Metadata-Version: 2.1
Name: aos-keys
Version: 1.3.0rc2
Summary: Aos access manager
Home-page: UNKNOWN
Author: EPAM Systems
Author-email: support@aoscloud.io
License: Apache License 2.0
Platform: any
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.6
Classifier: Programming Language :: Python :: 3.7
Classifier: Programming Language :: Python :: 3.8
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python :: 3.10
Requires-Python: >=3.6
Description-Content-Type: text/markdown
Requires-Dist: rich (>=12.3.0)
Requires-Dist: requests (>=2.22)
Requires-Dist: requests-pkcs12 (>=1.14)
Requires-Dist: cryptography (<39,>=37.0.1)
Requires-Dist: importlib-metadata (==4.2.0) ; python_version < "3.8"
Requires-Dist: importlib-resources (>=3.0) ; python_version < "3.9"
Provides-Extra: dev
Requires-Dist: pylint (>=2.13.7) ; extra == 'dev'
Requires-Dist: flake8 (>=4.0.1) ; extra == 'dev'
Requires-Dist: wemake-python-styleguide (>=0.16.1) ; extra == 'dev'
Requires-Dist: pytest (>=7.0.1) ; extra == 'dev'
Requires-Dist: pytest-mock (>=3.6.1) ; extra == 'dev'
Requires-Dist: coverage (>=6.2) ; extra == 'dev'

Aos user keys management tool
=====================
This tool is part of the Aos SDK.


Overview
--------
This tool will help you issue new user certificates for Aos Cloud.

Using this tool you'll be able to:
* Issue new user certificate in pkcs12 format.
* Show info about user certificate.
* Convert PKCS12 certificate to PEM key and certificate files.


Prepequicities
--------------
* Python 3.6+


Installation
------------
```bash
pip3 install aos-keys
```

Usage
------------

### Issue new user certificate:
```bash
aos-keys new-user -d {aoscloud.io} -t {token} {--oem|--sp}
```
>Where: 
>* **-d** - Aos CLoud domain to register user
>* **-t** - User Token
>* **-oem** or **-sp** - Certificate for OEM or SP User 

Example:
```bash
aos-keys new-user -d aoscloud.io -t 1111 --oem
```

### Show info about certificate and related user:
```bash
aos-keys info -c {path-to-cert} {--oem|--sp}
```
>Where: 
>* **-c** - Path to user certificate
>* **-sp** - Show info of default SP user
>* **-oem** or **-sp** - Show info of default SP user

Example:
Show info about default SP user certificate
```bash
aos-keys info --sp
```
Show info about default OEM user certificate
```bash
aos-keys info --oem
```


