Get information about the browser certificate for the device
at the given address.
This information will be used later in the get_device_name,
add_non_authority_device, and add_authority_device calls.
Get the device object name for the device at the given address.
You may specify various arguments to authenticate the
browser certificate of the device being added. Any or all
of these values may be omitted.
Note: Currently, the backend requires hexadecimal values
to be in lower case and not include the ':' character.
Add a non-authoritative device to the trust domain.
You must specify a new device object name for the device
to be added.
You may specify various arguments to authenticate
the browser certificate of the device being added. Any or
all of these values may be omitted.
Note: Currently, the backend requires hexadecimal values
to be in lower case and not include the ':' character.
Add an authoritative device to the trust domain.
You must specify a new device object name for
the device to be added.
You may specify various arguments to authenticate
the browser certificate of the device being added. Any or
all of these values may be omitted.
Note: Currently, the backend requires hexadecimal values
to be in lower case and not include the ':' character.
Remove the specified devices from the trust domain.
Reset the trust domain on the local device.
This call causes the trust domain on the local device to
be cleared. You may choose to keep the current device
object name and authority cert/key pair. Alternately, you
may specify a new device object name and may have the
authority cert/key pair regenerated or set to the values
specified in the authority_cert and
authority_key parameters.
Note: all known devices (accept for self) will be removed from
the trust domain.
Generates a certificate signing request for a device identity certificate
Note: This method is mostly for internal F5 use.
Install certificates and add the device as a non-authority to a trust domain.
Note: This method is mostly for internal F5 use.
Install certificates and add the device as a peer authority to a trust domain.
Note: This method is mostly for internal F5 use.
Used to check to see if a device is 'in use' by the current trust domain.
A device is considered to be in use if the device trust/logical devices are
configured in such a way that the device may be actively passing traffic for
the current trust domain
Note: This method is mostly for internal F5 use.
Get the PEM encoded CA certificate for this device.
Get the list of trust domains.
BIG-IP 11.0.0 through 11.3.0 support only the root trust domain
but the system supports multiple trust domains for future
functionality.
Get the GUID attribute for the specified trust domains.
Used to determine when devices are in the same trust domain.
Gets the interface version
Get information about the browser certificate for the device
at the given address.
This information will be used later in the get_device_name,
add_non_authority_device, and add_authority_device calls.
Get the device object name for the device at the given address.
You may specify various arguments to authenticate the
browser certificate of the device being added. Any or all
of these values may be omitted.
Note: Currently, the backend requires hexadecimal values
to be in lower case and not include the ':' character.
Add a non-authoritative device to the trust domain.
You must specify a new device object name for the device
to be added.
You may specify various arguments to authenticate
the browser certificate of the device being added. Any or
all of these values may be omitted.
Note: Currently, the backend requires hexadecimal values
to be in lower case and not include the ':' character.
Add an authoritative device to the trust domain.
You must specify a new device object name for
the device to be added.
You may specify various arguments to authenticate
the browser certificate of the device being added. Any or
all of these values may be omitted.
Note: Currently, the backend requires hexadecimal values
to be in lower case and not include the ':' character.
Remove the specified devices from the trust domain.
Reset the trust domain on the local device.
This call causes the trust domain on the local device to
be cleared. You may choose to keep the current device
object name and authority cert/key pair. Alternately, you
may specify a new device object name and may have the
authority cert/key pair regenerated or set to the values
specified in the authority_cert and
authority_key parameters.
Note: all known devices (accept for self) will be removed from
the trust domain.
Generates a certificate signing request for a device identity certificate
Note: This method is mostly for internal F5 use.
Install certificates and add the device as a non-authority to a trust domain.
Note: This method is mostly for internal F5 use.
Install certificates and add the device as a peer authority to a trust domain.
Note: This method is mostly for internal F5 use.
Used to check to see if a device is 'in use' by the current trust domain.
A device is considered to be in use if the device trust/logical devices are
configured in such a way that the device may be actively passing traffic for
the current trust domain
Note: This method is mostly for internal F5 use.
Get the PEM encoded CA certificate for this device.
Get the list of trust domains.
BIG-IP 11.0.0 through 11.3.0 support only the root trust domain
but the system supports multiple trust domains for future
functionality.
Get the GUID attribute for the specified trust domains.
Used to determine when devices are in the same trust domain.
Gets the interface version
The Trust interface contains the methods for creating and manipulating
device trust domains.