From 621d9e5c413e561293d7484b93882d985b3fe15f Mon Sep 17 00:00:00 2001 From: Endi Sukma Dewata Date: Sat, 24 Mar 2012 02:27:47 -0500 Subject: Removed unnecessary pki folder. Previously the source code was located inside a pki folder. This folder was created during svn migration and is no longer needed. This folder has now been removed and the contents have been moved up one level. Ticket #131 --- base/kra/shared/webapps/ROOT/WEB-INF/web.xml | 29 + base/kra/shared/webapps/ROOT/index.jsp | 98 ++ .../kra/shared/webapps/kra/WEB-INF/auth.properties | 16 + .../shared/webapps/kra/WEB-INF/velocity.properties | 8 + base/kra/shared/webapps/kra/WEB-INF/web.xml | 1115 ++++++++++++++++++++ 5 files changed, 1266 insertions(+) create mode 100644 base/kra/shared/webapps/ROOT/WEB-INF/web.xml create mode 100644 base/kra/shared/webapps/ROOT/index.jsp create mode 100644 base/kra/shared/webapps/kra/WEB-INF/auth.properties create mode 100644 base/kra/shared/webapps/kra/WEB-INF/velocity.properties create mode 100644 base/kra/shared/webapps/kra/WEB-INF/web.xml (limited to 'base/kra/shared/webapps') diff --git a/base/kra/shared/webapps/ROOT/WEB-INF/web.xml b/base/kra/shared/webapps/ROOT/WEB-INF/web.xml new file mode 100644 index 000000000..59245836e --- /dev/null +++ b/base/kra/shared/webapps/ROOT/WEB-INF/web.xml @@ -0,0 +1,29 @@ + + + + + + Welcome to Tomcat + + Welcome to Tomcat + + + + diff --git a/base/kra/shared/webapps/ROOT/index.jsp b/base/kra/shared/webapps/ROOT/index.jsp new file mode 100644 index 000000000..4b2b3c60a --- /dev/null +++ b/base/kra/shared/webapps/ROOT/index.jsp @@ -0,0 +1,98 @@ + +<% + // establish acceptable schemes + final String HTTP_SCHEME = "http"; + final String HTTPS_SCHEME = "https"; + + // establish known ports + final int EE_HTTP_PORT = [PKI_UNSECURE_PORT]; + final int AGENT_HTTPS_PORT = [PKI_AGENT_SECURE_PORT]; + final int EE_HTTPS_PORT = [PKI_EE_SECURE_PORT]; + final int ADMIN_HTTPS_PORT = [PKI_ADMIN_SECURE_PORT]; + + // establish known paths + final String ADMIN_PATH = "/[PKI_SUBSYSTEM_TYPE]/services"; + final String AGENT_PATH = "/[PKI_SUBSYSTEM_TYPE]/agent/[PKI_SUBSYSTEM_TYPE]"; + final String ERROR_PATH = "/[PKI_SUBSYSTEM_TYPE]/404.html"; + + // retrieve scheme from request + String scheme = request.getScheme(); + + // retrieve client hostname on which the request was sent + String client_hostname = request.getServerName(); + + // retrieve client port number on which the request was sent + int client_port = request.getServerPort(); + + // retrieve server hostname on which the request was received + String server_hostname = request.getLocalName(); + + // retrieve server port number on which the request was received + int server_port = request.getLocalPort(); + + // uncomment the following lines to write to 'catalina.out' + //System.out.println( "scheme = '" + scheme + "'" ); + //System.out.println( "client hostname = '" + client_hostname + "'" ); + //System.out.println( "client port = '" + client_port + "'" ); + //System.out.println( "server hostname = '" + server_hostname + "'" ); + //System.out.println( "server port = '" + server_port + "'" ); + + // compose the appropriate URL + String URL = ""; + + if( scheme.equals( HTTP_SCHEME ) ) { + if( server_port == EE_HTTP_PORT ) { + // always redirect to secure admin 'services' port + scheme = HTTPS_SCHEME; + client_port = ADMIN_HTTPS_PORT; + URL = scheme + "://" + client_hostname + ":" + client_port + ADMIN_PATH; + } else { + // unknown HTTP server port: should never get here + URL = scheme + "://" + client_hostname + ":" + client_port + ERROR_PATH; + + // uncomment the following line to write to 'catalina.out' + //System.out.println( "Unknown HTTP server port: '" + server_port + "'" ); + } + } else if( scheme.equals( HTTPS_SCHEME ) ) { + if( server_port == AGENT_HTTPS_PORT ) { + URL = scheme + "://" + client_hostname + ":" + client_port + AGENT_PATH; + } else if( server_port == EE_HTTPS_PORT ) { + // always redirect to secure admin 'services' port + client_port = ADMIN_HTTPS_PORT; + URL = scheme + "://" + client_hostname + ":" + client_port + ADMIN_PATH; + } else if( server_port == ADMIN_HTTPS_PORT ) { + URL = scheme + "://" + client_hostname + ":" + client_port + ADMIN_PATH; + } else { + // unknown HTTPS server port: should never get here + URL = scheme + "://" + client_hostname + ":" + client_port + ERROR_PATH; + + // uncomment the following line to write to 'catalina.out' + //System.out.println( "Unknown HTTPS server port: '" + server_port + "'" ); + } + } else { + // unacceptable scheme: should never get here + URL = scheme + "://" + client_hostname + ":" + client_port + ERROR_PATH; + + // uncomment the following line to write to 'catalina.out' + //System.out.println( "Unacceptable scheme: '" + scheme + "'" ); + } + + // respond (back to browser) with the appropriate redirected URL + response.sendRedirect( URL ); +%> diff --git a/base/kra/shared/webapps/kra/WEB-INF/auth.properties b/base/kra/shared/webapps/kra/WEB-INF/auth.properties new file mode 100644 index 000000000..a206aa9e4 --- /dev/null +++ b/base/kra/shared/webapps/kra/WEB-INF/auth.properties @@ -0,0 +1,16 @@ +# Restful API auth/authz mapping info +# +# Format: +# = , +# ex: /kra/pki/key/retrieve = certServer.kra.pki.key.retrieve,execute + +/kra/pki/key/retrieve = certServer.kra.pki.key.retrieve,execute +/kra/pki/keyrequests = certServer.kra.pki.keyrequests,read +/kra/pki/keyrequest = certServer.kra.pki.keyrequest,read +/kra/pki/keyrequest/archive = certServer.kra.pki.keyrequest.archive,execute +/kra/pki/keyrequest/recover = certServer.kra.pki.keyrequest.recover,execute +/kra/pki/keyrequest/approve = certServer.kra.pki.keyrequest.approve,execute +/kra/pki/keyrequest/reject = certServer.kra.pki.keyrequest.reject,execute +/kra/pki/keyrequest/cancel = certServer.kra.pki.keyrequest.cancel,execute +/kra/pki/keys = certServer.kra.pki.keys,read +/kra/pki/config/cert/transport = certServer.kra.pki.config.cert.transport,read diff --git a/base/kra/shared/webapps/kra/WEB-INF/velocity.properties b/base/kra/shared/webapps/kra/WEB-INF/velocity.properties new file mode 100644 index 000000000..2dfae4bca --- /dev/null +++ b/base/kra/shared/webapps/kra/WEB-INF/velocity.properties @@ -0,0 +1,8 @@ +resource.loader = file +file.resource.loader.class = org.apache.velocity.runtime.resource.loader.FileResourceLoader +file.resource.loader.path = [PKI_INSTANCE_PATH]/[PKI_WEBAPPS_NAME]/[PKI_SUBSYSTEM_TYPE] +file.resource.loader.cache = true +file.resource.loader.modificationCheckInterval = 2 +input.encoding=UTF-8 +output.encoding=UTF-8 +runtime.log.logsystem.class=org.apache.velocity.runtime.log.NullLogSystem diff --git a/base/kra/shared/webapps/kra/WEB-INF/web.xml b/base/kra/shared/webapps/kra/WEB-INF/web.xml new file mode 100644 index 000000000..c6e9934eb --- /dev/null +++ b/base/kra/shared/webapps/kra/WEB-INF/web.xml @@ -0,0 +1,1115 @@ + + + + + + AgentRequestFilter + com.netscape.cms.servlet.filter.AgentRequestFilter + + https_port + [PKI_AGENT_SECURE_PORT] + +[PKI_OPEN_ENABLE_PROXY_COMMENT] + + proxy_port + [PKI_PROXY_SECURE_PORT] + +[PKI_CLOSE_ENABLE_PROXY_COMMENT] + + active + true + + + + + AdminRequestFilter + com.netscape.cms.servlet.filter.AdminRequestFilter + + https_port + [PKI_ADMIN_SECURE_PORT] + +[PKI_OPEN_ENABLE_PROXY_COMMENT] + + proxy_port + [PKI_PROXY_SECURE_PORT] + +[PKI_CLOSE_ENABLE_PROXY_COMMENT] + + active + true + + + + + EERequestFilter + com.netscape.cms.servlet.filter.EERequestFilter + + http_port + [PKI_UNSECURE_PORT] + + + https_port + [PKI_EE_SECURE_PORT] + +[PKI_OPEN_ENABLE_PROXY_COMMENT] + + proxy_port + [PKI_PROXY_SECURE_PORT] + + + proxy_http_port + [PKI_PROXY_UNSECURE_PORT] + +[PKI_CLOSE_ENABLE_PROXY_COMMENT] + + active + true + + + + + csadmin-wizard + com.netscape.cms.servlet.wizard.WizardServlet + + properties + /WEB-INF/velocity.properties + + + name + DRM Setup Wizard + + + panels + welcome=com.netscape.cms.servlet.csadmin.WelcomePanel,module=com.netscape.cms.servlet.csadmin.ModulePanel,confighsmlogin=com.netscape.cms.servlet.csadmin.ConfigHSMLoginPanel,securitydomain=com.netscape.cms.servlet.csadmin.SecurityDomainPanel,securitydomain=com.netscape.cms.servlet.csadmin.DisplayCertChainPanel,subsystem=com.netscape.cms.servlet.csadmin.CreateSubsystemPanel,restorekeys=com.netscape.cms.servlet.csadmin.RestoreKeyCertPanel,databasepanel=com.netscape.cms.servlet.csadmin.DatabasePanel,sizepanel=com.netscape.cms.servlet.csadmin.SizePanel,namepanel=com.netscape.cms.servlet.csadmin.NamePanel,certrequestpanel=com.netscape.cms.servlet.csadmin.CertRequestPanel,backupkeys=com.netscape.cms.servlet.csadmin.BackupKeyCertPanel,savepk12=com.netscape.cms.servlet.csadmin.SavePKCS12Panel,adminpanel=com.netscape.cms.servlet.csadmin.AdminPanel,importadmincertpanel=com.netscape.cms.servlet.csadmin.ImportAdminCertPanel,donepanel=com.netscape.cms.servlet.csadmin.DonePanel + + + + + csadmin-login + com.netscape.cms.servlet.csadmin.LoginServlet + + properties + /WEB-INF/velocity.properties + + + + + + kraKRADisplayBySerialForRecovery + com.netscape.cms.servlet.key.DisplayBySerialForRecovery + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/displayBySerialForRecovery.template + ID + kraKRADisplayBySerialForRecovery + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.key + + + + kraGetConfigEntries + com.netscape.cms.servlet.csadmin.GetConfigEntries + GetClientCert + false + authority + kra + ID + kraGetConfigEntries + AuthzMgr + BasicAclAuthz + AuthMgr + TokenAuth + resourceID + certServer.clone.configuration.GetConfigEntries + + + + kraKRAGrantRecovery + com.netscape.cms.servlet.key.GrantRecovery + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/grantRecovery.template + ID + kraKRAGrantRecovery + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.key + + + + kraKRAGrantAsyncRecovery + com.netscape.cms.servlet.key.GrantAsyncRecovery + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/grantAsyncRecovery.template + ID + kraKRAGrantAsyncRecovery + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.key + + + + kraports + com.netscape.cms.servlet.base.PortsServlet + ID + kraports + GetClientCert + false + interface + ee + + + + kraKRADisplayTransport + com.netscape.cms.servlet.key.DisplayTransport + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + ID + kraKRADisplayTransport + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.certificate.transport + + + + kraRegisterUser + com.netscape.cms.servlet.csadmin.RegisterUser + GetClientCert + false + authority + kra + ID + kraRegisterUser + GroupName + Data Recovery Manager Agents + AuthMgr + TokenAuth + AuthzMgr + BasicAclAuthz + resourceID + certServer.kra.registerUser + + + + kraGetTransportCert + com.netscape.cms.servlet.csadmin.GetTransportCert + GetClientCert + false + authority + kra + ID + kraGetTransportCert + AuthMgr + TokenAuth + AuthzMgr + BasicAclAuthz + resourceID + certServer.kra.getTransportCert + + + + kraKRARecoverBySerial + com.netscape.cms.servlet.key.RecoverBySerial + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/recoverBySerial.template + ID + kraKRARecoverBySerial + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.key + + + + kraDynamicVariables + com.netscape.cms.servlet.base.DynamicVariablesServlet + ID + kraDynamicVariables + GetClientCert + false + dynamicVariables + serverdate=serverdate(),subsystemname=subsystemname(),http=http(),authmgrs=authmgrs(),clacrlurl=clacrlurl() + authority + kra + + + + kraheader + com.netscape.cms.servlet.base.IndexServlet + templatePath + /agent/header.template + ID + kraheader + GetClientCert + true + AuthMgr + certUserDBAuthMgr + template + /agent/header.template + + + + kraTokenKeyRecovery + com.netscape.cms.servlet.connector.TokenKeyRecoveryServlet + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + ID + kraTokenKeyRecovery + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.TokenKeyRecovery + + + + kraSrchRecoverKey + com.netscape.cms.servlet.base.DisplayHtmlServlet + GetClientCert + true + htmlPath + /agent/kra/SrchRecoverKey.html + authority + kra + interface + agent + templatePath + /agent/kra/srchKeyForRecovery.template + ID + kraSrchRecoverKey + unauthorizedTemplate + /agent/kra/GenUnauthorized.template + AuthMgr + certUserDBAuthMgr + + + + kraConnector + com.netscape.cms.servlet.connector.ConnectorServlet + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + ID + kraConnector + RequestEncoder + com.netscape.cmscore.connector.HttpRequestEncoder + resourceID + certServer.kra.connector + AuthMgr + certUserDBAuthMgr + + + + kraSrchKey + com.netscape.cms.servlet.base.DisplayHtmlServlet + GetClientCert + true + htmlPath + /agent/kra/SrchKey.html + authority + kra + interface + agent + templatePath + /agent/kra/srchKey.template + ID + kraSrchKey + unauthorizedTemplate + /agent/kra/GenUnauthorized.template + AuthMgr + certUserDBAuthMgr + + + + kraListRequests + com.netscape.cms.servlet.base.DisplayHtmlServlet + GetClientCert + true + htmlPath + /agent/kra/ListRequests.html + authority + kra + interface + agent + templatePath + /agent/kra/ListRequests.template + ID + kraListRequests + unauthorizedTemplate + /agent/kra/GenUnauthorized.template + AuthMgr + certUserDBAuthMgr + + + + kraGenerateKeyPair + com.netscape.cms.servlet.connector.GenerateKeyPairServlet + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + ID + kraGenerateKeyPair + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.GenerateKeyPair + + + + kraindex + com.netscape.cms.servlet.base.IndexServlet + ID + kraindex + template + index.template + GetClientCert + true + AuthMgr + certUserDBAuthMgr + + + + kraKRAGetApprovalStatus + com.netscape.cms.servlet.key.GetApprovalStatus + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/getApprovalStatus.template + ID + kraKRAGetApprovalStatus + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.request.status + + + + kraKRAProcessReq + com.netscape.cms.servlet.request.ProcessReq + GetClientCert + true + parser + KeyReqParser.PARSER + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/processReq.template + ID + kraKRAProcessReq + resourceID + certServer.kra.request + AuthMgr + certUserDBAuthMgr + + + + kraKRAExamineRecovery + com.netscape.cms.servlet.key.ExamineRecovery + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + interface + agent + templatePath + /agent/kra/examineRecovery.template + ID + kraKRAExamineRecovery + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.key + + + + kraKRASrchKey + com.netscape.cms.servlet.key.SrchKey + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/srchKey.template + ID + kraKRASrchKey + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.keys + + + + kraKRAGetPk12 + com.netscape.cms.servlet.key.GetPk12 + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + ID + kraKRAGetPk12 + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.key + + + + kraKRAGetAsyncPk12 + com.netscape.cms.servlet.key.GetAsyncPk12 + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + ID + kraKRAGetAsyncPk12 + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.key + + + + kraGrantRecovery + com.netscape.cms.servlet.base.DisplayHtmlServlet + GetClientCert + true + htmlPath + /agent/kra/GrantRecovery.html + authority + kra + interface + agent + templatePath + /agent/kra/grantRecovery.template + ID + kraGrantRecovery + unauthorizedTemplate + /agent/kra/GenUnauthorized.template + AuthMgr + certUserDBAuthMgr + + + + kraKRASrchKeyForRecovery + com.netscape.cms.servlet.key.SrchKeyForRecovery + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/srchKeyForRecovery.template + ID + kraKRASrchKeyForRecovery + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.keys + + + + krakraqueryReq + com.netscape.cms.servlet.request.QueryReq + GetClientCert + true + parser + CertReqParser.NODETAIL_PARSER + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/queryReq.template + ID + krakraqueryReq + resourceID + certServer.kra.requests + AuthMgr + certUserDBAuthMgr + + + + kraKRADisplayBySerial + com.netscape.cms.servlet.key.DisplayBySerial + GetClientCert + true + AuthzMgr + BasicAclAuthz + authority + kra + templatePath + /agent/kra/displayBySerial.template + ID + kraKRADisplayBySerial + AuthMgr + certUserDBAuthMgr + resourceID + certServer.kra.key + + + + krapolicy + com.netscape.cms.servlet.admin.PolicyAdminServlet + ID + krapolicy + AuthzMgr + BasicAclAuthz + authority + kra + + + + + + kraauths + com.netscape.cms.servlet.admin.AuthAdminServlet + ID + kraauths + AuthzMgr + BasicAclAuthz + + + + krastart + com.netscape.cms.servlet.base.CMSStartServlet + AuthzMgr + BasicAclAuthz + cfgPath + [PKI_INSTANCE_PATH]/conf/CS.cfg + ID + krastart + 1 + + + + kraacl + com.netscape.cms.servlet.admin.ACLAdminServlet + ID + kraacl + AuthzMgr + BasicAclAuthz + + + + kraug + com.netscape.cms.servlet.admin.UsrGrpAdminServlet + ID + kraug + AuthzMgr + BasicAclAuthz + + + + + kraserver + com.netscape.cms.servlet.admin.CMSAdminServlet + ID + kraserver + AuthzMgr + BasicAclAuthz + + + + krakra + com.netscape.cms.servlet.admin.KRAAdminServlet + ID + krakra + AuthzMgr + BasicAclAuthz + + + + kralog + com.netscape.cms.servlet.admin.LogAdminServlet + ID + kralog + AuthzMgr + BasicAclAuthz + + + + services + com.netscape.cms.servlet.csadmin.MainPageServlet + GetClientCert + false + authorityId + kra + ID + services + templatePath + /services.template + + + + kraUpdateNumberRange + com.netscape.cms.servlet.csadmin.UpdateNumberRange + GetClientCert + false + authority + kra + ID + kraUpdateNumberRange + interface + ee + AuthMgr + TokenAuth + AuthzMgr + BasicAclAuthz + resourceID + certServer.clone.configuration.UpdateNumberRange + + + + kraDownloadPKCS12 + com.netscape.cms.servlet.csadmin.DownloadPKCS12 + GetClientCert + false + authority + kra + ID + kraDownloadPKCS12 + interface + ee + AuthMgr + TokenAuth + AuthzMgr + BasicAclAuthz + resourceID + certServer.clone.configuration + + + + kraGetTokenInfo + com.netscape.cms.servlet.csadmin.GetTokenInfo + GetClientCert + false + authority + kra + ID + kraGetTokenInfo + interface + ee + + + + resteasy.scan + true + + + + resteasy.servlet.mapping.prefix + /pki + + + + resteasy.resource.method-interceptors + + org.jboss.resteasy.core.ResourceMethodSecurityInterceptor + + + + + Resteasy + org.jboss.resteasy.plugins.server.servlet.HttpServletDispatcher + + +[PKI_OPEN_SEPARATE_PORTS_WEB_COMMENT] + + AgentRequestFilter + /agent/* + + + + AdminRequestFilter + /admin/* + /auths + /server + /log + /ug + /acl + /kra + + + + EERequestFilter + /ee/* + +[PKI_CLOSE_SEPARATE_PORTS_WEB_COMMENT] + + + Resteasy + /pki/* + + + + kraserver + /server + + + + krakra + /kra + + + + kralog + /log + + + + + kraug + /ug + + + + krastart + /start + + + + kraacl + /acl + + + + kraauths + /auths + + + + + + krapolicy + /krapolicy + + + + kraKRADisplayBySerialForRecovery + /agent/kra/displayBySerialForRecovery + + + + kraKRAGrantRecovery + /agent/kra/grantRecovery + + + + kraKRAGrantAsyncRecovery + /agent/kra/grantAsyncRecovery + + + + kraports + /ee/kra/ports + + + + kraKRADisplayTransport + /agent/kra/displayTransportCert + + + + kraKRARecoverBySerial + /agent/kra/recoverBySerial + + + + kraDynamicVariables + /dynamicVars.js + + + + kraheader + /agent/header + + + + kraTokenKeyRecovery + /agent/kra/TokenKeyRecovery + + + + kraSrchRecoverKey + /agent/kra/srchRecoverKey.html + + + + kraConnector + /agent/kra/connector + + + + kraSrchKey + /agent/kra/srchKey.html + + + + kraListRequests + /agent/kra/listRequests.html + + + + kraGenerateKeyPair + /agent/kra/GenerateKeyPair + + + + kraindex + /index + + + + kraKRAGetApprovalStatus + /agent/kra/getApprovalStatus + + + + kraKRAProcessReq + /agent/kra/processReq + + + + kraKRAExamineRecovery + /agent/kra/examineRecovery + + + + kraKRASrchKey + /agent/kra/srchKey + + + + kraKRAGetPk12 + /agent/kra/getPk12 + + + + kraKRAGetAsyncPk12 + /agent/kra/getAsyncPk12 + + + + kraGrantRecovery + /agent/kra/grantRecovery.html + + + + kraKRASrchKeyForRecovery + /agent/kra/srchKeyForRecovery + + + + krakraqueryReq + /agent/kra/queryReq + + + + kraKRADisplayBySerial + /agent/kra/displayBySerial + + + + csadmin-login + /admin/console/config/login + + + + + kraRegisterUser + /admin/kra/registerUser + + + + kraGetTransportCert + /admin/kra/getTransportCert + + + + csadmin-wizard + /admin/console/config/wizard + + + + kraGetConfigEntries + /admin/kra/getConfigEntries + + + + services + /services + + + + kraUpdateNumberRange + /ee/kra/updateNumberRange + + + + kraDownloadPKCS12 + /admin/console/config/savepkcs12 + + + + kraGetTokenInfo + /ee/kra/getTokenInfo + + + + + + + + + + 30 + + + + + + + + + + + + + + + + + + + + + + + -- cgit