IBM Cloud Docs
Creating intermediate certificate authorities

Creating intermediate certificate authorities

An intermediate certificate authority (CA) is a lower-level certificate authority that can sign and issue certificates to an end-entity, such as an app or website. In IBM Cloud® Secrets Manager, you can use an intermediate CA to create private certificates.

If you already created a parent CA in your Secrets Manager instance, for example a root CA or an intermediate CA, you can use it to sign and issue an intermediate CA. If you created the parent CA elsewhere outside of Secrets Manager, you can also use that CA to sign an intermediate CA.

You can create up to 10 intermediate certificate authorities per instance. To view a list of the configurations that are available for your instance, go to the Secrets engines > Private certificates page in the Secrets Manager UI.

Before you begin

Before you get started, be sure that you have the required level of access. To manage engine configurations for your instance, you need the Manager service role or higher.

Supported signing methods

The service offers two options:

Options for creating an intermediate CA
Signing options When to use
Internally signed You're building a chain of certificates that uses an existing parent CA, for example a root CA or another intermediate CA, as its trust anchor. The parent CA was previously created in the same Secrets Manager instance.
Externally signed If you created a parent CA offline or in another Secrets Manager service instance, you can use the external CA to sign and issue an intermediate certificate authority.

Unsupported configuration actions in Terraform

The following actions are not supported.

  • Rotate CRL
  • Revoke CA

Creating an intermediate CA with internal signing in the UI

An intermediate CA with internal signing uses a parent CA that was previously created in your Secrets Manager instance as its trust anchor. You can create an intermediate CA with internal signing by using the Secrets Manager UI.

  1. In the console, click the Menu icon Menu icon > Resource List.

  2. From the list of services, select your Secrets Manager instance.

  3. In the Secrets engines page, click the Private certificates tab.

  4. In the Certificate authorities table, click Create certificate authority to start the creation wizard.

  5. Specify the certificate authority type and options.

    1. Select Intermediate certificate authority as the authority type.
    2. Select Internal signing. From the list of configured CAs, choose the CA that you want to use as the issuer of the intermediate CA certificate.
    3. Enter a name to easily identify your certificate authority.
    4. Select a maximum time-to-live (TTL) for the certificate to be generated for this CA. The TTL determines how long the CA certificate remains valid.
    5. Select the maximum number of end-entity certificates that can exist in the chain.
    6. To encode the issuing CA certificate URL into end-entity certificates, set the Encode URL option to Enabled.
  6. Enter the subject name fields for your root CA certificate.

  7. Select the Key management service. Choose the Secrets Manager service for creating the root certificate authority keys internally by the service, or choose Hyper Protect Crypto Services (HPCS). In case HPCS is selected perform the following tasks:

    1. Select your HPCS instance from the instances dropdown list or enter your HPCS instance CRN manually

    2. Select the IAM Credentials secret that was created earlier for authenticating with HPCS.

      Once the IAM credential has been set in the CA configuration it cannot be later replaced.

    3. Select the HPCS private keystore from the keystores dropdown list, or enter the keystore ID manually.

    4. Choose to use existing keys or generate new keys. In case selecting an existing HPCS private key or entering a private key ID manually, make sure that a public key exists and it has the same ID as the private key in the private keystore.

      In case you choose to generate new keys, those keys will not be deleted by Secrets Manager in case the configuration will be deleted.

  8. Select the key algorithm that you want to use to generate the public and private key for your CA certificate.

  9. Determine whether to enable certificate revocation list (CRL) building and distribution points for your CA certificate.

    A CRL is a list of certificates that are revoked by the issuing certificate authority before their scheduled expiration date. A certificate that is listed as part of a CRL can no longer be trusted by applications.

    1. To build a CRL for your intermediate CA with each certificate request, set the CRL building option to Enabled.
    2. To encode the URL of the revocation list in the intermediate CA certificate, set the CRL distribution points option to Enabled.
    3. Select a time-to-live (TTL) of the generated CRL. The TTL determines how long the CRL remains valid.
  10. Review your selections. To create the intermediate CA, click Create.

    You can now select this intermediate CA to generate a private certificate. To modify or remove an existing configuration, click Actions menu Actions icon in the row of the certificate authority that you want to update.

Creating an intermediate CA with internal signing with the API

An intermediate CA with internal signing uses a parent CA that was previously created in your Secrets Manager instance as its trust anchor. You can create an intermediate CA with internal signing by using the Secrets Manager API.

Step 1: Create an intermediate CA with internal signing

The following example shows a query that you can use to create an intermediate CA with internal signing. In the request body, set the value of the signing_method attribute to internal. Use the issuer attribute to specify the parent certificate authority.

curl -X POST 
  --H "Authorization: Bearer {iam_token}" \
  --H "Accept: application/json" \
  --H "Content-Type: application/json" \
  --d '{
  "config_type": "private_cert_configuration_intermediate_ca",
  "name": "example-intermediate-CA",
  "common_name": "example.com",
  "crl_disable": false,
  "crl_distribution_points_encoded": true,
  "crl_expiry": "72h",
  "issuer": "example-root-CA",
  "issuing_certificates_urls_encoded": true,
  "max_ttl": "26300h",
  "signing_method": "internal"
}' \  
  "https://{instance_ID}.{region}.secrets-manager.appdomain.cloud/api/v2/configurations"

If you are bringing your own HSM, include the following in the request:

"crypto_key": {
    "label": "my_key",
    "allow_generate_key": true,
    "provider": {
      "type": "hyper_protect_crypto_services",
      "instance_crn": "replace_with_hpcs_crn::",
      "pin_iam_credentials_secret_id": "replace_with_iam_credentials_secret_guid",
      "private_keystore_id": "replace_with_keystore_id"
    }
  }

Step 2: Sign the intermediate CA

The following example shows a query that you can use to sign the intermediate CA that you created in step 1.

curl -X POST 
  --H "Authorization: Bearer {iam_token}" \
  --H "Accept: application/json" \
  --H "Content-Type: application/json" \
  --d -d '{
  "action_type": "private_cert_configuration_action_sign_intermediate",
  "intermediate_certificate_authority": "example-intermediate-CA"
}' \  
  "https://{instance_ID}.{region}.secrets-manager.appdomain.cloud/api/v2/configurations/example-root-CA/actions"

Creating an intermediate CA with external signing in the UI

An intermediate CA with external signing uses a parent CA from an external PKI system, or even another Secrets Manager instance, as its trust anchor. The parent CA can be a root CA or an intermediate CA.

Step 1: Create an intermediate CA and signing request

You can create an intermediate CA certificate that uses external signing in the Secrets Manager UI.

  1. In the console, click the Menu icon Menu icon > Resource List.

  2. From the list of services, select your Secrets Manager instance.

  3. In the Secrets engines page, click the Private certificates tab.

  4. In the Certificate authorities table, click Create certificate authority to start the creation wizard.

  5. Specify the certificate authority type and options.

    1. Select Intermediate certificate authority as the authority type.
    2. Select External signing.
    3. Enter a name to easily identify your certificate authority.
    4. Select a maximum time-to-live (TTL) for the certificate to be generated for this CA. The TTL determines how long the CA certificate remains valid.
    5. To encode the issuing CA certificate URL into end-entity certificates, set the Encode URL option to Enabled.
  6. Enter the subject name fields for your intermediate CA certificate.

  7. Select the Key management service. Choose the Secrets Manager service for creating the root certificate authority keys internally by the service, or choose Hyper Protect Crypto Services (HPCS). In case HPCS is selected perform the following tasks:

    1. Select your HPCS instance from the instances dropdown list or enter your HPCS instance CRN manually

    2. Select the IAM Credentials secret that was created earlier for authenticating with HPCS.

      Once the IAM credential has been set in the CA configuration it cannot be later replaced.

    3. Select the HPCS private keystore from the keystores dropdown list, or enter the keystore ID manually.

    4. Choose to use existing keys or generate new keys. In case selecting an existing HPCS private key or entering a private key ID manually, make sure that a public key exists and it has the same ID as the private key in the private keystore.

      In case you choose to generate new keys, those keys will not be deleted by Secrets Manager in case the configuration will be deleted.

  8. Select the key algorithm that you want to use to generate the public and private key for your CA certificate.

  9. Determine whether to enable certificate revocation list (CRL) building and distribution points for your CA certificate.

    A CRL is a list of certificates that have been revoked by the issuing certificate authority before their scheduled expiration date. A certificate that is listed as part of a CRL can no longer be trusted by applications.

    1. To build a CRL for your intermediate CA with each certificate request, set the CRL building option to Enabled.
    2. To encode the URL of the revocation list in the intermediate CA certificate, set the CRL distribution points option to Enabled.
    3. Select a time-to-live (TTL) of the generated CRL. The TTL determines how long the CRL remains valid.
  10. Review your selections. To create the intermediate CA, click Create.

    The intermediate CA is added to your list of configurations for your instance with a Signing required status. Before you can use this intermediate CA to issue private certificates, you must sign it by using the parent CA certificate that you created in your external PKI system.

Step 2: Sign an intermediate CA with an external CA

When you create an intermediate CA in Secrets Manager that you want to sign by using an external CA, a certificate signing request (CSR)An electronic message that an organization sends to a certificate authority (CA) to obtain a certificate. The request includes a public key and is signed with a private key; the CA returns the certificate after signing with its own private key. is generated. You can use the CSR to sign and issue your intermediate CA certificate.

  1. In the Secrets Manager UI, go to Secrets engines > Private certificates.

  2. In the row of the intermediate CA that you want to sign, click the Actions menu Actions icon > Sign certificate.

  3. Copy or download the CSR.

  4. Use the CSR to sign your intermediate CA certificate.

    You can choose from various tools, such as openssl, to sign a CSR file. For example, the following openssl command takes a CSR file that you downloaded from Secrets Manager and uses a PEM-encoded CA file and its associated private key to issue a signed CA certificate.

    openssl x509 -req -in <intermediate-ca-csr-file> -CA <external-parent-ca-file> -CAkey <external-ca-key-file> -out <signed-intermediate-ca-file>
    

    The command outputs a signed intermediate CA certificate file that you can then import to your Secrets Manager instance to complete the signing process.

Step 3: Import a signed intermediate CA to your instance

After you sign an intermediate CA certificate by using an external parent CA, you can import it to your instance by using the Secrets Manager UI.

  1. In the Secrets Manager UI, go to Secrets engines > Private certificates.

  2. In the row of the intermediate CA that you signed, click the Actions menu Actions icon > Sign certificate.

  3. Select or enter the signed intermediate CA certificate file that you signed in the previous step.

  4. Click Sign to complete the external signing process.

    The signed intermediate CA is added to your list of configurations for your instance with an Active status. You can now use this intermediate CA to create private certificates for your applications. To modify or remove an existing configuration, click Actions menu Actions icon in the row of the certificate authority that you want to update.

Creating an intermediate CA with external signing with the API

An intermediate CA with external signing uses a parent CA from an external PKI system, or even another Secrets Manager instance, as its trust anchor. The parent CA can be a root CA or an intermediate CA. You can create an intermediate CA with external signing by using the Secrets Manager API.

Step 1: Create an intermediate CA and signing request

The following example shows a query that you can use to create an intermediate CA with external signing. In the request body, set the value of the signing_method attribute to external.

curl -X POST 
  --H "Authorization: Bearer {iam_token}" \
  --H "Accept: application/json" \
  --H "Content-Type: application/json" \
  --d '{
  "config_type": "private_cert_configuration_intermediate_ca",
  "name": "example-intermediate-CA",
  "common_name": "example.com",
  "crl_disable": false,
  "crl_distribution_points_encoded": true,
  "crl_expiry": "72h",
  "issuer": "example-root-CA",
  "issuing_certificates_urls_encoded": true,
  "max_ttl": "26300h",
  "signing_method": "external"
}' \  
  "https://{instance_ID}.{region}.secrets-manager.appdomain.cloud/api/v2/configurations"

If you are bringing your own HSM, include the following in the request:

"crypto_key": {
    "label": "my_key",
    "allow_generate_key": true,
    "provider": {
      "type": "hyper_protect_crypto_services",
      "instance_crn": "replace_with_hpcs_crn::",
      "pin_iam_credentials_secret_id": "replace_with_iam_credentials_secret_guid",
      "private_keystore_id": "replace_with_keystore_id"
    }
  }

Copy the CSR from the response JSON data. The CSR value is nested within the value of the data attribute of the response. You can also use the get configuration API to get the CSR from the data of the newly created intermediate CA.

Step 2: Sign an intermediate CA with an external CA

Use the CSR that you copied in step 1 to sign your intermediate CA certificate. Put the CSR in a file to be used for signing.

You can choose from various tools, such as openssl, to sign a CSR file. For example, the following openssl command takes a CSR file and uses a PEM-encoded CA file and its associated private key to issue a signed CA certificate.

openssl x509 -req -in <intermediate-ca-csr-file> -CA <external-parent-ca-file> -CAkey <external-ca-key-file> -out <signed-intermediate-ca-file>

The command outputs a signed certificate file that you can import into your intermediate CA configuration to complete the signing process.

If the parent CA is a root CA or an intermediate CA from another Secrets Manager instance, you can sign the CSR by by using the sign-csr action. The following example shows a query that you can use to sign the CSR.

curl -X POST 
  --H "Authorization: Bearer {iam_token}" \
  --H "Accept: application/json" \
  --H "Content-Type: application/json" \
  --d '{
  "action_type": "private_cert_configuration_action_sign_csr",
  "csr": "-----BEGIN CERTIFICATE REQUEST-----\nMIICiDCCAXACAQAwGDEWMBQGA1UEAxMNct5ANo8jybxCwNjHOA==\n-----END CERTIFICATE REQUEST-----"
}' \  
  "https://{other_instance_ID}.{other_instance_region}.secrets-manager.appdomain.cloud/api/v2/configurations/example-intermediate-CA/actions"

Copy the value of the certificate field from the response to use it in the next step.

Step 3: Import a signed intermediate CA into your intermediate CA configuration

After you sign an intermediate CA certificate by using an external parent CA, you can import it into your intermediate CA configuration by using the set-signed action. The following example shows a query that you can use to import the externally-signed certificate.

curl -X POST 
  --H "Authorization: Bearer {iam_token}" \
  --H "Accept: application/json" \
  --H "Content-Type: application/json" \
  --d '{
  "action_type": "private_cert_configuration_action_set_signed",
  "certificate": "-----BEGIN CERTIFICATE-----\nMIIGRjCCBS6gAwIBAgIUSKW6zI+E9JU4bva\n-----END CERTIFICATE-----"
}' \  
  "https://{instance_ID}.{region}.secrets-manager.appdomain.cloud/api/v2/configurations/example-intermediate-CA/actions"

Creating an intermediate CA with internal signing from the CLI

An intermediate CA with internal signing uses a parent CA that was previously created in your Secrets Manager instance as its trust anchor. You can create an intermediate CA with internal signing by using the Secrets Manager CLI.

Step 1: Create an intermediate CA with internal signing

To create an intermediate CA with internal signing, run the ibmcloud secrets-manager configuration-create command. In the configuration prototype, set the value of the signing_method attribute to internal. Use the issuer attribute to specify the parent certificate authority. For example, the following command creates an intermediate CA with internal signing.

ibmcloud secrets-manager configuration-create 
   --configuration-prototype='{
      "config_type": "private_cert_configuration_intermediate_ca",
      "name": "example-intermediate-CA",
      "max_ttl": "26300h",
      "signing_method": "internal",
      "issuer": "example-root-CA",
      "crl_expiry": "72h",
      "crl_disable": false,
      "crl_distribution_points_encoded": true,
      "issuing_certificates_urls_encoded": true,
      "common_name": "example.com",
      "alt_names": [
         "alt-name-1","alt-name-2"
         ],
      "ip_sans": "127.0.0.1",
      "uri_sans": "https://www.example.com/test",
      "other_sans": ["1.2.3.5.4.3.201.10.4.3;utf8:test@example.com"],
      "format": "pem",
      "private_key_format": "der",
      "key_type": "rsa",
      "key_bits": 4096,
      "exclude_cn_from_sans": false
   }'

If you are bringing your own HSM, include the following in the request:

"crypto_key": {
    "label": "my_key",
    "allow_generate_key": true,
    "provider": {
      "type": "hyper_protect_crypto_services",
      "instance_crn": "replace_with_hpcs_crn::",
      "pin_iam_credentials_secret_id": "replace_with_iam_credentials_secret_guid",
      "private_keystore_id": "replace_with_keystore_id"
    }
  }

Step 2: Sign the intermediate CA

To sign the intermediate CA from the Secrets Manager CLI, apply the sign-intermediate action by running the ibmcloud secrets-manager configuration-action-create command. Pass the name of the signing certificate authority (the issuer) with the --name command option.

ibmcloud secrets-manager configuration-action-create --name example-root-CA  
   --config-action-prototype='{
      "action_type": "private_cert_configuration_action_sign_intermediate",
      "intermediate_certificate_authority": "example-intermediate-CA"
   }'

Creating an intermediate CA with external signing from the CLI

An intermediate CA with external signing uses a parent CA from an external PKI system, or even another Secrets Manager instance, as its trust anchor. The parent CA can be a root CA or an intermediate CA. You can create an intermediate CA with external signing by using the Secrets Manager CLI.

Step 1: Create an intermediate CA and signing request

To create an intermediate CA and signing request from the Secrets Manager CLI, run the ibmcloud secrets-manager configuration-create command. In the configuration prototype, set the value of the signing_method attribute to external. Use the --output json option for getting a complete response that includes the value of the csr attribute. For example, the following command creates an intermediate CA with external signing.

ibmcloud secrets-manager configuration-create --output json 
   --configuration-prototype='{
      "config_type": "private_cert_configuration_intermediate_ca",
      "name": "example-intermediate-CA",
      "max_ttl": "26300h",
      "signing_method": "external",
      "crl_expiry": "72h",
      "crl_disable": false,
      "crl_distribution_points_encoded": true,
      "issuing_certificates_urls_encoded": true,
      "common_name": "example.com",
      "alt_names": [
         "alt-name-1","alt-name-2"
         ],
      "ip_sans": "127.0.0.1",
      "uri_sans": "https://www.example.com/test",
      "other_sans": ["1.2.3.5.4.3.201.10.4.3;utf8:test@example.com"],
      "format": "pem",
      "private_key_format": "der",
      "key_type": "rsa",
      "key_bits": 4096,
      "exclude_cn_from_sans": false
   }'

Copy the CSR from the response JSON data. The CSR value is nested within the value of the data attribute of the response. You can also get the data of the newly created intermediate CA by running run the ibmcloud secrets-manager configuration command with the --output json option. For example:

ibmcloud secrets-manager configuration --name example-intermediate-CA --output json 

Step 2: Sign an intermediate CA with an external CA

Use the CSR that you copied in step 1 to sign your intermediate CA certificate. Put the CSR in a file to be used for signing.

You can choose from various tools, such as openssl, to sign a CSR file. For example, the following openssl command takes a CSR file and uses a PEM-encoded CA file and its associated private key to issue a signed CA certificate.

openssl x509 -req -in <intermediate-ca-csr-file> -CA <external-parent-ca-file> -CAkey <external-ca-key-file> -out <signed-intermediate-ca-file>

The command outputs a signed certificate file that you can import into your intermediate CA configuration to complete the signing process.

If the parent CA is a root CA or an intermediate CA from another Secrets Manager instance, you can sign the CSR by applying the sign-csr action. To apply the action run the ibmcloud secrets-manager configuration-action-create command. Copy the value of the certificate field from the command output to use it in the next step. For example, if the parent CA is the root CA with the name example-root-CA in another Secrets Manager instance, the command would be as follows.

ibmcloud secrets-manager configuration-action-create --name example-root-CA --output json  
   --config-action-prototype='{
      "action_type": "private_cert_configuration_action_sign_csr",
      "csr": "-----BEGIN CERTIFICATE REQUEST-----\nMIICiDCCAXACAQAwGDEWMBQGA1UEAxMNct5ANo8jybxCwNjHOA==\n-----END CERTIFICATE REQUEST-----"
    }'

For the sign-csr action you need to target the other Secrets Manager instance where the parent CA resides. Before running the command, export the environment variable SECRETS_MANAGER_URL to target the other instance.

Step 3: Import a signed intermediate CA into your intermediate CA configuration

After you sign an intermediate CA certificate by using an external parent CA, you can import it into your intermediate CA configuration by applying the set-signed action to your intermediate CA configuration. To apply the action run the ibmcloud secrets-manager configuration-action-create command. For example:

ibmcloud secrets-manager configuration-action-create --name example-intermediate-CA 
   --config-action-prototype='{
      "action_type": "private_cert_configuration_action_set_signed",
      "certificate": "-----BEGIN CERTIFICATE-----\nMIIGRjCCBS6gAwIBAgIUSKW6zI+E9JU4bva\n-----END CERTIFICATE-----"
    }'

Creating an intermediate CA with internal signing with Terraform

An intermediate CA with internal signing uses a parent CA that was previously created in your Secrets Manager instance as its trust anchor. You can create an intermediate CA with internal signing by using Terraform for Secrets Manager.

The following example shows a configuration that you can use to create an intermediate CA with internal signing.

    resource "ibm_sm_private_certificate_configuration_intermediate_ca" "my_intermediate_ca" {
        instance_id = local.instance_id
        signing_method = "internal"
        name = "example-intermediate-ca"
        common_name = "example.com"
        issuer = ibm_sm_private_certificate_configuration_root_ca.my_root_ca.name
        max_ttl = "180000"
    }

If you are bringing your own HSM, include the following in the configuration:

crypto_key {
    label = "my_key"
    allow_generate_key = true
    provider {
      type = "hyper_protect_crypto_services"
      instance_crn = "replace_with_hpcs_crn::"
      pin_iam_credentials_secret_id = "replace_with_iam_credentials_secret_guid"
      private_keystore_id = "replace_with_keystore_id"
    }
  }

When using internal signing, the defined issuer is automatically signing the newly created intermediate CA certificate.

Creating an intermediate CA with external signing with Terraform

An intermediate CA with external signing uses a parent CA from an external PKI system, or even another Secrets Manager instance, as its trust anchor. The parent CA can be a root CA or an intermediate CA. You can create an intermediate CA with external signing by using Terraform for Secrets Manager.

The following example shows a configuration that you can use to create an intermediate CA with external signing. The configuration consists of three resources. The ibm_sm_private_certificate_configuration_intermediate_ca resource creates the intermediate CA configuration and the certificate signing request. The ibm_sm_private_certificate_configuration_action_sign_csr resource signs the CSR with a root CA from another Secrets Manager instance. The ibm_sm_private_certificate_configuration_action_set_signed resource imports the signed certificate into the intermediate CA resource.

    resource "ibm_sm_private_certificate_configuration_intermediate_ca" "my_intermediate_ca" {
        instance_id = local.instance_id
        name = "example-intermediate-ca"
        signing_method = "external"
        common_name = "example.com"
        max_ttl = "180000"
    }
    
    resource "ibm_sm_private_certificate_configuration_action_sign_csr" "my_sign_action" {
        instance_id = local.another_instance_id
        name = ibm_sm_private_certificate_configuration_root_ca.my_root_ca.name
        csr = ibm_sm_private_certificate_configuration_intermediate_ca.my_intermediate_ca.data[0].csr
    }

    resource "ibm_sm_private_certificate_configuration_action_set_signed" "my_set_signed_action" {
        instance_id = local.instance_id
        name = ibm_sm_private_certificate_configuration_intermediate_ca.my_intermediate_ca.name
        certificate = ibm_sm_private_certificate_configuration_action_sign_csr.my_sign_action.data[0].certificate
    }

In this example, we use external signing because the root CA is in another Secrets Manager instance. In order to use a parent CA from an external PKI system, use another method to sign the CSR, instead of the ibm_sm_private_certificate_configuration_action_sign_csr resource. For example, you may use the tls_locally_signed_cert resource from the tls provider.

If you are bringing your own HSM, include the following in the configuration:

crypto_key {
    label = "my_key"
    allow_generate_key = true
    provider {
      type = "hyper_protect_crypto_services"
      instance_crn = "replace_with_hpcs_crn::"
      pin_iam_credentials_secret_id = "replace_with_iam_credentials_secret_guid"
      private_keystore_id = "replace_with_keystore_id"
    }
  }

Retrieving an intermediate CA in the UI

You can retrieve the intermediate CA value by using the Secrets Manager UI.

  1. In the Public certificates secret engine, click the Actions menu Actions icon to open a list of options for your engine configuration.
  2. To view the configuration value, click View configurationt.
  3. Click Confirm after you ensure that you are in a safe environment.

The secret value is displayed for 15 seconds, then the dialog closes.

Retrieving an intermediate CA using CLI

You can retrieve the intermediate CA value by using the Secrets Manager CLI. In the following example command, replace the engine configuration name with your configuration's name.

ibmcloud secrets-manager configuration --name EXAMPLE_CONFIG --service-url https://{instance_ID}.{region}.secrets-manager.appdomain.cloud

Replace {instance_ID} and {region} with the values that apply to your Secrets Manager service instance. To find the endpoint URL that is specific to your instance, you can copy it from the Endpoints page in the Secrets Manager UI. For more information, see Viewing your endpoint URLs

Retrieving an intermediate CA using API

You can retrieve the intermediate CA value by using the Secrets Manager API. In the following example request, replace the engine configuration name with your configuration's name.

curl -X GET --location --header "Authorization: Bearer {iam_token}" \
--header "Accept: application/json" \
"https://{instance_ID}.{region}.secrets-manager.appdomain.cloud/api/v2/configurations/{name}"

Replace {instance_ID} and {region} with the values that apply to your Secrets Manager service instance. To find the endpoint URL that is specific to your instance, you can copy it from the Endpoints page in the Secrets Manager UI. For more information, see Viewing your endpoint URLs

A successful response returns the value of the engine configuration, along with other metadata. For more information about the required and optional request parameters, see Get a secret.

Next steps