Ascio Web Service v3
PHP 5 Classes CreateDnsSecKey
DNSSEC is an extension to DNS that enables clients (like a web browser) to make sure that it is
accessing the domain that wants to access. DNSSEC was designed to protect clients from forged DNS data. When a DNSSEC-enabled name server is responding to a query for a domain that is DNSSEC-enabled, it
digitally signs the response, allowing the client to verify the authenticity of the response.
AWS allows you to register domains that are DNSSEC-enabled with the NIC. Note that the relevant NIC
needs to support DNSSEC for this to happen. You do this by creating DNSSEC Key Objects (handles), and you then specify up to five of these on your
orders. At the time of writing, AWS only supports DNSSEC for .SE, .FI, .EU, .NL. Refer to the relevant TLD Kits for additional information.
Also see the documentation for the DnsSecKey object in this document. Additional reading: http://en.wikipedia.org/wiki/Dnssec
Always get the right IP-address
CreateDnsSecKeyResponse CreateDnsSecKey(SecurityHeaderDetails $securityHeader,CreateDnsSecKeyRequest $request)
Response codes
ResultCode | Message | Value |
---|---|---|
200 | OK | |
401 | Authorization failed | |
501 | Syntax error in parameters or arguments | |
506 | Required attribute missing in request |
CreateDnsSecKey Request
Property |
---|
request |
CreateDnsSecKeyResponse
Property | Description |
---|---|
CreateDnsSecKeyResult | |
DnsSecKey | |
ResultCode | Example: 1 |
ResultMessage | |
Errors |
Used in Classes
PHP 5 Classes example
<?php
namespace ascio\v3\examples;
require("../service/autoload.php");
require("../../lib/AscioConfig.php");
use ascio\v3 as ascio;
use ascio\lib as lib;
function createDnsSecKeyExample() {
$config = new lib\Config();
$env = $config->get("testing"); //testing or live
$credentials = array("Account"=>$env->getAccount(), "Password" => $env->getPassword());
$headers = [];
$headers[] = new \SoapHeader("http://www.ascio.com/2013/02","SecurityHeaderDetails", $credentials, false);
$headers[] = new \SoapHeader("http://www.ascio.com/2013/02","ImpersonationHeaderDetails", ["TransactionAccount" => "mysubaccount"], false);
$ascioClient = new ascio\AscioService(array("trace" => true),$env->getWsdl("v3"));
$ascioClient->__setSoapHeaders($headers);
$dnsSecKey = new ascio\DnsSecKey();
$dnsSecKey->setHandle("JD123");
$dnsSecKey->setStatus("StatusTest");
$dnsSecKey->setDigestAlgorithm("RSA-SHA256");
$dnsSecKey->setDigestType("SHA-256");
$dnsSecKey->setDigest("846E5ED4AB6788032B89393619752F662CF2B7B2046A8EC0804DF88F1469AC1E");
$dnsSecKey->setProtocol("ProtocolTest");
$dnsSecKey->setKeyType("KeyTypeTest");
$dnsSecKey->setKeyAlgorithm("KeyAlgorithmTest");
$dnsSecKey->setKeyTag("2224");
$dnsSecKey->setPublicKey("PublicKeyTest");
$request = new ascio\CreateDnsSecKeyRequest();
$request->setDnsSecKey($dnsSecKey);
try {
$response = $ascioClient->CreateDnsSecKey(new ascio\CreateDnsSecKey($request));
} catch (\Exception $e) {
echo ("[".$e->faultcode . "] ". $e->faultstring);
return;
}
$result = $response->CreateDnsSecKeyResult;
echo "Code: ".$result->getResultCode()."\n";
echo "Message: ".$result->getResultMessage()."\n";
return $result;
}
createDnsSecKeyExample();
https://aws.demo.ascio.com/v3/aws.wsdl (OTE)
https://aws.ascio.com/v3/aws.wsdl (Live)
Please configure the IP-Whitelisting in the portal/demo-portal.