Skip to content

Lifecycle Management

The “Lifecycle” of a certificate refers to the stages it goes through from creation to deletion. SSL-CLM automates every stage of this journey.

Before you can manage a certificate, you must find it.

  • Active Scanning: The SSL-CLM Agent probes your network (IP Ranges, Subnets) on ports 443, 8443, etc., to find listening services and download their certificates.
  • Passive Sync: We connect to CAs (DigiCert, MSCA) to download a list of everything they have ever issued to you.

Result: A consolidated Inventory.

When you need a new certificate:

  1. Request: Users fill out a form in the UI or use the API.
  2. Approval: If the request violates policy (e.g., “Validity > 398 days”), it might require manual Admin approval.
  3. Issuance: The CSR is sent to the backing CA (e.g., DigiCert). The CA signs it and returns the certificate.

3. Installation / Provisioning (The “Deployment”)

Section titled “3. Installation / Provisioning (The “Deployment”)”

A certificate sitting in a database is useless. It must be installed on a server.

  • Push: SSL-CLM connects to the target (F5 ViPR, NetScaler, IIS) and pushes the new certificate.
  • Binding: We update the configuration to “bind” the new certificate to the specific port (443).

Certificates have a short lifespan (currently 398 days max for public trust).

  • Window: By default, SSL-CLM attempts renewal 30 days before expiry.
  • Automation: If the certificate was originally installed by SSL-CLM, renewal is fully automated. The system generates a new key pair, gets it signed, and replaces the old one.

Renewal Flow

If a private key is compromised, or a server is decommissioned, the certificate must be revoked.

  • Action: Clicking “Revoke” in the UI sends a request to the CA.
  • CRL/OCSP: The CA adds the serial number to its Certificate Revocation List (CRL). Browsers will now reject this certificate.

Note: Revocation is irreversible.