Automating SSL certificate updates on Control-M/Agents
9.0.20.000 As the administrator, you can automate updates to SSL certificates on multiple Control-M/Agents by incorporating the provided AAPI commands in scripts.
Below is an example of a method that involves two scripts for automating updates of SSL certificates on multiple Control-M/Agents.
First script: Creating CSRs for certificates that are about to expire
This first script uses API commands to automate the following tasks:
- Get a list of Control-M/Servers, using the config servers::get command.
- Get a list of Control-M/Agents for each server, using the config server:agents::get command.
- Determine which of the agents has a certificate that is about to reach its expiration date, using the config server:agent:crt:expiration::get command.
- Create a Certificate Signing Request (CSR) for each agent that is about to expire, and store all CSR files in one directory. Use the config server:agent:csr::create command.
Signing CSRs
Before running the second script, get the security team at your organization to sign the CSRs that were created by the first script.
Second script: Deploy signed certificates to agents
This second script uses API commands to automate the following tasks:
- Get a list of Control-M/Servers, using the config servers::get command.
- Get a list of Control-M/Agents for each server, using the config server:agents::get command.
- Determine which of the agents has a certificate that is about to reach its expiration date, using the config server:agent:crt:expiration::get command.
- Deploy each of the signed certificates to its proper agent, using the config server:agent:crt::deploy command.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*