATION'|'CODE_SIGNING'|'CTL_USAGE'|'DIGITAL_RIGHTS'|'DIRECTORY_SERVICE_EMAIL_REPLICATION'|'DISALLOWED_LIST'|'DNS_SERVER_TRUST'|'DOCUMENT_ENCRYPTION'|'DOCUMENT_SIGNING'|'DYNAMIC_CODE_GENERATOR'|'EARLY_LAUNCH_ANTIMALWARE_DRIVER'|'EMBEDDED_WINDOWS_SYSTEM_COMPONENT_VERIFICATION'|'ENCLAVE'|'ENCRYPTING_FILE_SYSTEM'|'ENDORSEMENT_KEY_CERTIFICATE'|'FILE_RECOVERY'|'HAL_EXTENSION'|'IP_SECURITY_END_SYSTEM'|'IP_SECURITY_IKE_INTERMEDIATE'|'IP_SECURITY_TUNNEL_TERMINATION'|'IP_SECURITY_USER'|'ISOLATED_USER_MODE'|'KDC_AUTHENTICATION'|'KERNEL_MODE_CODE_SIGNING'|'KEY_PACK_LICENSES'|'KEY_RECOVERY'|'KEY_RECOVERY_AGENT'|'LICENSE_SERVER_VERIFICATION'|'LIFETIME_SIGNING'|'MICROSOFT_PUBLISHER'|'MICROSOFT_TIME_STAMPING'|'MICROSOFT_TRUST_LIST_SIGNING'|'OCSP_SIGNING'|'OEM_WINDOWS_SYSTEM_COMPONENT_VERIFICATION'|'PLATFORM_CERTIFICATE'|'PREVIEW_BUILD_SIGNING'|'PRIVATE_KEY_ARCHIVAL'|'PROTECTED_PROCESS_LIGHT_VERIFICATION'|'PROTECTED_PROCESS_VERIFICATION'|'QUALIFIED_SUBORDINATION'|'REVOKED_LIST_SIGNER'|'ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION'|'ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION'|'ROOT_PROGRAM_NO_OSCP_FAILOVER_TO_CRL'|'ROOT_LIST_SIGNER'|'SECURE_EMAIL'|'SERVER_AUTHENTICATION'|'SMART_CARD_LOGIN'|'SPC_ENCRYPTED_DIGEST_RETRY_COUNT'|'SPC_RELAXED_PE_MARKER_CHECK'|'TIME_STAMPING'|'WINDOWS_HARDWARE_DRIVER_ATTESTED_VERIFICATION'|'WINDOWS_HARDWARE_DRIVER_EXTENDED_VERIFICATION'|'WINDOWS_HARDWARE_DRIVER_VERIFICATION'|'WINDOWS_HELLO_RECOVERY_KEY_ENCRYPTION'|'WINDOWS_KITS_COMPONENT'|'WINDOWS_RT_VERIFICATION'|'WINDOWS_SOFTWARE_EXTENSION_VERIFICATION'|'WINDOWS_STORE'|'WINDOWS_SYSTEM_COMPONENT_VERIFICATION'|'WINDOWS_TCB_COMPONENT'|'WINDOWS_THIRD_PARTY_APPLICATION_COMPONENT'|'WINDOWS_UPDATE'
                        },
                    ]
                },
                'KeyUsage': {
                    'Critical': True|False,
                    'UsageFlags': {
                        'DataEncipherment': True|False,
                        'DigitalSignature': True|False,
                        'KeyAgreement': True|False,
                        'KeyEncipherment': True|False,
                        'NonRepudiation': True|False
                    }
                }
            },
            'GeneralFlags': {
                'AutoEnrollment': True|False,
                'MachineType': True|False
            },
            'PrivateKeyAttributes': {
                'CryptoProviders': [
                    'string',
                ],
                'KeySpec': 'KEY_EXCHANGE'|'SIGNATURE',
                'MinimalKeyLength': 123
            },
            'PrivateKeyFlags': {
                'ClientVersion': 'WINDOWS_SERVER_2003'|'WINDOWS_SERVER_2008'|'WINDOWS_SERVER_2008_R2'|'WINDOWS_SERVER_2012'|'WINDOWS_SERVER_2012_R2'|'WINDOWS_SERVER_2016',
                'ExportableKey': True|False,
                'StrongKeyProtectionRequired': True|False
            },
            'SubjectNameFlags': {
                'RequireCommonName': True|False,
                'RequireDirectoryPath': True|False,
                'RequireDnsAsCn': True|False,
                'RequireEmail': True|False,
                'SanRequireDirectoryGuid': True|False,
                'SanRequireDns': True|False,
                'SanRequireDomainDns': True|False,
                'SanRequireEmail': True|False,
                'SanRequireSpn': True|False,
                'SanRequireUpn': True|False
            },
            'SupersededTemplates': [
                'string',
            ]
        },
        'TemplateV3': {
            'CertificateValidity': {
                'RenewalPeriod': {
                    'Period': 123,
                    'PeriodType': 'HOURS'|'DAYS'|'WEEKS'|'MONTHS'|'YEARS'
                },
                'ValidityPeriod': {
                    'Period': 123,
                    'PeriodType': 'HOURS'|'DAYS'|'WEEKS'|'MONTHS'|'YEARS'
                }
            },
            'EnrollmentFlags': {
                'EnableKeyReuseOnNtTokenKeysetStorageFull': True|False,
                'IncludeSymmetricAlgorithms': True|False,
                'NoSecurityExtension': True|False,
                'RemoveInvalidCertificateFromPersonalStore': True|False,
                'UserInteractionRequired': True|False
            },
            'Extensions': {
                'ApplicationPolicies': {
                    'Critical': True|False,
                    'Policies': [
                        {
                            'PolicyObjectIdentifier': 'string',
                            'PolicyType': 'ALL_APPLICATION_POLICIES'|'ANY_PURPOSE'|'ATTESTATION_IDENTITY_KEY_CERTIFICATE'|'CERTIFICATE_REQUEST_AGENT'|'CLIENT_AUTHENTICATION'|'CODE_SIGNING'|'CTL_USAGE'|'DIGITAL_RIGHTS'|'DIRECTORY_SERVICE_EMAIL_REPLICATION'|'DISALLOWED_LIST'|'DNS_SERVER_TRUST'|'DOCUMENT_ENCRYPTION'|'DOCUMENT_SIGNING'|'DYNAMIC_CODE_GENERATOR'|'EARLY_LAUNCH_ANTIMALWARE_DRIVER'|'EMBEDDED_WINDOWS_SYSTEM_COMPONENT_VERIFICATION'|'ENCLAVE'|'ENCRYPTING_FILE_SYSTEM'|'ENDORSEMENT_KEY_CERTIFICATE'|'FILE_RECOVERY'|'HAL_EXTENSION'|'IP_SECURITY_END_SYSTEM'|'IP_SECURITY_IKE_INTERMEDIATE'|'IP_SECURITY_TUNNEL_TERMINATION'|'IP_SECURITY_USER'|'ISOLATED_USER_MODE'|'KDC_AUTHENTICATION'|'KERNEL_MODE_CODE_SIGNING'|'KEY_PACK_LICENSES'|'KEY_RECOVERY'|'KEY_RECOVERY_AGENT'|'LICENSE_SERVER_VERIFICATION'|'LIFETIME_SIGNING'|'MICROSOFT_PUBLISHER'|'MICROSOFT_TIME_STAMPING'|'MICROSOFT_TRUST_LIST_SIGNING'|'OCSP_SIGNING'|'OEM_WINDOWS_SYSTEM_COMPONENT_VERIFICATION'|'PLATFORM_CERTIFICATE'|'PREVIEW_BUILD_SIGNING'|'PRIVATE_KEY_ARCHIVAL'|'PROTECTED_PROCESS_LIGHT_VERIFICATION'|'PROTECTED_PROCESS_VERIFICATION'|'QUALIFIED_SUBORDINATION'|'REVOKED_LIST_SIGNER'|'ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION'|'ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION'|'ROOT_PROGRAM_NO_OSCP_FAILOVER_TO_CRL'|'ROOT_LIST_SIGNER'|'SECURE_EMAIL'|'SERVER_AUTHENTICATION'|'SMART_CARD_LOGIN'|'SPC_ENCRYPTED_DIGEST_RETRY_COUNT'|'SPC_RELAXED_PE_MARKER_CHECK'|'TIME_STAMPING'|'WINDOWS_HARDWARE_DRIVER_ATTESTED_VERIFICATION'|'WINDOWS_HARDWARE_DRIVER_EXTENDED_VERIFICATION'|'WINDOWS_HARDWARE_DRIVER_VERIFICATION'|'WINDOWS_HELLO_RECOVERY_KEY_ENCRYPTION'|'WINDOWS_KITS_COMPONENT'|'WINDOWS_RT_VERIFICATION'|'WINDOWS_SOFTWARE_EXTENSION_VERIFICATION'|'WINDOWS_STORE'|'WINDOWS_SYSTEM_COMPONENT_VERIFICATION'|'WINDOWS_TCB_COMPONENT'|'WINDOWS_THIRD_PARTY_APPLICATION_COMPONENT'|'WINDOWS_UPDATE'
                        },
                    ]
                },
                'KeyUsage': {
                    'Critical': True|False,
                    'UsageFlags': {
                        'DataEncipherment': True|False,
                        'DigitalSignature': True|False,
                        'KeyAgreement': True|False,
                        'KeyEncipherment': True|False,
                        'NonRepudiation': True|False
                    }
                }
            },
            'GeneralFlags': {
                'AutoEnrollment': True|False,
                'MachineType': True|False
            },
            'HashAlgorithm': 'SHA256'|'SHA384'|'SHA512',
            'PrivateKeyAttributes': {
                'Algorithm': 'RSA'|'ECDH_P256'|'ECDH_P384'|'ECDH_P521',
                'CryptoProviders': [
                    'string',
                ],
                'KeySpec': 'KEY_EXCHANGE'|'SIGNATURE',
                'KeyUsageProperty': {
                    'PropertyFlags': {
                        'Decrypt': True|False,
                        'KeyAgreement': True|False,
                        'Sign': True|False
                    },
                    'PropertyType': 'ALL'
                },
                'MinimalKeyLength': 123
            },
            'PrivateKeyFlags': {
                'ClientVersion': 'WINDOWS_SERVER_2008'|'WINDOWS_SERVER_2008_R2'|'WINDOWS_SERVER_2012'|'WINDOWS_SERVER_2012_R2'|'WINDOWS_SERVER_2016',
                'ExportableKey': True|False,
                'RequireAlternateSignatureAlgorithm': True|False,
                'StrongKeyProtectionRequired': True|False
            },
            'SubjectNameFlags': {
                'RequireCommonName': True|False,
                'RequireDirectoryPath': True|False,
                'RequireDnsAsCn': True|False,
                'RequireEmail': True|False,
                'SanRequireDirectoryGuid': True|False,
                'SanRequireDns': True|False,
                'SanRequireDomainDns': True|False,
                'SanRequireEmail': True|False,
                'SanRequireSpn': True|False,
                'SanRequireUpn': True|False
            },
            'SupersededTemplates': [
                'string',
            ]
        },
        'TemplateV4': {
            'CertificateValidity': {
                'RenewalPeriod': {
                    'Period': 123,
                    'PeriodType': 'HOURS'|'DAYS'|'WEEKS'|'MONTHS'|'YEARS'
                },
                'ValidityPeriod': {
                    'Period': 123,
                    'PeriodType': 'HOURS'|'DAYS'|'WEEKS'|'MONTHS'|'YEARS'
                }
            },
            'EnrollmentFlags': {
                'EnableKeyReuseOnNtTokenKeysetStorageFull': True|False,
                'IncludeSymmetricAlgorithms': True|False,
                'NoSecurityExtension': True|False,
                'RemoveInvalidCertificateFromPersonalStore': True|False,
                'UserInteractionRequired': True|False
            },
            'Extensions': {
                'ApplicationPolicies': {
                    'Critical': True|False,
                    'Policies': [
                        {
                            'PolicyObjectIdentifier': 'string',
                            'PolicyType': 'ALL_APPLICATION_POLICIES'|'ANY_PURPOSE'|'ATTESTATION_IDENTITY_KEY_CERTIFICATE'|'CERTIFICATE_REQUEST_AGENT'|'CLIENT_AUTHENTICATION'|'CODE_SIGNING'|'CTL_USAGE'|'DIGITAL_RIGHTS'|'DIRECTORY_SERVICE_EMAIL_REPLICATION'|'DISALLOWED_LIST'|'DNS_SERVER_TRUST'|'DOCUMENT_ENCRYPTION'|'DOCUMENT_SIGNING'|'DYNAMIC_CODE_GENERATOR'|'EARLY_LAUNCH_ANTIMALWARE_DRIVER'|'EMBEDDED_WINDOWS_SYSTEM_COMPONENT_VERIFICATION'|'ENCLAVE'|'ENCRYPTING_FILE_SYSTEM'|'ENDORSEMENT_KEY_CERTIFICATE'|'FILE_RECOVERY'|'HAL_EXTENSION'|'IP_SECURITY_END_SYSTEM'|'IP_SECURITY_IKE_INTERMEDIATE'|'IP_SECURITY_TUNNEL_TERMINATION'|'IP_SECURITY_USER'|'ISOLATED_USER_MODE'|'KDC_AUTHENTICATION'|'KERNEL_MODE_CODE_SIGNING'|'KEY_PACK_LICENSES'|'KEY_RECOVERY'|'KEY_RECOVERY_AGENT'|'LICENSE_SERVER_VERIFICATION'|'LIFETIME_SIGNING'|'MICROSOFT_PUBLISHER'|'MICROSOFT_TIME_STAMPING'|'MICROSOFT_TRUST_LIST_SIGNING'|'OCSP_SIGNING'|'OEM_WINDOWS_SYSTEM_COMPONENT_VERIFICATION'|'PLATFORM_CERTIFICATE'|'PREVIEW_BUILD_SIGNING'|'PRIVATE_KEY_ARCHIVAL'|'PROTECTED_PROCESS_LIGHT_VERIFICATION'|'PROTECTED_PROCESS_VERIFICATION'|'QUALIFIED_SUBORDINATION'|'REVOKED_LIST_SIGNER'|'ROOT_PROGRAM_AUTO_UPDATE_CA_REVOCATION'|'ROOT_PROGRAM_AUTO_UPDATE_END_REVOCATION'|'ROOT_PROGRAM_NO_OSCP_FAILOVER_TO_CRL'|'ROOT_LIST_SIGNER'|'SECURE_EMAIL'|'SERVER_AUTHENTICATION'|'SMART_CARD_LOGIN'|'SPC_ENCRYPTED_DIGEST_RETRY_COUNT'|'SPC_RELAXED_PE_MARKER_CHECK'|'TIME_STAMPING'|'WINDOWS_HARDWARE_DRIVER_ATTESTED_VERIFICATION'|'WINDOWS_HARDWARE_DRIVER_EXTENDED_VERIFICATION'|'WINDOWS_HARDWARE_DRIVER_VERIFICATION'|'WINDOWS_HELLO_RECOVERY_KEY_ENCRYPTION'|'WINDOWS_KITS_COMPONENT'|'WINDOWS_RT_VERIFICATION'|'WINDOWS_SOFTWARE_EXTENSION_VERIFICATION'|'WINDOWS_STORE'|'WINDOWS_SYSTEM_COMPONENT_VERIFICATION'|'WINDOWS_TCB_COMPONENT'|'WINDOWS_THIRD_PARTY_APPLICATION_COMPONENT'|'WINDOWS_UPDATE'
                        },
                    ]
                },
                'KeyUsage': {
                    'Critical': True|False,
                    'UsageFlags': {
                        'DataEncipherment': True|False,
                        'DigitalSignature': True|False,
                        'KeyAgreement': True|False,
                        'KeyEncipherment': True|False,
                        'NonRepudiation': True|False
                    }
                }
            },
            'GeneralFlags': {
                'AutoEnrollment': True|False,
                'MachineType': True|False
            },
            'HashAlgorithm': 'SHA256'|'SHA384'|'SHA512',
            'PrivateKeyAttributes': {
                'Algorithm': 'RSA'|'ECDH_P256'|'ECDH_P384'|'ECDH_P521',
                'CryptoProviders': [
                    'string',
                ],
                'KeySpec': 'KEY_EXCHANGE'|'SIGNATURE',
                'KeyUsageProperty': {
                    'PropertyFlags': {
                        'Decrypt': True|False,
                        'KeyAgreement': True|False,
                        'Sign': True|False
                    },
                    'PropertyType': 'ALL'
                },
                'MinimalKeyLength': 123
            },
            'PrivateKeyFlags': {
                'ClientVersion': 'WINDOWS_SERVER_2012'|'WINDOWS_SERVER_2012_R2'|'WINDOWS_SERVER_2016',
                'ExportableKey': True|False,
                'RequireAlternateSignatureAlgorithm': True|False,
                'RequireSameKeyRenewal': True|False,
                'StrongKeyProtectionRequired': True|False,
                'UseLegacyProvider': True|False
            },
            'SubjectNameFlags': {
                'RequireCommonName': True|False,
                'RequireDirectoryPath': True|False,
                'RequireDnsAsCn': True|False,
                'RequireEmail': True|False,
                'SanRequireDirectoryGuid': True|False,
                'SanRequireDns': True|False,
                'SanRequireDomainDns': True|False,
                'SanRequireEmail': True|False,
                'SanRequireSpn': True|False,
                'SanRequireUpn': True|False
            },
            'SupersededTemplates': [
                'string',
            ]
        }
    },
    ReenrollAllCertificateHolders=True|False,
    TemplateArn='string'
)
Parameters:
  • Definition (dict) –

    Template configuration to define the information included in certificates. Define certificate validity and renewal periods, certificate request handling and enrollment options, key usage extensions, application policies, and cryptography settings.

    Note

    This is a Tagged Union structure. Only one of the following top level keys can be set: TemplateV2, TemplateV3, TemplateV4.

    • TemplateV2 (dict) –

      Template configuration to define the information included in certificates. Define certificate validity and renewal periods, certificate request handling and enrollment options, key usage extensions, application policies, and cryptography settings.

      • CertificateValidity (dict) – [REQUIRED]

        Certificate validity describes the validity and renewal periods of a certificate.

        • RenewalPeriod (dict) – [REQUIRED]

          Renewal period is the period of time before certificate expiration when a new certificate will be requested.

          • Period (integer) – [REQUIRED]

            The numeric value for the validity period.

          • PeriodType (string) – [REQUIRED]

            The unit of time. You can select hours, days, weeks, months, and years.

        • ValidityPeriod (dict) – [REQUIRED]

          Information describing the end of the validity period of the certificate. This parameter sets the “Not After” date for the certificate. Certificate validity is the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the certificate expires, or as a span of time after issuance, stated in days, months, or years. For more information, see Validity in RFC 5280. This value is unaffected when ValidityNotBefore is also specified. For example, if Validity is set to 20 days in the future, the certificate will expire 20 days from issuance time regardless of the ValidityNotBefore value.

          • Period (integer) – [REQUIRED]

            The numeric value for the validity period.

          • PeriodType (string) – [REQUIRED]

            The unit of time. You can select hours, days, weeks, months, and years.

      • EnrollmentFlags (dict) – [REQUIRED]

        Enrollment flags describe the enrollment settings for certificates such as using the existing private key and deleting expired or revoked certificates.

        • EnableKeyReuseOnNtTokenKeysetStorageFull (boolean) –

          Allow renewal using the same key.

        • IncludeSymmetricAlgorithms (boolean) –

          Include symmetric algorithms allowed by the subject.

        • NoSecurityExtension (boolean) –

          This flag instructs the CA to not include the security extension szOID_NTDS_CA_SECURITY_EXT (OID:1.3.6.1.4.1.311.25.2), as specified in [MS-WCCE] sections 2.2.2.7.7.4 and 3.2.2.6.2.1.4.5.9, in the issued certificate. This addresses a Windows Kerberos elevation-of-privilege vulnerability.

        • RemoveInvalidCertificateFromPersonalStore (boolean) –

          Delete expired or revoked certificates instead of archiving them.

        • UserInteractionRequired (boolean) –

          Require user interaction when the subject is enrolled and the private key associated with the certificate is used.

      • Extensions (dict) – [REQUIRED]

        Extensions describe the key usage extensions and application policies for a template.

        • ApplicationPolicies (dict) –

          Application policies specify what the certificate is used for and its purpose.

          • Critical (boolean) –

            Marks the application policy extension as critical.

          • Policies (list) – [REQUIRED]

            Application policies describe what the certificate can be used for.

            • (dict) –

              Application policies describe what the certificate can be used for.

              Note

              This is a Tagged Union structure. Only one of the following top level keys can be set: PolicyObjectIdentifier, PolicyType.

              • PolicyObjectIdentifier (string) –

                The object identifier (OID) of an application policy.

              • PolicyType (string) –

                The type of application policy

        • KeyUsage (dict) – [REQUIRED]

          The key usage extension defines the purpose (e.g., encipherment, signature, certificate signing) of the key contained in the certificate.

          • Critical (boolean) –

            Sets the key usage extension to critical.

          • UsageFlags (dict) – [REQUIRED]

            The key usage flags represent the purpose (e.g., encipherment, signature) of the key contained in the certificate.

            • DataEncipherment (boolean) –

              DataEncipherment is asserted when the subject public key is used for directly enciphering raw user data without the use of an intermediate symmetric cipher.

            • DigitalSignature (boolean) –

              The digitalSignature is asserted when the subject public key is used for verifying digital signatures.

            • KeyAgreement (boolean) –

              KeyAgreement is asserted when the subject public key is used for key agreement.

            • KeyEncipherment (boolean) –

              KeyEncipherment is asserted when the subject public key is used for enciphering private or secret keys, i.e., for key transport.

            • NonRepudiation (boolean) –

              NonRepudiation is asserted when the subject public key is used to verify digital signatures.

      • GeneralFlags (dict) – [REQUIRED]

        General flags describe whether the template is used for computers or users and if the template can be used with autoenrollment.

        • AutoEnrollment (boolean) –

          Allows certificate issuance using autoenrollment. Set to TRUE to allow autoenrollment.

        • MachineType (boolean) –

          Defines if the template is for machines or users. Set to TRUE if the template is for machines. Set to FALSE if the template is for users.

      • PrivateKeyAttributes (dict) – [REQUIRED]

        Private key attributes allow you to specify the minimal key length, key spec, and cryptographic providers for the private key of a certificate for v2 templates. V2 templates allow you to use Legacy Cryptographic Service Providers.

        • CryptoProviders (list) –

          Defines the cryptographic providers used to generate the private key.

          • (string) –

        • KeySpec (string) – [REQUIRED]

          Defines the purpose of the private key. Set it to “KEY_EXCHANGE” or “SIGNATURE” value.

        • MinimalKeyLength (integer) – [REQUIRED]

          Set the minimum key length of the private key.

      • PrivateKeyFlags (dict) – [REQUIRED]

        Private key flags for v2 templates specify the client compatibility, if the private key can be exported, and if user input is required when using a private key.

        • ClientVersion (string) – [REQUIRED]

          Defines the minimum client compatibility.

        • ExportableKey (boolean) –

          Allows the private key to be exported.

        • StrongKeyProtectionRequired (boolean) –

          Require user input when using the private key for enrollment.

      • SubjectNameFlags (dict) – [REQUIRED]

        Subject name flags describe the subject name and subject alternate name that is included in a certificate.

        • RequireCommonName (boolean) –

          Include the common name in the subject name.

        • RequireDirectoryPath (boolean) –

          Include the directory path in the subject name.

        • RequireDnsAsCn (boolean) –

          Include the DNS as common name in the subject name.

        • RequireEmail (boolean) –

          Include the subject’s email in the subject name.

        • SanRequireDirectoryGuid (boolean) –

          Include the globally unique identifier (GUID) in the subject alternate name.

        • SanRequireDns (boolean) –

          Include the DNS in the subject alternate name.

        • SanRequireDomainDns (boolean) –

          Include the domain DNS in the subject alternate name.

        • SanRequireEmail (boolean) –

          Include the subject’s email in the subject alternate name.

        • SanRequireSpn (boolean) –

          Include the service principal name (SPN) in the subject alternate name.

        • SanRequireUpn (boolean) –

          Include the user principal name (UPN) in the subject alternate name.

      • SupersededTemplates (list) –

        List of templates in Active Directory that are superseded by this template.

        • (string) –

    • TemplateV3 (dict) –

      Template configuration to define the information included in certificates. Define certificate validity and renewal periods, certificate request handling and enrollment options, key usage extensions, application policies, and cryptography settings.

      • CertificateValidity (dict) – [REQUIRED]

        Certificate validity describes the validity and renewal periods of a certificate.

        • RenewalPeriod (dict) – [REQUIRED]

          Renewal period is the period of time before certificate expiration when a new certificate will be requested.

          • Period (integer) – [REQUIRED]

            The numeric value for the validity period.

          • PeriodType (string) – [REQUIRED]

            The unit of time. You can select hours, days, weeks, months, and years.

        • ValidityPeriod (dict) – [REQUIRED]

          Information describing the end of the validity period of the certificate. This parameter sets the “Not After” date for the certificate. Certificate validity is the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the certificate expires, or as a span of time after issuance, stated in days, months, or years. For more information, see Validity in RFC 5280. This value is unaffected when ValidityNotBefore is also specified. For example, if Validity is set to 20 days in the future, the certificate will expire 20 days from issuance time regardless of the ValidityNotBefore value.

          • Period (integer) – [REQUIRED]

            The numeric value for the validity period.

          • PeriodType (string) – [REQUIRED]

            The unit of time. You can select hours, days, weeks, months, and years.

      • EnrollmentFlags (dict) – [REQUIRED]

        Enrollment flags describe the enrollment settings for certificates such as using the existing private key and deleting expired or revoked certificates.

        • EnableKeyReuseOnNtTokenKeysetStorageFull (boolean) –

          Allow renewal using the same key.

        • IncludeSymmetricAlgorithms (boolean) –

          Include symmetric algorithms allowed by the subject.

        • NoSecurityExtension (boolean) –

          This flag instructs the CA to not include the security extension szOID_NTDS_CA_SECURITY_EXT (OID:1.3.6.1.4.1.311.25.2), as specified in [MS-WCCE] sections 2.2.2.7.7.4 and 3.2.2.6.2.1.4.5.9, in the issued certificate. This addresses a Windows Kerberos elevation-of-privilege vulnerability.

        • RemoveInvalidCertificateFromPersonalStore (boolean) –

          Delete expired or revoked certificates instead of archiving them.

        • UserInteractionRequired (boolean) –

          Require user interaction when the subject is enrolled and the private key associated with the certificate is used.

      • Extensions (dict) – [REQUIRED]

        Extensions describe the key usage extensions and application policies for a template.

        • ApplicationPolicies (dict) –

          Application policies specify what the certificate is used for and its purpose.

          • Critical (boolean) –

            Marks the application policy extension as critical.

          • Policies (list) – [REQUIRED]

            Application policies describe what the certificate can be used for.

            • (dict) –

              Application policies describe what the certificate can be used for.

              Note

              This is a Tagged Union structure. Only one of the following top level keys can be set: PolicyObjectIdentifier, PolicyType.

              • PolicyObjectIdentifier (string) –

                The object identifier (OID) of an application policy.

              • PolicyType (string) –

                The type of application policy

        • KeyUsage (dict) – [REQUIRED]

          The key usage extension defines the purpose (e.g., encipherment, signature, certificate signing) of the key contained in the certificate.

          • Critical (boolean) –

            Sets the key usage extension to critical.

          • UsageFlags (dict) – [REQUIRED]

            The key usage flags represent the purpose (e.g., encipherment, signature) of the key contained in the certificate.

            • DataEncipherment (boolean) –

              DataEncipherment is asserted when the subject public key is used for directly enciphering raw user data without the use of an intermediate symmetric cipher.

            • DigitalSignature (boolean) –

              The digitalSignature is asserted when the subject public key is used for verifying digital signatures.

            • KeyAgreement (boolean) –

              KeyAgreement is asserted when the subject public key is used for key agreement.

            • KeyEncipherment (boolean) –

              KeyEncipherment is asserted when the subject public key is used for enciphering private or secret keys, i.e., for key transport.

            • NonRepudiation (boolean) –

              NonRepudiation is asserted when the subject public key is used to verify digital signatures.

      • GeneralFlags (dict) – [REQUIRED]

        General flags describe whether the template is used for computers or users and if the template can be used with autoenrollment.

        • AutoEnrollment (boolean) –

          Allows certificate issuance using autoenrollment. Set to TRUE to allow autoenrollment.

        • MachineType (boolean) –

          Defines if the template is for machines or users. Set to TRUE if the template is for machines. Set to FALSE if the template is for users

      • HashAlgorithm (string) – [REQUIRED]

        Specifies the hash algorithm used to hash the private key.

      • PrivateKeyAttributes (dict) – [REQUIRED]

        Private key attributes allow you to specify the algorithm, minimal key length, key spec, key usage, and cryptographic providers for the private key of a certificate for v3 templates. V3 templates allow you to use Key Storage Providers.

        • Algorithm (string) – [REQUIRED]

          Defines the algorithm used to generate the private key.

        • CryptoProviders (list) –

          Defines the cryptographic providers used to generate the private key.

          • (string) –

        • KeySpec (string) – [REQUIRED]

          Defines the purpose of the private key. Set it to “KEY_EXCHANGE” or “SIGNATURE” value.

        • KeyUsageProperty (dict) – [REQUIRED]

          The key usage property defines the purpose of the private key contained in the certificate. You can specify specific purposes using property flags or all by using property type ALL.

          Note

          This is a Tagged Union structure. Only one of the following top level keys can be set: PropertyFlags, PropertyType.

          • PropertyFlags (dict) –

            You can specify key usage for encryption, key agreement, and signature. You can use property flags or property type but not both.

            • Decrypt (boolean) –

              Allows key for encryption and decryption.

            • KeyAgreement (boolean) –

              Allows key exchange without encryption.

            • Sign (boolean) –

              Allow key use for digital signature.

          • PropertyType (string) –

            You can specify all key usages using property type ALL. You can use property type or property flags but not both.

        • MinimalKeyLength (integer) – [REQUIRED]

          Set the minimum key length of the private key.

      • PrivateKeyFlags (dict) – [REQUIRED]

        Private key flags for v3 templates specify the client compatibility, if the private key can be exported, if user input is required when using a private key, and if an alternate signature algorithm should be used.

        • ClientVersion (string) – [REQUIRED]

          Defines the minimum client compatibility.

        • ExportableKey (boolean) –

          Allows the private key to be exported.

        • RequireAlternateSignatureAlgorithm (boolean) –

          Reguires the PKCS #1 v2.1 signature format for certificates. You should verify that your CA, objects, and applications can accept this signature format.

        • StrongKeyProtectionRequired (boolean) –

          Requirer user input when using the private key for enrollment.

      • SubjectNameFlags (dict) – [REQUIRED]

        Subject name flags describe the subject name and subject alternate name that is included in a certificate.

        • RequireCommonName (boolean) –

          Include the common name in the subject name.

        • RequireDirectoryPath (boolean) –

          Include the directory path in the subject name.

        • RequireDnsAsCn (boolean) –

          Include the DNS as common name in the subject name.

        • RequireEmail (boolean) –

          Include the subject’s email in the subject name.

        • SanRequireDirectoryGuid (boolean) –

          Include the globally unique identifier (GUID) in the subject alternate name.

        • SanRequireDns (boolean) –

          Include the DNS in the subject alternate name.

        • SanRequireDomainDns (boolean) –

          Include the domain DNS in the subject alternate name.

        • SanRequireEmail (boolean) –

          Include the subject’s email in the subject alternate name.

        • SanRequireSpn (boolean) –

          Include the service principal name (SPN) in the subject alternate name.

        • SanRequireUpn (boolean) –

          Include the user principal name (UPN) in the subject alternate name.

      • SupersededTemplates (list) –

        List of templates in Active Directory that are superseded by this template.

        • (string) –

    • TemplateV4 (dict) –

      Template configuration to define the information included in certificates. Define certificate validity and renewal periods, certificate request handling and enrollment options, key usage extensions, application policies, and cryptography settings.

      • CertificateValidity (dict) – [REQUIRED]

        Certificate validity describes the validity and renewal periods of a certificate.

        • RenewalPeriod (dict) – [REQUIRED]

          Renewal period is the period of time before certificate expiration when a new certificate will be requested.

          • Period (integer) – [REQUIRED]

            The numeric value for the validity period.

          • PeriodType (string) – [REQUIRED]

            The unit of time. You can select hours, days, weeks, months, and years.

        • ValidityPeriod (dict) – [REQUIRED]

          Information describing the end of the validity period of the certificate. This parameter sets the “Not After” date for the certificate. Certificate validity is the period of time during which a certificate is valid. Validity can be expressed as an explicit date and time when the certificate expires, or as a span of time after issuance, stated in days, months, or years. For more information, see Validity in RFC 5280. This value is unaffected when ValidityNotBefore is also specified. For example, if Validity is set to 20 days in the future, the certificate will expire 20 days from issuance time regardless of the ValidityNotBefore value.

          • Period (integer) – [REQUIRED]

            The numeric value for the validity period.

          • PeriodType (string) – [REQUIRED]

            The unit of time. You can select hours, days, weeks, months, and years.

      • EnrollmentFlags (dict) – [REQUIRED]

        Enrollment flags describe the enrollment settings for certificates using the existing private key and deleting expired or revoked certificates.

        • EnableKeyReuseOnNtTokenKeysetStorageFull (boolean) –

          Allow renewal using the same key.

        • IncludeSymmetricAlgorithms (boolean) –

          Include symmetric algorithms allowed by the subject.

        • NoSecurityExtension (boolean) –

          This flag instructs the CA to not include the security extension szOID_NTDS_CA_SECURITY_EXT (OID:1.3.6.1.4.1.311.25.2), as specified in [MS-WCCE] sections 2.2.2.7.7.4 and 3.2.2.6.2.1.4.5.9, in the issued certificate. This addresses a Windows Kerberos elevation-of-privilege vulnerability.

        • RemoveInvalidCertificateFromPersonalStore (boolean) –

          Delete expired or revoked certificates instead of archiving them.

        • UserInteractionRequired (boolean) –

          Require user interaction when the subject is enrolled and the private key associated with the certificate is used.

      • Extensions (dict) – [REQUIRED]

        Extensions describe the key usage extensions and application policies for a template.

        • ApplicationPolicies (dict) –

          Application policies specify what the certificate is used for and its purpose.

          • Critical (boolean) –

            Marks the application policy extension as critical.

          • Policies (list) – [REQUIRED]

            Application policies describe what the certificate can be used for.

            • (dict) –

              Application policies describe what the certificate can be used for.

              Note

              This is a Tagged Union structure. Only one of the following top level keys can be set: PolicyObjectIdentifier, PolicyType.

              • PolicyObjectIdentifier (string) –

                The object identifier (OID) of an application policy.

              • PolicyType (string) –

                The type of application policy

        • KeyUsage (dict) – [REQUIRED]

          The key usage extension defines the purpose (e.g., encipherment, signature) of the key contained in the certificate.

          • Critical (boolean) –

            Sets the key usage extension to critical.

          • UsageFlags (dict) – [REQUIRED]

            The key usage flags represent the purpose (e.g., encipherment, signature) of the key contained in the certificate.

            • DataEncipherment (boolean) –

              DataEncipherment is asserted when the subject public key is used for directly enciphering raw user data without the use of an intermediate symmetric cipher.

            • DigitalSignature (boolean) –

              The digitalSignature is asserted when the subject public key is used for verifying digital signatures.

            • KeyAgreement (boolean) –

              KeyAgreement is asserted when the subject public key is used for key agreement.

            • KeyEncipherment (boolean) –

              KeyEncipherment is asserted when the subject public key is used for enciphering private or secret keys, i.e., for key transport.

            • NonRepudiation (boolean) –

              NonRepudiation is asserted when the subject public key is used to verify digital signatures.

      • GeneralFlags (dict) – [REQUIRED]

        General flags describe whether the template is used for computers or users and if the template can be used with autoenrollment.

        • AutoEnrollment (boolean) –

          Allows certificate issuance using autoenrollment. Set to TRUE to allow autoenrollment.

        • MachineType (boolean) –

          Defines if the template is for machines or users. Set to TRUE if the template is for machines. Set to FALSE if the template is for users

      • HashAlgorithm (string) –

        Specifies the hash algorithm used to hash the private key. Hash algorithm can only be specified when using Key Storage Providers.

      • PrivateKeyAttributes (dict) – [REQUIRED]

        Private key attributes allow you to specify the minimal key length, key spec, key usage, and cryptographic providers for the private key of a certificate for v4 templates. V4 templates allow you to use either Key Storage Providers or Legacy Cryptographic Service Providers. You specify the cryptography provider category in private key flags.

        • Algorithm (string) –

          Defines the algorithm used to generate the private key.

        • CryptoProviders (list) –

          Defines the cryptographic providers used to generate the private key.

          • (string) –

        • KeySpec (string) – [REQUIRED]

          Defines the purpose of the private key. Set it to “KEY_EXCHANGE” or “SIGNATURE” value.

        • KeyUsageProperty (dict) –

          The key usage property defines the purpose of the private key contained in the certificate. You can specify specific purposes using property flags or all by using property type ALL.

          Note

          This is a Tagged Union structure. Only one of the following top level keys can be set: PropertyFlags, PropertyType.

          • PropertyFlags (dict) –

            You can specify key usage for encryption, key agreement, and signature. You can use property flags or property type but not both.

            • Decrypt (boolean) –

              Allows key for encryption and decryption.

            • KeyAgreement (boolean) –

              Allows key exchange without encryption.

            • Sign (boolean) –

              Allow key use for digital signature.

          • PropertyType (string) –

            You can specify all key usages using property type ALL. You can use property type or property flags but not both.

        • MinimalKeyLength (integer) – [REQUIRED]

          Set the minimum key length of the private key.

      • PrivateKeyFlags (dict) – [REQUIRED]

        Private key flags for v4 templates specify the client compatibility, if the private key can be exported, if user input is required when using a private key, if an alternate signature algorithm should be used, and if certificates are renewed using the same private key.

        • ClientVersion (string) – [REQUIRED]

          Defines the minimum client compatibility.

        • ExportableKey (boolean) –

          Allows the private key to be exported.

        • RequireAlternateSignatureAlgorithm (boolean) –

          Requires the PKCS #1 v2.1 signature format for certificates. You should verify that your CA, objects, and applications can accept this signature format.

        • RequireSameKeyRenewal (boolean) –

          Renew certificate using the same private key.

        • StrongKeyProtectionRequired (boolean) –

          Require user input when using the private key for enrollment.

        • UseLegacyProvider (boolean) –

          Specifies the cryptographic service provider category used to generate private keys. Set to TRUE to use Legacy Cryptographic Service Providers and FALSE to use Key Storage Providers.

      • SubjectNameFlags (dict) – [REQUIRED]

        Subject name flags describe the subject name and subject alternate name that is included in a certificate.

        • RequireCommonName (boolean) –

          Include the common name in the subject name.

        • RequireDirectoryPath (boolean) –

          Include the directory path in the subject name.

        • RequireDnsAsCn (boolean) –

          Include the DNS as common name in the subject name.

        • RequireEmail (boolean) –

          Include the subject’s email in the subject name.

        • SanRequireDirectoryGuid (boolean) –

          Include the globally unique identifier (GUID) in the subject alternate name.

        • SanRequireDns (boolean) –

          Include the DNS in the subject alternate name.

        • SanRequireDomainDns (boolean) –

          Include the domain DNS in the subject alternate name.

        • SanRequireEmail (boolean) –

          Include the subject’s email in the subject alternate name.

        • SanRequireSpn (boolean) –

          Include the service principal name (SPN) in the subject alternate name.

        • SanRequireUpn (boolean) –

          Include the user principal name (UPN) in the subject alternate name.

      • SupersededTemplates (list) –

        List of templates in Active Directory that are superseded by this template.

        • (string) –

  • ReenrollAllCertificateHolders (boolean) – This setting allows the major version of a template to be increased automatically. All members of Active Directory groups that are allowed to enroll with a template will receive a new certificate issued using that template.

  • TemplateArn (string) –

    [REQUIRED]

    The Amazon Resource Name (ARN) that was returned when you called CreateTemplate.

Returns:

None

Exceptions