List all TLS configuration deployments
Response based on AWS or Azure provider
Bad Request
Forbidden
Not Found
Internal Server Error
- 200
- 404
Available TLS deployments
{- "deployments": [
- {
- "status": "done",
- "message": null,
- "applianceId": 21,
- "submitted": "2021-06-02T21:54:31.870Z",
- "completed": "2021-06-02T21:54:31.962Z",
- "id": 1,
- "serverIp": "192.0.2.1",
- "certificateArn": "arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012",
- "hsmSecretsArn": "arn:aws:secretsmanager:us-west-2:511311637224:secret:CloudHSM_Configuration-Jv7ayp",
- "kmsArn": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
- "inspectionStatus": "null"
}, - {
- "status": "done",
- "message": null,
- "applianceId": 122,
- "submitted": "2021-06-02T21:54:46.186Z",
- "completed": "2021-06-02T21:54:46.259Z",
- "id": 2,
- "serverIp": "192.0.2.1",
- "inspectionStatus": "null"
}
]
}
Deploy a TLS configuration on an appliance
TLS inspection requires a minimum TippingPoint Operating System (TOS) version of 2021.8.0.11159
For details on locating your device identifier, refer to Appliance management.
To determine whether your TLS configuration was successfully deployed to your appliance, you can poll the status. Learn more.
Request Body schema: application/json
A request to deploy TLS configuration to an appliance. The request must include at least one certificate ARN, and either a reference to access matching certificate keys via HSM, or provide private keys in PEM format (and password if encrypted).
The certificate ARNs should be from one of the following sources:
- ACM,
- S3 bucket.
Access to the private keys:
- HSM secrets ARN or
- included in the request in PEM format
Ensure that your appliance has access to all resources required for a TLS deployment in your AWS environment.
Response based on AWS or Azure provider
Bad Request
Forbidden
Not Found
Internal Server Error
- Payload
TLS configuration referencing an uploaded PEM key and ACM in an AWS environment
{- "applianceId": "10",
- "serverIp": "192.0.2.1",
- "certificates": [
- {
- "arn": "arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012",
- "pemKey": "Your pem key goes here",
- "pemKeyPassword": "Your pem key password goes here"
}
], - "kmsArn": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"
}
- 200
- 400
- 404
TLS configuration referencing an uploaded PEM key and ACM in an AWS environment
{- "id": "42",
- "status": "queued, started, done, error",
- "applianceId": "10",
- "serverIp": "192.0.2.1",
- "certificateArns": [
- "arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012"
], - "kmsArn": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
- "inspectionStatus": null
}
Query the status of a TLS configuration deployment by ID
Use this operation to query the status of TLS configuration deployment. After you deploy your TLS configuration, the response to your API contains an ID of the request. Use this ID value as the path parameter in your status query request. The response returns one of the following values for the deployment status:
queued | The TLS configuration deployment request has been queued. |
started | The TLS configuration deployment request is being processed. |
done | The TLS configuration deployment request was successfully deployed to your appliance. |
error | The TLS configuration deployment request could not complete. Refer to the message property in the response for an explanation. |
Response based on AWS or Azure provider
Bad Request
Forbidden
Not Found
Internal Server Error
- 200
- 404
TLS configuration referencing an uploaded PEM key and ACM in an AWS environment
{- "id": "42",
- "status": "queued, started, done, error",
- "applianceId": "10",
- "serverIp": "192.0.2.1",
- "certificateArns": [
- "arn:aws:acm:us-east-1:123456789012:certificate/12345678-1234-1234-1234-123456789012"
], - "kmsArn": "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab",
- "inspectionStatus": null
}
Delete a TLS configuration deployment from an appliance.
Use this operation to remove a TLS configuration from your appliance. Use the deployment identifier as the path parameter in this request.
No Content
Bad Request
Forbidden
Not Found
Internal Server Error