To learn how to use REST API to add a new SSL/TLS Certificate monitor: Click here
To create a new monitor, follow the steps given below:
Following are the list of metrics that are monitored in SSL/TLS Certificate monitoring:
| Parameter | Description |
|---|---|
| CERTIFICATE CHAIN SUMMARY | |
| Certificate Order | Shows the position of the certificate within the certificate chain. |
| Common Name (CN) | Name of the host or domain to which the certificate is issued. |
| Issued By | The name of the certificate authority (CA) that provided the certificate for the domain. |
| Days to Expire | Displays the expiration date of the certificate. |
| Expiry Status | The expiration status of the certificate. (Active, Expiring Soon, or Expired). |
| CERTIFICATE ORDER: SERVER CERTIFICATE/ CERTIFICATE CHAIN | |
| VALIDITY | |
| Issued On | Date at which the certificate was issued. |
| Expires On | Date at which the certificate will expire. |
| Days to Expire | Number of days to expiry. |
| ISSUED BY | |
| Common Name (CN) | Name of the host or domain that issues the certificate. |
| Organization (O) | Name of the organization that issues the certificate. |
| Organization Unit (OU) | Name of the organization unit making the request. |
| ISSUED TO | |
| Common Name (CN) | Name of the host or domain to which the certificate is issued. |
| Organization (O) | Name of the organization to which the certificate is issued. |
| Organization Unit (OU) | Name of the organization unit making the request. |
| SHA-256 fingerprint | The hashed value of the SSL certificate's entire data, including its public key and other details. |
| Signature Algorithm | Displays the signing algorithm used for the certificate. |
| Parameter | Description |
|---|---|
| Vulnerability Status | Indicates whether the cipher is secure or weak. |
| Secure Cryptographic Components | The essential security features within the SSL/TLS domain, providing crucial protections for data transmission and integrity. |
| PROTOCOLS AND CIPHERS | |
| Ciphers | The primary column for protocols and ciphers. |
| Protocol Version | The version of the protocol associated with the cipher. |
| Key size(bits) | The key size of the encryption algorithm (in bits). |
| Cipher Status | Indicates whether the cipher is secure or weak. |
Thank you for your feedback!