SSL Certificate Operations

The various operations performed using SSL certificates are:

  1. Import and Export Certificates
  2. Edit and Delete Certificates
  3. Certificate Requests
  4. Control Expiry Notification Schedules
  5. Domain Expiration
  6. SSL Certificate Group

1. Import and Export Certificates

1.1 Allowed Certificate Types

Key Manager Plus allows you to import and export the following certificate types:

  • .cer
  • .crt
  • .pem
  • .der
  • .p7b
  • .pfx
  • .p12
  • .pkcs12
  • .jks
  • .keystore

1.2 Steps to Import the Certificates in your Network

In addition to certificate discovery, Key Manager Plus provides a few other ways in which you can manually add SSL certificates into the repository. To do so, follow the below steps:

  1. Navigate to the SSL >> Certificates tab and click the Add button.
  2. The Add Certificate window displays the following options:
    1. Certificates – Browse and import the required certificate file directly from your system.
    2. Certificate Content – Copy the content of the required certificate file and paste it in the text box.
    3. Keystore Based – Import all individual certificates available in a Keystore simultaneously. Upload the required Keystore file and enter its corresponding password (if any).
    4. Certificate Details  Browse and import the .csv file with the required certificate details. Refer to section 7.2.1 below for more information on this option.
  3. Click Add. The certificates or certificate details will be imported to the Key Manager Plus repository.

1.2.i Importing Certificate Details

Apart from adding SSL certificates, Key Manager Plus allows you to import certificate details into the repository. This option comes in handy in cases where you have the details of an SSL certificate but not the certificate itself.
Mentioned below are a few real time scenarios where certain users may not have access to SSL certificates:

  • An IT admin who manages a set of SSL certificates deployed to servers that reside in a demilitarized zone from which Key Manager Plus cannot discover the certificates.
  • A compliance manager whose responsibility is to ensure that all digital identities used in their environment, including SSL certificates to which they do not have access, are documented in order to stay compliant and adhere to security standards.
  • The procurement team in an enterprise that handles the business side of things, such as purchases, will not have direct access to SSL certificates like the engineering team, which takes care of the deployment and management of the certificates. Without direct access, the procurement team cannot determine when to renew existing SSL certificates and/or acquire new ones. Without timely renewal of certificates, there is a huge risk of exposing the enterprise's domains to cyberthreats.

In the scenarios presented above, the end user does not possess the SSL certificates for various reasons. By adding certificate details to Key Manager Plus, you can ensure that no certificate in your environment goes forgotten or undocumented. The Certificate Details feature helps you to consolidate and track the expiration of the certificates from a centralized console in the product and send out scheduled alerts.

When the certificate details are displayed in the SSL certificates table, they will be classified under the type 'Vault.' In SSL >> Certificates, click the column chooser to display the Type column in the certificates table.

Important Notes: 

  1. Before you upload the CSV file, ensure that the certificate details are entered in the following order: Certificate Name, Serial Number, Valid From, Expiry Date, Issuer, Organization, Organization Unit, and Description.
  2. Among the aforementioned fields, the following are mandatory: Certificate Name, Serial Number, Valid From, Expiry Date. Even if one mandatory field is missing in the CSV file, the file will not be uploaded.
  3. The Valid From date and Expiry date must be entered in the following format: DD-MM-YYYY. Example: 18-09-2022.
  4. The maximum character length allowed for the 'Description' field in the CSV file is 250.
  5. The maximum number of lines allowed in the CSV file is 500. If the line count exceeds the limit, the file will not be uploaded.
  6. Certificate details added via this method will impact your licensed key count.
  7. Example:, 12345678, 01-01-2022, 05-02-2022, test issuer, test organization, test organization unit, test description.

1.3 Steps to Import Issuer Certificates

Key Manager Plus allows you to import issuer certificates into the repository and build a complete certificate chain in the product.

  1. Navigate to SSL >> Certificates. Select the required end certificate.
  2. Under the More dropdown, select Import Issuer.
  3. In the pop-up that appears, browse and add the issuer certificate.
  4. The additional issuer certificates you add will be appended to the existing SSL certificate in the repository based on the issuer name. To download the complete chain with the private key, export the certificate in JKS, PKCS, or PEM formats.

1.4 Steps to Export the Certificates in your Network

  1. Navigate to SSL >> Certificates.
  2. In the list view, click the certificate you want to export.
  3. In the certificate details window, click Export on the top right corner and select the required format in the which you want to export the certificate.
  4. The certificate will be downloaded to your machine in the selected format.

2. Edit and Delete Certificates

2.1 Steps to Edit a Certificate from Key Manager Plus Repository

To edit a certificate from Key Manager Plus repository:

  1. Navigate to the SSL >> Certificates tab.
  2. Select the certificate to be edited, click More and select Edit from the drop-down.
  3. In the Edit Certificate pop-up that appears, edit the DNS Name, Description and Provisioning Type.
  4. You can choose to Deploy Certificate to all servers on Auto Renewal. 
  5. Click Save.

Note: You will be able to deploy certificate to all servers on auto renewal only if the user credentials are available.

2.2 Steps to Delete a Certificate from Key Manager Plus Repository

You can delete the certificates that are currently not in use. To delete a certificate from Key Manager Plus repository:

  1. Navigate to the SSL >> Certificates tab.
  2. Select the certificates to be deleted. 
  3. Click More and select Delete from the drop-down.
  4. Click Ok in the pop-up that appears. 

3. Certificate Requests

The certificate request workflow is as follows:

  1. Add certificate request
  2. Close certificate request

3.1 Add Certificate Request

To add requests for new certificates or addition of sub-domains to existing certificates, in Key Manager Plus:

  1. Navigate to the SSL >> CSR >> Certificate Request and click the Add Request button.
  2. Select the type of request – Certificate or domain addition.
    1. New Certificate – Attach a CSR to your request (optional) and a domain name for the new certificate.
    2. Add domain – Enter the name of the new domain and select a parent domain from the certificates added to the Key Manager Plus repository.
  3. Enter the Email-Id to which you would like to send the request and specify the certificate validity period. These mail addresses can be that of an administrator, an intermediary who handles certificate requests, or even your help desk software to raise the certificate request as a ticket.
    1. For eg.,,
  4. The Operators can directly Select the administrators to notify them about the certificate request via email. 
  5. Select Additional fields to add additional information such as device name and IP address
  6. Click Add Request to add it to the list of request in the Certificate Request tab and to send the same to the specified email addresses.


3.2 Certificate Request Status

A certificate request is in either of the following statuses.

  1. Open
  2. Closed

When a certificate request is raised, it is automatically elevated to the Open State. The request details can be viewed from the SSL >> Certificate request tab, on clicking the domain name of the request.

3.3 Close Certificate Request

To terminate the certificate request life-cycle:

  1. Navigate to the SSL >> Certificate Request tab in the GUI.
  2. Click the Open status link in the right corner of the table against the required open request process.
  3. In the Close Request window, add an optional Annotation, and attach the Certificate issued (optional), specify the Email-ids of users to whom the certificate is to be sent and click the Save & Close button. Once you click the button, the request is automatically moved to the Closed state.
  4. If a SSL certificate is attached while closing the request, the certificate is automatically imported to the Key Manager Plus repository.
  5. Also, the issued certificate is e-mailed to the user who raises the request, the user who closes the request and also to those e-mail ids specified at the time of closing the request.


4. Control Expiry Notification Schedule

You can customize the periodicity of notifications you receive when a certificate is about to expire. To customize the notifications:

  1. Navigate to Settings >> Notifications tab in the GUI.
  2. Select the Certificates expire after checkbox and the number of days before the expiry of certificate within which you should start receiving notifications.
  3. Select the Email or Syslog checkbox and enter appropriate details.
  4. Click the Save button.

Note: You will receive notifications every day after the selected date before the expiry of a certificate. For instance, if a certificate is about to expire in the last week of a month, and you select the Notify if SSL certificates are expiring within 7 days option, then, you will receive a notification that your certificate is about to expire every day of the week before the expiry of the certificate.

5. Domain Expiration

Key Manager Plus has an in-built WHOIS look up tool that helps administrators query and obtain information about any registered domain name such as ownership details, date of registration & expiration, IP address history and more.

To access the WHOIS look up tool,

  1. Navigate to Settings >> Domain Expiration.
  2. In the window that opens, enter the domain name for which you want to obtain the details (in terms of a top-level domain or sub domain of a top-level domain).
  3. Click Get Details. The details about the domain are displayed in the dialog box that opens below.

Note: Before performing the lookup, ensure that port 43 is open in your environment without which connection to WHOIS servers would fail.

5.1 Track Domain Expiration through WHOIS Lookup

Apart from tracking certificate expiration, Key Manager Plus also helps administrators keep a tab on their expiring domain names through an automated WHOIS look up. The domain expiration details fetched through the lookup are displayed in SSL >> Certificates tab against its corresponding SSL certificate. Also, administrators can choose to receive timely email notifications of their expiring domains by configuring it in Settings >> Notification tab.

How does the WHOIS lookup work?

Fetching domain expiration details requires a two-stage lookup to WHOIS servers from Key Manager Plus. The first lookup provides the details of the WHOIS server with which the domain was registered by its domain registrar. The second lookup provides information about the domain such as owner details, expiration date etc., All these operations are automated the from Key Manager Plus' interface.

Note: Connection to WHOIS servers requires the use of Port 43. Ensure that port 43 is open in your environment, else the connection would fail and Domain Expiration will be marked Not Available (NA) in the Certificates tab.

6. SSL Certificate Group

Key Manager Plus allows you to organize SSL certificates into various logical groups and execute actions in bulk on the groups.

6.1 Create Certificate Groups

To create a certificate group,

  1. Click the Certificate group icon in the top-right corner of the SSL >> Certificates tab.
  2. Click Add Group. You will be directed to the Add certificate group window. 
  3. Provide a name for the certificate group and an optional description. Exercise caution while providing the name since it cannot be changed later.
  4. You can choose certificates to be added to a group in 2 ways:
    1. By specific certificate - Select the certificates to be added to the group individually and click Save.
    2. By criteria - This serves as a dynamic method of grouping certificates. You will specify various criteria based on which the group will be created. Here, you can choose certificates based on various criteria such as issuer, common name, key algorithm, key size, key length etc. The additional fields that are added will also be displayed in the list. You can filter the search in a fine-grained manner based on conditions such as "equals" or "does not equal", "contains" or "does not contain", "starts with" or "ends with". Click the Matching certificates button at the bottom-right corner to see the corresponding certificates. 
  5. Mention the Group Email address to send expiry notifications and click Save. 
  6. The certificate group is created. To know more about additional fields, click here. 

Note: If you choose to group certificates based on criteria, the conditions will be applied to certificates discovered in the future and they will automatically be added to groups that match the criteria.


6.2 Edit Certificate Groups

To make changes to existing certificate groups,

  1. Click the certificate group icon on the top-right corner of the SSL >> Certificates tab.
  2. Click the edit icon present in the right corner of the table view.
  3. You can change the certificate selection type, edit the certificates present in a group or add, modify or delete the filters applied to a group and Group Email.
  4. Once you update the changes and save them, a pop up message will be displayed confirming the updates.

Note: The certificate group name cannot be modified. However, you can add or modify the list of certificates in a group or the description.


6.3 Delete Certificate Groups

To delete a certificate group,

  1. Click the Certificate group icon on the top-right corner of the SSL >> Certificates tab.
  2. Select the groups that you want to delete and click Delete.
  3. A pop-up window will appear asking you to confirm the action. 
  4. Click Ok and the selected certificate groups will be deleted.