dcos security

ENTERPRISE

管理 DC/OS 证书颁发机构

dcos security 命令让您管理 DC/OS 证书颁发机构资格。

dcos security cluster ca

管理 DC/OS 证书颁发机构,包括签署证书、生成 CSR 以及签署信息检索。

  1. Usage: dcos security cluster ca cacert [OPTIONS]
  2. Fetch the PEM-encoded signing CA certificate (either a root CA certificate
  3. or an intermediate CA certificate).
  4. Options:
  5. -h, --help Show this message and exit.
  1. Usage: dcos security cluster ca newcert [OPTIONS]
  2. Create and sign a new certificate.
  3. Create a new certificate based only on the command line options provided.
  4. Options:
  5. --cn TEXT Canonical Name. [required]
  6. --name-c TEXT Country.
  7. --name-st TEXT State.
  8. --name-o TEXT Organization.
  9. --name-l TEXT Locality.
  10. --name-ou TEXT Organization unit.
  11. --key-algo [rsa|ecdsa] Key algorithm.
  12. --key-size [256|384|521|2048|4096|8192]
  13. Key size.
  14. --host TEXT SAN host, may be specified multiple times.
  15. [required]
  16. -p, --profile TEXT Signing profile to use.
  17. -j, --json Output data in JSON format.
  18. -h, --help Show this message and exit.
  1. Usage: dcos security cluster ca newkey [OPTIONS]
  2. Create a new key and a new CSR.
  3. Options:
  4. --cn TEXT Canonical Name. [required]
  5. --name-c TEXT Country.
  6. --name-st TEXT State.
  7. --name-o TEXT Organization.
  8. --name-l TEXT Locality.
  9. --name-ou TEXT Organization unit.
  10. --key-algo TEXT Key algorithm.
  11. --key-size INTEGER Key size.
  12. --host TEXT SAN host, may be specified multiple times. [required]
  13. -j, --json Output data in JSON format.
  14. -h, --help Show this message and exit.
  1. Usage: dcos security cluster ca profile [OPTIONS]
  2. Print information about a signing profile.
  3. If no profile name is specified or the given profile does not exist, the
  4. default profile information is returned.
  5. Options:
  6. -p, --profile TEXT Signing profile to fetch information about.
  7. -j, --json Output data in JSON format.
  8. -h, --help Show this message and exit.
  1. Usage: dcos security cluster ca sign [OPTIONS]
  2. Sign a CSR.
  3. Options:
  4. --csr FILENAME Path to a CSR to sign. [required]
  5. -p, --profile TEXT Signing profile to use.
  6. -h, --help Show this message and exit.

dcos security cluster directory

管理 LDAP 相关的设置。

  1. Usage: dcos security cluster directory get_config [OPTIONS]
  2. Retrieve current LDAP configuration.
  3. Options:
  4. -j, --json Output data in JSON format.
  5. -h, --help Show this message and exit.
  1. Usage: dcos security cluster directory import_group [OPTIONS] GID
  2. Import an LDAP group.
  3. Attempt to import a group of users from the configured directory (LDAP)
  4. backend. See IAM documentation for details on group import.
  5. Options:
  6. -h, --help Show this message and exit.
  1. Usage: dcos security cluster directory import_user [OPTIONS] UID
  2. Import an LDAP user.
  3. Attempt to import a user from the configured directory (LDAP) backend.
  4. Options:
  5. -h, --help Show this message and exit.
  1. Usage: dcos security cluster directory test [OPTIONS] UID PASSWORD
  2. Test connection to the LDAP backend.
  3. Perform basic feature tests. Verify that the current directory (LDAP)
  4. configuration parameters allow for a successful connection to the directory
  5. backend. For instance, this endpoint simulates the procedure for
  6. authentication via LDAP, but provides more useful feedback upon failure than
  7. the actual login endpoint.
  8. Options:
  9. -j, --json Output data in JSON format.
  10. -h, --help Show this message and exit.

dcos security cluster oidc

管理 OpenID Connect 设置。

  1. Usage: dcos security cluster oidc add [OPTIONS] OIDC_ID
  2. Configure a new OIDC provider.
  3. Options:
  4. -d, --description TEXT Description of the new OIDC provider. [required]
  5. -i, --issuer TEXT Issuer of the new OIDC provider. [required]
  6. -b, --base-url TEXT Base URL of the new OIDC provider. [required]
  7. -c, --client-secret TEXT Client secret for the new OIDC provider. [required]
  8. --client-id TEXT Client ID for the new OIDC provider. [required]
  9. -h, --help Show this message and exit.
  1. Usage: dcos security cluster oidc delete [OPTIONS] OIDC_ID
  2. Delete an OIDC provider configuration.
  3. Options:
  4. -h, --help Show this message and exit.
  1. Usage: dcos security cluster oidc modify [OPTIONS] OIDC_ID
  2. Modify an existing OIDC provider configuration.
  3. Options:
  4. -d, --description TEXT Description for the OIDC provider. [required]
  5. -i, --issuer TEXT Issuer of the OIDC provider. [required]
  6. -b, --base-url TEXT Base URL of the OIDC provider. [required]
  7. -c, --client-secret TEXT Client secret for the OIDC provider. [required]
  8. --client-id TEXT Client ID of the new OIDC provider. [required]
  9. -h, --help Show this message and exit.
  1. Usage: dcos security cluster oidc show [OPTIONS] [OIDC_ID]...
  2. Get an overview for the configured OIDC providers.
  3. Print detailed information about a given provider or an overview depending
  4. on whether a provider ID was specified or not.
  5. If multiple providers are specified, only the first ID is evaluated.
  6. Options:
  7. -j, --json Output data in JSON format.
  8. -h, --help Show this message and exit.

dcos security cluster saml

管理 SAML 设置。

  1. Usage: dcos security cluster saml add [OPTIONS] SAML_ID
  2. Configure a new SAML provider.
  3. Options:
  4. -d, --description TEXT A description of the SAML provider. [required]
  5. -i, --idp-metadata FILENAME File containing IDP metadata in XML format.
  6. [required]
  7. -b, --sp-base-url TEXT The base URL for the service provider.
  8. [required]
  9. -h, --help Show this message and exit.
  1. Usage: dcos security cluster saml delete [OPTIONS] SAML_ID
  2. Delete a SAML provider configuration.
  3. Options:
  4. -h, --help Show this message and exit.
  1. Usage: dcos security cluster saml modify [OPTIONS] SAML_ID
  2. Modify an existing SAML provider configuration.
  3. Options:
  4. -d, --description TEXT A description of the SAML provider. [required]
  5. -i, --idp-metadata FILENAME File containing IDP metadata in XML format.
  6. [required]
  7. -b, --sp-base-url TEXT The base URL for the service provider.
  8. [required]
  9. -h, --help Show this message and exit.
  1. Usage: dcos security cluster saml show [OPTIONS] [SAML_ID]...
  2. Get an overview for the configured SAML providers.
  3. Print detailed information about a given provider or an overview depending
  4. on whether a provider ID was specified or not.
  5. If multiple providers are specified, only the first ID is evaluated.
  6. Options:
  7. -j, --json Output data in JSON format.
  8. -h, --help Show this message and exit.

dcos security cluster secret-store

管理密钥存储库设置。

  1. Usage: dcos security cluster secret-store seal-status [OPTIONS] STORE_ID
  2. Return the seal status of the store.
  3. Options:
  4. -j, --json Output data in JSON format.
  5. -h, --help Show this message and exit.
  1. Usage: dcos security cluster secret-store show [OPTIONS] [STORE_ID]...
  2. Overview of the configured secrets stores.
  3. Print detailed information about secret store or an overview depending on
  4. whether the secrets store ID was specified or not.
  5. If multiple secrets stores are specified, only the first ID is evaluated.
  6. Options:
  7. -j, --json Output data in JSON format.
  8. -h, --help Show this message and exit.
  1. Usage: dcos security cluster secret-store status [OPTIONS] STORE_ID
  2. Print status information about a given backend.
  3. Options:
  4. -j, --json Output data in JSON format.
  5. -h, --help Show this message and exit.
  1. Usage: dcos security cluster secret-store unseal [OPTIONS] STORE_ID KEY
  2. Unseal a given store.
  3. Options:
  4. -j, --json Output data in JSON format.
  5. -h, --help Show this message and exit.

dcos security org

帐户管理命令。

  1. Usage: dcos security org groups [OPTIONS] COMMAND [ARGS]...
  2. Groups and group membership manipulation.
  3. Options:
  4. -h, --help Show this message and exit.
  5. Commands:
  6. add_user Add user identified by UID to group GID.
  7. create Create a group.
  8. del_user Remove user identified by UID from group GID.
  9. delete Remove a group.
  10. grant Grant the group with the given GID permission...
  11. members List members of a group.
  12. revoke Revoke permission for the group with the...
  13. show Print basic information about a group or...
  1. Usage: dcos security org groups add_user [OPTIONS] GID UID
  2. Add user identified by UID to group GID.
  3. Options:
  4. -h, --help Show this message and exit.
  1. Usage: dcos security org groups create [OPTIONS] GID
  2. Create a group.
  3. Options:
  4. -d, --description TEXT
  5. -h, --help Show this message and exit.
  1. Usage: dcos security org groups del_user [OPTIONS] GID UID
  2. Remove user identified by UID from group GID.
  3. Options:
  4. -h, --help Show this message and exit.
  1. Usage: dcos security org groups delete [OPTIONS] GID
  2. Remove a group.
  3. Options:
  4. -h, --help Show this message and exit.
  1. Usage: dcos security org groups members [OPTIONS] GID
  2. List members of a group.
  3. Options:
  4. -j, --json Output data in JSON format.
  5. -h, --help Show this message and exit.
  1. Usage: dcos security org groups show [OPTIONS] [GIDS]...
  2. Print basic information about a group or groups.
  3. Options:
  4. -j, --json Output data in JSON format.
  5. -h, --help Show this message and exit.
  1. dcos security org groups grant [OPTIONS] GID RID ACTION
  2. Grant the group with the given GID permission to enact a given ACTION on the
  3. resource with the given RID.
  4. Options:
  5. --description TEXT
  6. The description of the ACL with the given RID. If an ACL
  7. exists with the given RID then the description will not be
  8. overwritten. Default: "Created with the security CLI".
  9. -h, --help
  10. Show this message and exit.
  1. Usage: security org groups revoke [OPTIONS] GID RID ACTION
  2. Revoke permission for the group with the given GID to enact a given ACTION
  3. on the resource with the given RID.
  4. Options:
  5. -h, --help Show this message and exit.
  1. Usage: dcos security org service-accounts [OPTIONS] COMMAND [ARGS]...
  2. Service accounts manipulation.
  3. Options:
  4. -h, --help Show this message and exit.
  5. Commands:
  6. create Create service account identified by SID.
  7. delete Delete service account identified by SID.
  8. keypair Create public-private keypair for use with...
  9. show Print details of a service account identified...
  1. Usage: dcos security org service-accounts create [OPTIONS] SID
  2. Create service account identified by SID.
  3. '--public-key' and '--secret' options are mutually exclusive.
  4. Options:
  5. -p, --public-key FILENAME Path to public key to use, '-' reads from STDIN
  6. -s, --secret TEXT Passphrase to use.
  7. -d, --description TEXT Description of the newly created service account.
  8. ID of the account is used by default.
  9. -h, --help Show this message and exit.
  1. Usage: dcos security org service-accounts delete [OPTIONS] SID
  2. Delete service account identified by SID.
  3. Options:
  4. -h, --help Show this message and exit.
  1. Usage: dcos security org service-accounts keypair [OPTIONS] PRIVATE_KEY PUBLIC_KEY
  2. Create public-private keypair for use with service accounts.
  3. Options:
  4. -l, --key-length [2048|4096] Length of the RSA key.
  5. -h, --help Show this message and exit.
  1. Usage: dcos security org service-accounts show [OPTIONS] [SIDS]...
  2. Print details of a service account identified by SID.
  3. Options:
  4. -j, --json Output data in JSON format.
  5. -h, --help Show this message and exit.
  1. Usage: dcos security org users [OPTIONS] COMMAND [ARGS]...
  2. Users manipulation.
  3. Options:
  4. -h, --help Show this message and exit.
  5. Commands:
  6. create Create a new user.
  7. delete Delete user identified by UID.
  8. grant Grant the user with the given UID permission...
  9. revoke Revoke permission for the user with the given...
  10. show Print information about a user or users.
  1. Usage: dcos security org users create [OPTIONS] UID
  2. Create a new user.
  3. Options:
  4. -d, --description TEXT Description.
  5. -p, --password TEXT Password.
  6. -h, --help Show this message and exit.
  1. Usage: dcos security org users delete [OPTIONS] UID
  2. Delete user identified by UID.
  3. Options:
  4. -h, --help Show this message and exit.
  1. Usage: dcos security org users show [OPTIONS] [UIDS]...
  2. Print information about a user or users.
  3. Options:
  4. -j, --json Output data in JSON format.
  5. -h, --help Show this message and exit.
  1. Usage: security org users grant [OPTIONS] UID RID ACTION
  2. Grant the user with the given UID permission to enact a given ACTION on the
  3. resource with the given RID.
  4. Options:
  5. --description TEXT The description of the ACL with the given RID. If an ACL
  6. exists with the given RID then the description will not be
  7. overwritten. Default: "Created with the security CLI".
  8. -h, --help Show this message and exit.
  1. Usage: security org users revoke [OPTIONS] UID RID ACTION
  2. Revoke permission for the user with the given UID to enact a given ACTION on
  3. the resource with the given RID.
  4. Options:
  5. -h, --help Show this message and exit.

dcos security secrets

  1. Usage: dcos security secrets create [OPTIONS] PATH
  2. Create a secret.
  3. Store a secret under the path PATH.
  4. Options:
  5. -s, --store-id TEXT Secrets backend to use.
  6. -v, --value TEXT Value of the secret.
  7. -f, --value-file FILENAME Treat contents of the file as value of the secret.
  8. The contents are assumed to be text encoded via
  9. UTF-8.
  10. -h, --help Show this message and exit.
  1. Usage: dcos security secrets create-sa-secret [OPTIONS] SA_PRIVATE_KEY SA_UID
  2. SECRET_PATH
  3. Create a service account secret.
  4. Create a secret that can be used by services running on top of DC/OS to
  5. login to service account.
  6. Options:
  7. -s, --store-id TEXT Secrets backend to use.
  8. --strict Use strict cluster configuration.
  9. -h, --help Show this message and exit.
  1. Usage: dcos security secrets delete [OPTIONS] PATH
  2. Delete a secret.
  3. Deletes a secret stored under the path PATH.
  4. Options:
  5. -s, --store-id TEXT Secrets backend to use.
  6. -h, --help Show this message and exit.
  1. Usage: dcos security secrets get [OPTIONS] PATH
  2. Get a secret from the store by its path.
  3. Get a secret stored under the path PATH.
  4. Options:
  5. -s, --store-id TEXT Secrets backend to use.
  6. -j, --json Output data in JSON format.
  7. -h, --help Show this message and exit.
  1. Usage: dcos security secrets list [OPTIONS] PATH
  2. List secret keys in a given path.
  3. Lists all secrets stored under the path PATH.
  4. Options:
  5. -s, --store-id TEXT Secrets backend to use.
  6. -j, --json Output data in JSON format.
  7. -h, --help Show this message and exit.
  1. Usage: dcos security secrets update [OPTIONS] PATH
  2. Update a secret.
  3. Update an existing secret stored under the path PATH.
  4. Options:
  5. -s, --store-id TEXT Secrets backend to use.
  6. -v, --value TEXT Value of the secret.
  7. -f, --value-file FILENAME Treat contents of the file as value of the secret.
  8. The contents are assumed to be text encoded via
  9. UTF-8.
  10. -h, --help Show this message and exit.