Get information about the browser certificate for the device at the given address. This information will be used later in the get_device_name, add_non_authority_device, and add_authority_device calls. Get the device object name for the device at the given address. You may specify various arguments to authenticate the browser certificate of the device being added. Any or all of these values may be omitted. Note: Currently, the backend requires hexadecimal values to be in lower case and not include the ':' character. Add a non-authoritative device to the trust domain. You must specify a new device object name for the device to be added. You may specify various arguments to authenticate the browser certificate of the device being added. Any or all of these values may be omitted. Note: Currently, the backend requires hexadecimal values to be in lower case and not include the ':' character. Add an authoritative device to the trust domain. You must specify a new device object name for the device to be added. You may specify various arguments to authenticate the browser certificate of the device being added. Any or all of these values may be omitted. Note: Currently, the backend requires hexadecimal values to be in lower case and not include the ':' character. Remove the specified devices from the trust domain. Reset the trust domain on the local device. This call causes the trust domain on the local device to be cleared. You may choose to keep the current device object name and authority cert/key pair. Alternately, you may specify a new device object name and may have the authority cert/key pair regenerated or set to the values specified in the authority_cert and authority_key parameters. Note: all known devices (accept for self) will be removed from the trust domain. Generates a certificate signing request for a device identity certificate Note: This method is mostly for internal F5 use. Install certificates and add the device as a non-authority to a trust domain. Note: This method is mostly for internal F5 use. Install certificates and add the device as a peer authority to a trust domain. Note: This method is mostly for internal F5 use. Used to check to see if a device is 'in use' by the current trust domain. A device is considered to be in use if the device trust/logical devices are configured in such a way that the device may be actively passing traffic for the current trust domain Note: This method is mostly for internal F5 use. Get the PEM encoded CA certificate for this device. Get the list of trust domains. BIG-IP 11.0.0 through 11.3.0 support only the root trust domain but the system supports multiple trust domains for future functionality. Get the GUID attribute for the specified trust domains. Used to determine when devices are in the same trust domain. Gets the interface version Get information about the browser certificate for the device at the given address. This information will be used later in the get_device_name, add_non_authority_device, and add_authority_device calls. Get the device object name for the device at the given address. You may specify various arguments to authenticate the browser certificate of the device being added. Any or all of these values may be omitted. Note: Currently, the backend requires hexadecimal values to be in lower case and not include the ':' character. Add a non-authoritative device to the trust domain. You must specify a new device object name for the device to be added. You may specify various arguments to authenticate the browser certificate of the device being added. Any or all of these values may be omitted. Note: Currently, the backend requires hexadecimal values to be in lower case and not include the ':' character. Add an authoritative device to the trust domain. You must specify a new device object name for the device to be added. You may specify various arguments to authenticate the browser certificate of the device being added. Any or all of these values may be omitted. Note: Currently, the backend requires hexadecimal values to be in lower case and not include the ':' character. Remove the specified devices from the trust domain. Reset the trust domain on the local device. This call causes the trust domain on the local device to be cleared. You may choose to keep the current device object name and authority cert/key pair. Alternately, you may specify a new device object name and may have the authority cert/key pair regenerated or set to the values specified in the authority_cert and authority_key parameters. Note: all known devices (accept for self) will be removed from the trust domain. Generates a certificate signing request for a device identity certificate Note: This method is mostly for internal F5 use. Install certificates and add the device as a non-authority to a trust domain. Note: This method is mostly for internal F5 use. Install certificates and add the device as a peer authority to a trust domain. Note: This method is mostly for internal F5 use. Used to check to see if a device is 'in use' by the current trust domain. A device is considered to be in use if the device trust/logical devices are configured in such a way that the device may be actively passing traffic for the current trust domain Note: This method is mostly for internal F5 use. Get the PEM encoded CA certificate for this device. Get the list of trust domains. BIG-IP 11.0.0 through 11.3.0 support only the root trust domain but the system supports multiple trust domains for future functionality. Get the GUID attribute for the specified trust domains. Used to determine when devices are in the same trust domain. Gets the interface version The Trust interface contains the methods for creating and manipulating device trust domains.