|  | 
| 1 | 1 | { | 
| 2 |  | -    "$schema": "/Users/hroszell/coding/dev/staff-tools/keyfactor.github.io/v2/integration-manifest-schema.json", | 
|  | 2 | +    "$schema": "https://keyfactor.github.io/v2/integration-manifest-schema.json", | 
| 3 | 3 |     "integration_type": "orchestrator", | 
| 4 | 4 |     "name": "Azure Key Vault Orchestrator", | 
| 5 | 5 |     "status": "production", | 
| 6 | 6 |     "update_catalog": true, | 
| 7 | 7 |     "link_github": true, | 
| 8 | 8 |     "release_dir": "AzureKeyVault\\bin\\Release", | 
| 9 | 9 |     "support_level": "kf-supported", | 
| 10 |  | -    "description": "This integration allows the orchestrator to act as a client with access to an instance of the Azure Key Vault; allowing you to manage your certificates stored in the Azure Keyvault via Keyfactor.", | 
|  | 10 | +    "description": "The <Orchestrator Name> Universal Orchestrator extension enables remote management of cryptographic certificates in various environments by performing tasks such as inventory, addition, and removal of certificates, and discovery of new certificate stores.", | 
| 11 | 11 |     "about": { | 
| 12 | 12 |         "orchestrator": { | 
| 13 | 13 |             "UOFramework": "10.1", | 
| 14 | 14 |             "keyfactor_platform_version": "10.0", | 
| 15 | 15 |             "pam_support": true, | 
| 16 |  | -            "win": { | 
| 17 |  | -                "supportsCreateStore": true, | 
| 18 |  | -                "supportsDiscovery": true, | 
| 19 |  | -                "supportsManagementAdd": true, | 
| 20 |  | -                "supportsManagementRemove": true, | 
| 21 |  | -                "supportsReenrollment": false, | 
| 22 |  | -                "supportsInventory": true, | 
| 23 |  | -                "platformSupport": "Unused" | 
| 24 |  | -            }, | 
| 25 |  | -            "linux": { | 
| 26 |  | -                "supportsCreateStore": true, | 
| 27 |  | -                "supportsDiscovery": true, | 
| 28 |  | -                "supportsManagementAdd": true, | 
| 29 |  | -                "supportsManagementRemove": true, | 
| 30 |  | -                "supportsReenrollment": false, | 
| 31 |  | -                "supportsInventory": true, | 
| 32 |  | -                "platformSupport": "Unused" | 
| 33 |  | -            }, | 
| 34 | 16 |             "store_types": [ | 
| 35 | 17 |                 { | 
| 36 | 18 |                     "BlueprintAllowed": false, | 
|  | 
| 59 | 41 |                         "Enrollment": false, | 
| 60 | 42 |                         "Remove": true | 
| 61 | 43 |                     }, | 
| 62 |  | -                    "ClientMachineDescription": "For the Client Machine field, enter the GUID of the tenant ID for the Azure Keyvault instance. For example: '123e4567-e89b-12d3-a456-426614174000'.", | 
| 63 |  | -                    "StorePathDescription": "For the Store Path field, enter the Subscription ID, Resource Group name, and Vault name in the format '{subscription id}:{resource group name}:{vault name}'. For example: '123e4567-e89b-12d3-a456-426614174000:myResourceGroup:myKeyVault'." | 
|  | 44 | +                    "ClientMachineDescription": "The GUID of the tenant ID of the Azure Keyvault instance; for example, '12345678-1234-1234-1234-123456789abc'.", | 
|  | 45 | +                    "StorePathDescription": "A string formatted as '{subscription id}:{resource group name}:{vault name}'; for example, '12345678-1234-1234-1234-123456789abc:myResourceGroup:myVault'." | 
| 64 | 46 |                 } | 
| 65 | 47 |             ] | 
| 66 | 48 |         } | 
|  | 
0 commit comments