Register a New Account

To create a new account with us, you can click on the Create a new account link and follow the on-screen process. There are two types of account that you can create with us. Personal account type is suitable for those who are going to manage your own certificates, and Company account type is for those who are managing certificates owned by their company.

To indicate that you want to register for a personal account, you can tick on the This is a personal account.

register
Figure 1. Register Account

Please ensure all the information that you have entered are correct. When everything is OK, click on the Register button to complete the registration process.

You should receive an email in a short while that allows you to activate your account.

Company name is unique throughout our system. If your company has been registered, you can ask the existing admin of your company to create an invitation for another admin. You may refer to here on how to invite an admin to your company.
Username can only contain alphabets, numbers, @, dot (.), and dash (-) symbols.
Please make sure that the email address that you entered is correct so that you can receive the activation email.

Authenticate to the System

CertCycle allows you to authenticate using different mechanisms. You can use your own username and password/FIDO token/passkey, or you may as well use your social accounts (we support Google).

Authenticate using Username/Password

To authenticate using your username and password, you may enter your username into the username field and press on the Continue button.

login username
Figure 2. Username Login

You will be presented with a password field to where you can enter your password.

login password
Figure 3. Password Login

Press the Login button to complete your login process.

Authenticate using FIDO token

To authenticate using your FIDO token, you may enter your username into the username field and press on the Continue button.

login username
Figure 4. Username Login

You will be asked to enter the PIN to access your FIDO token.

login fido1
Figure 5. FIDO PIN
If this is your first time, you will be asked to set the PIN for your FIDO token first.

After that, depending on the type of the FIDO token that you have, you will be asked to confirm your presence. This can be by pressing your FIDO token or even your biometrics.

login fido2
Figure 6. FIDO Presence Confirmation

If authentication is successful, you will be able to access the system now.

You need to have FIDO authentication enabled for your account before you are able to use this feature. You can check here on how to enable FIDO authentication for your account.
The screenshots here are taken on Linux. Different operating system might show different UI, but the steps are the same.t

Authenticate using Passkey

To authenticate using Passkey, simply click the Sign in with Passkey button.

signin passkey
Figure 7. Sign in using Passkey Button

You will be prompted to authenticate using either mobile device or security key, depending on the option you selected during registration.

webauth api
Figure 8. Passkey Option

If you choose authenticate using mobile device, QR code will be displayed for you to scan with your registered mobile device. Once the authentication is successful, you will be able to access the system.

qr passkey
Figure 9. Authenticate Passkey using mobile device

If you choose authenticate with security key, insert your hardware token and enter the PIN. Once the authentication is successful, you will be able to access the system.

security key
Figure 10. Authenticate Passkey using security key
You need to have FIDO authentication enabled for your account before you are able to use this feature. You can check here on how to enable FIDO authentication for your account.

Authenticate using Google

To authenticate using your Google account, simply click on the Sign in using Google button.

register signin google
Figure 11. Sign in using Google Button

You will be presented with Google login page. Just login using your Google account and once completed you will be authenticated to CertCycle.

signin google
Figure 12. Google Sign-in Page
If your Google’s email address has not been registered in the system, CertCycle will automatically create a new account for you.
You need to allow 3rd party cookie in your browser to use this feature.

Forgot Password

In case you forgot your login password, you can always reset your password by going into the forgot password module. Click on the I forgot my password link.

forgot password1
Figure 13. Forgot Password Link

You will be asked to enter your registered email address. Please enter your correct email address into the designated field and click on the Reset Password button.

forgot password2
Figure 14. Forgot Password Email Input

An email will be sent to your registered email address to guide you on the password reset steps.

forgot password3
Figure 15. Forgot Password Confirmation

Dashboard

Your dashboard is a place where you can have a bird view of the overall status of the certificates that you have uploaded to CertCycle. It provides you with some alerts and charts as detailed below.

dashboard
Figure 16. CertCycle Dashboard

Alerts

alerts
Figure 17. Alert section

This section gives you number of certificates (if any) that are managed by you that fall under specific criteria.

  • Keys less than or Equal to 1024 bits. This criterion applicable only for RSA. RSA with key-size of 1024-bit or less are considered as no longer secure and should no longer be used.

  • Weak Signing Algorithm - SHA1. SHA1 is considered as no longer secure enough to be used in the industry, hence its usage is no longer recommended. If you still have certificates using SHA1, consider upgrading to SHA2 or stronger signing algorithms instead, unless you have specific reason such as to accommodate old-legacy systems.

  • Weak Signing Algorithm - MD5. Worse than SHA1, MD5 is not a secure hashing algorithm anymore and should not be used for digital certificates. Do consider using stronger hashing algorithm such as SHA2.

  • Validity Period More Than 398 days. Major browsers now are enforcing TLS certificates validity to be no longer than 398 days to help ensure the security of the keys. As such, we consider certificates which has validity of more than 398 days as non-compliance and should be rectified unless you have your own specific reasons. You can read more about this from the following links:

  • Expiring in 14 Days or Less. This alert tells how many certificates are going to expire in 14 days or less. You should consider renewing your certificates as soon as possible to avoid disruptions from using expired TLS certificate for your websites.

  • Wildcard Certificates. A wildcard TLS certificate is a certificate that can be used to secure all first-level subdomains of single domain name. Wildcard certificates can be misused to aid in phishing attacks and hence not recommended.

Key Algorithm

keyalgo
Figure 18. Chart by Key Algorithm

This chart provides the overall view of the key algorithm used in the certificates that you are managing inside CertCycle.

Sign Algorithm

signalgo
Figure 19. Chart by Signing Algorithm

This chart provides the overall view of the signing algorithm used in the certificates that you are managing inside CertCycle.

Certificate Expiry

certexpiry
Figure 20. Chart by Certificate Expiry

This chart provides the number of certificates that have expired and expiring in:

  • 7 days

  • 14 days

  • 30 days

Certificate Tags

tags
Figure 21. Chart by Certificate Tag

This chart provides the overall view of the tags applied to the certificates that you are managing inside CertCycle.

My Account

You can change your account details from the My Account page. To go to my account page, just click on your name at the navigation menu once you are authenticated.

myaccount link
Figure 22. My Account Button

My Profile

myprofile
Figure 23. My Profile Page

You can change your profile details from this page. This includes your full name, address, landline, and mobile number.

Username and email cannot be changed once account is created.

Change Password

change password
Figure 24. Change Password Page

You can change your password here. For extra validation, you must enter your current password as well followed by your new password.

Authentication Options

auth options
Figure 25. Authentication Options Page

You can enable/disable FIDO authentication for your account here.

You must have FIDO token or passkey enabled devices before you can enable FIDO authentication.
FIDO authentication provides extra security and convenience without needing you to remember your password. Whenever possible, we encourage users to use FIDO for authentication.
With Passkey, you do not have to provide username and password to authenticate.

Delete Account

delete account
Figure 26. Delete Account Page

It is always sad to see someone goes away, but in case you need to, you can always delete your account here.

Deleting your account is irreversible. You will lose all your data and cannot be recovered. Proceed only if you understand what you are doing.

Admin

This feature is available only for company accounts.

Through this module, you can manage the administrators allowed to access your company. It is available on the navigation panel to the left.

admin section
Figure 27. Admin Section

Admin List

To access this page, you must have List Admins permission.
adminlist
Figure 28. Admin List Page

You can see all the admins who can manage the company in this page. You can filter the list by:

  • Full email address.

  • Status.

There are TWO (2) statuses for an admin, ACTIVE and SUSPENDED. If you want to temporarily disallow an admin from accessing the company, you can suspend him/her instead of deleting the admin.

Assign Admin

To reassign Admin, you must have both List Roles and Assign User permissions.

To reassign an admin, click the link under the Role column, and you will be prompted to select a new role.

adminlist assign
Figure 29. Reassign Admin

Activate/Suspend Admin

To activate/suspend Admin, you must have Change Admin Status permission.

To activate/suspend an admin, simply click on the Activate or Suspend link at the list page.

adminlist suspend
Figure 30. Activate/Suspend Admin
If you see N/A, that is because you are not allowed to activate or suspend your own account.

Edit Admin

To edit Admin, you must have Edit Admin permission.

To edit an admin, simply click on the Edit link at the list page.

edit
Figure 31. Edit Admin

You will be redirected to another page where you can enter the new admin information. Once OK, click on the Save button.

edit2
Figure 32. Edit Admin Page

Delete Admin

To delete Admin, you must have Delete Admin permission.

To delete an admin, simply click on the Delete link at the list page.

delete
Figure 33. Delete Admin
This action is not reversible.
You will not lose the data that this admin has uploaded previously.

Admin Invitation

To invite admin, you must have both Invite Admin and List Roles permissions.
admin invite
Figure 34. Admin Invitation Page

To invite a new admin, simply enter the email address of the new admin. Then, select the appropriate role you wish to assign to the new admin. An email will be sent allowing the new admin to proceed with the account registration and activation.

Once you have entered the email address, click on the Send Invitation button to proceed. The new admin will be automatically assigned the selected role upon accepting the invitation.

Access Control

This feature is available only for company accounts.

Through this module, you can manage permission and assign access control to users based on their role in the organization.

Access Control List

To access this page, you must have List Roles permission.

A list of roles are displayed together with columns: Assign, Edit, Delete.

rbac list
Figure 35. Role List page

Assign User

To reassign users to another role, you must have both List Admins, and Assign User permissions.
rbac assign
Figure 36. Assign Role

Click the Users link in the Assign column where you will be prompted to reassign users to a different role. After selecting the appropriate role, click Proceed to save the changes.

Users cannot reassign their own role and Superadmin.

Edit Role

To edit role, you must have Edit Role permission.
rbac edit
Figure 37. Edit Role

To edit a role, simply click the Edit button. This action will redirect you to the Role Edit page, where you can change the role name and adjust the permissions accordingly.

Users cannot edit their own role and Superadmin role.

Delete Role

To delete role, you must have Delete Role permission.
rbac delete
Figure 38. Delete Role

To delete a role, simply click the Delete button.

A role can only be deleted if there are no users assigned under that role. Users cannot delete their own role and Superadmin role.

Access Control Add

To add role, you must have Add Role permission.

The Add Role page allows administrators or those with permission to create new roles in the organization.

add role
Figure 39. Add Role page

To create a new role, enter a suitable Role Name. You can select one or more relevant permissions from the list of available modules.

The permissions define the specific tasks and features that users assigned to this role will be allowed to access. Administrator can modify these permissions later in List Roles page.

Once you have filled in the Role Name and selected the appropriate permissions, click Add Role to finalize the process and make this role available for user assignment.

Company

This feature is available only for company accounts.

This module allows you to view and modify your company information.

Company Details

To access this page, you must have the View Company permission.
company det
Figure 40. Company Details

The company details are populated upon registration in the CertCycle system.

  • Edit. Simply click the Edit button. This will redirect you to Edit Details page where you can edit the company information.

To edit company details, you must have Edit Company permission.

Private CA

This module allows you to create your own CA.

privca section
Figure 41. Private CA Section
This module is only available if you are a customer of AVM Cloud. To learn more about AVM cloud, please go to https://www.avmcloud.net/.
All the CAs that you create here will not be automatically trusted by any browser or third party tools such as Adobe Reader.

Private CA List

To access this page, you must have List Private CAs permission.

This page allows you to see the list of the CAs that you have created.

privca list
Figure 42. Private CA List Page

For each of the private CAs, you can do the following actions:

  • Download Certificate. This will download the CA certificate of the CA that you select. Just click on the Download Certificate button.

  • Download Latest CRL. This will download the latest CRL of the CA that you select. Just click on the Download Latest CRL button.

  • Issued Certificates. This will redirect you to the certificate list page which automatically filter the list based on the subject DN of the CA that you have selected.

To view Issued Certificate, you must have List Certificates permission.
  • Deactivate CA. This will temporarily deactivate the CA that you select. This button will show only if your CA is active.

  • Activate CA. This will activate back the CA that you have deactivated. This button will show only if your CA is inactive.

  • Delete CA. This will permanently delete the CA that you select. This button will show only for CAs that do not have any sub CAs.

To delete Private CA, you must have Delete Private CA permission.
Once a CA is deleted, you cannot undo the operation. You can still recreate a new CA with the same name and subject DN, but you will not get the same key as the previous CA.

Create New Private CA

To create Private CA, you must have Create Private CA permission.

This page allows you to create a new private CA.

privca create
Figure 43. Create Private CA

To add a new private CA, you need to provide the following information:

  • Name. The name of the CA. This must be unique in your company. This name is just an indicator you can refer to in the future.

  • Subject DN. The subject DN of the CA. This subject DN will be used in the certificate of the CA. Maximum length of the Subject DN is 4000 characters. This is typically more than enough for a CA.

  • Sign Algorithm. You can choose among the following supported signing algorithms:

    • SHA256withRSA. This means that the CA certificate is signed using RSA key-pair with SHA-256.

    • SHA512withRSA. This means that the CA certificate is signed using RSA key-pair with SHA-512.

    • SHA256withECDSA. This means that the CA certificate is signed using ECDSA key-pair with SHA-256.

    • SHA512withECDSA. This means that the CA certificate is signed using ECDSA key-pair with SHA-512.

  • RSA Key Size. If you choose either SHA256withRSA or SHA512withRSA, you will need to choose the RSA key-size. Cert-Cycle supports the following RSA key-sizes:

    • 2048.

    • 3072.

    • 4096.

  • ECC Curve Name. If you choose either SHA256withECDSA or SHA512withECDSA, you will need to choose the ECC curve-name. Cert-Cycle supports the following ECC curve-names:

    • P-256.

    • P-384.

    • P-521.

  • Signer CA. You can choose from Self Signed, or if you have previously created one or more private CA(s), those CA(s) will be listed there as well.

  • Validity. This is the validity of the CA in the number of days. Maximum CA validity is 10950 days (30 years).

Once you have filled-in all the required information, simply click on the Create button. Your CA request will be sent to our server and a process will be triggered to create your CA.

When your CA is being created, you will see that your CA status is IN_PROGRESS.

privca inprogress
Figure 44. In Progress Private CA Creation

Once the CA creation completes, your new CA status will be changed to ACTIVE.

privca active
Figure 45. Active Private CA

Certificate

You can upload certificates and manage the certificates that you have uploaded in this module.

cert section
Figure 46. Certificate Section

Certificate List

To access this page, you must have List Certificates permission.
cert list
Figure 47. Certificate List Page

As the name suggests, this page lists the certificates you have uploaded into CertCycle. You can filter the list by the following criteria:

  • Serial Number. You must enter the full certificate serial number here. Clicking on the search button will filter the list based on the serial number that you input here.

  • Subject DN. You can enter partial text from the Subject DN of your certificates. Clicking on the search button will filter the list based on the subject DN that you input here.

  • Issuer DN. You can enter partial text from the Issuer DN of your certificates. Clicking on the search button will filter the list based on the issuer DN that you input here.

  • Tag. You can choose from the dropdown list here. Everytime you tag a certificate, the tag will be shown here. Clicking on the search button will filter the list based on the tag you choose here.

  • Expiry. You can choose the date on when a certificate is going to expire. Clicking on the search button will filter the list based on the expiry date that you choose here.

Certificate tag can only contain alphanumeric.

To the right of each item, you may choose among THREE (3) different actions:

  • View. Clicking on the View link brings you to another page that shows the details of the certificate. This includes the certificate chain (if available) and the contact person (PIC).

To view the certificate, You must have List Certificates permission.
To view the certificate PIC, you must have both List Certificates and List PICs permissions.
  • Download. Clicking on the Download link will download the certificate. Depending on your browser settings, you may be able to choose where you want to save the file to.

  • Renew. Clicking on the Renew link will redirect you to New Certificate Request page. This page will allow you to issue a new request for the certificate renewal.

To renew certificate, you must have both Renew Certificate, New Certificate Request permissions.
  • Revoke. This is only for the certificate that is associated with Private CA. Clicking on the Revoke link will opens a new popup allowing you to confirm the revocation process. Select the Revoke Reason and click Confirm to submit your request.

To revoke certificate, you must have Revoke Certificate permission.
Once you confirm the revocation of a certificate, it cannot be undone.
  • Associate. Clicking on the Associate link opens a new popup allowing you to choose the endpoint(s) you want to associate the certificate with. You can choose multiple endpoints if you think the certificate is associated with multiple endpoints. For more detail about endpoint, please refer to Endpoints.

To associate certificate, you must have both Associate Certificate, List Endpoints permissions.
  • Delete. Clicking on the Delete link allows you to delete the certificate from the system. Note that this operation is not recoverable. If you need to re-add the certificate, you need to re-upload the certificate again.

To delete a certificate, you must have Delete Certificate permission.

Upload Certificate

To upload a certificate, you must have Upload Certificate, List PICs OR Add PIC permissions.

There are THREE (3) ways for you to upload certificate to CertCycle.

Single Certificate Upload

The first tab allows you to upload a single certificate file. The supported file formats are pem, cer, and crt and the certificate must be stored as a PEM format.

cert upload single
Figure 48. Single Certificate Upload

Once you uploaded the file, a confirmation page will be shown containing the details of your certificate.

cert upload confirm
Figure 49. Single Certificate Upload Confirmation

The bottom section displays the PIC to whom you want to assign this certificate. If you have no PIC yet in the system, you can enter the new details at the Contact Person (PIC) section. Otherwise, you can as well select from existing PICs in the same section.

All fields are required for the PIC.
PIC is different with admin. PIC by itself cannot login to the system.

For more details please refer to PIC reference.

To cancel, just click on the Cancel button, otherwise click on the Confirm button to proceed with the certificate upload.

Multiple Certificate Upload

The second tab allows you to upload a zip of certificates. The supported certificate file formats are pem, cer, and crt and the certificate must be stored as a PEM format. All other files inside the zip file that are not recognised will be ignored.

cert upload multi
Figure 50. Multiple Certificate Upload

Once you uploaded the file, a confirmation page will be shown containing the details of your certificate(s).

cert upload multi confirm
Figure 51. Multiple Certificate Upload Confirmation

The bottom section displays the PIC to whom you want to assign this certificate. If you have no PIC yet in the system, you can enter the new details at the Contact Person (PIC) section. Otherwise, you can as well select from existing PICs in the same section.

All fields are required for the PIC.
PIC is different with admin. PIC by itself cannot login to the system.

For more details please refer to PIC reference.

To cancel, just click on the Cancel button, otherwise click on the Confirm button to proceed with the certificate upload.

URL Upload

The third tab allows you to upload a certificate via URL. The URL must be in HTTPS. CertCycle will connect to the URL and download the SSL certificate of the given domain.

Please always ensure that you own the domain you are entering.
cert upload url
Figure 52. URL Certificate Upload

Once the URL is entered, and you click on the Upload button, a confirmation page will be shown containing the details of your certificate(s).

cert upload url confirm
Figure 53. URL Certificate Upload Confirmation

The bottom section displays the PIC to whom you want to assign this certificate. If you have no PIC yet in the system, you can enter the new details at the Contact Person (PIC) section. Otherwise, you can as well select from existing PICs in the same section.

All fields are required for the PIC.
PIC is different with admin. PIC by itself cannot login to the system.

For more details please refer to PIC reference.

To cancel, just click on the Cancel button, otherwise click on the Confirm button to proceed with the certificate upload.

Change PIC

To change certificate PIC, you must have List PICs and Transfer PIC permissions.

Sometimes you might want to change the PIC of a certificate to someone else. You can easily do it from the certificate details page.

change pic icon
Figure 54. Change PIC Button

As shown in the above screenshot, you can click on the Change PIC button. This will allow you to change the PIC either by selecting existing one or creating a new one.

If you want to create a new PIC, just choose -- New Contact -- option from the dropdown list as shown below. You can then enter the new PIC information.

change pic new
Figure 55. Change PIC New Contact

To cancel, just click on the Cancel button. Clicking on the Confirm button confirms the changes.

Contact Person (PIC)

The PIC section allows you to manage PICs of your certificates. A PIC has no access to the system, unless he/she has an admin account as well. If you want to invite another admin, you can refer to Admin Invitation.

pic section
Figure 56. PIC Section
For personal account, you will most likely be the only one PIC since you are managing it for yourself. For company account, you can have different PICs managing different certificates for example.

PIC Add

To add PIC, you must have Add PIC permission.
pic add
Figure 57. PIC Add Page

This page lets you add a PIC. Once the details is added, click Save and the newly created PIC will be processed in a moment. The PIC created can be accessed in the PIC List for further operations.

PIC List

To access this page, you must have List PICs permission.

This page allows you to see the list of the PICs that you have.

At the top section, you can see the filtering section that can help you filter the list. This page allows you to filter your PIC by the full email address.

pic list
Figure 58. PIC List Page

Assign PIC

To assign PIC, you must have Assign PIC, and List Certificates permissions.

To assign a PIC with a certificate, you can click on the Assign link associated with the PIC that you want to deal with.

pic assign1
Figure 59. PIC Assign Link

Once you click on the Assign link, you will be directed to another page from where you can assign a new certificate.

pic assign2
Figure 60. PIC Assign Page

As can be seen from the screenshot above, section 1 is where you can enter the certificate serial number and issuer DN of the certificate that you want to assign to this PIC. Once OK, just click on the Loop button.

At the section 2, you should be able to see the list of certificates currently assigned to this PIC.

The certificate that you assign to a new PIC will be automatically un-assigned from the previous PIC.

Edit PIC

To edit PIC, you must have Edit PIC permissions.

To edit a PIC, you can click on the Edit link associated with the PIC that you want to edit.

pic edit1
Figure 61. PIC Edit Link

Once you click on the Edit link, you will be directed to another page from where you can enter the new information.

pic edit2
Figure 62. PIC Edit Page

From this page, you can enter the new information. Click on the Save button when you are happy with the new information.

Delete PIC

To delete PIC, you must have Delete PIC permission.

To delete a PIC, you can click on the Delete link associated with the PIC that you want to delete.

pic delete1
Figure 63. PIC Delete Link
You cannot delete a PIC that is currently managing any certificate.
This action cannot be reversed. You will need to re-create the PIC again if you delete it by mistake. If you just want to change the information, consider editing the PIC data instead.

Transfer PIC

To transfer PIC, you must have List PICs, and Transfer PIC permissions.

People come and go out of our company. Hence, sometimes you might want to transfer ownership of certificate(s) from one PIC to another. You can do that using this feature.

pic transfer
Figure 64. PIC Transfer Page

At section 1 above, you can choose the current PIC. At section 2, you choose the new PIC. Simply speaking, all certificates managed by the current PIC (section 1) will be transfered to the new PIC (section 2).

Once OK, click on the Confirm button to proceed with the PIC transfer.

Certificate Request

You may purchase new certificate from various CAs supported by this platform. Certificate issued via this platform will be added automatically into certificate list.

certreq section
Figure 65. Certificate Request Section

Certificate Request List

To access this page, you must have List Certificate Requests permission.
certreq list
Figure 66. Certificate Request List Page

This page lists the new certificate requests that you have made at CertCycle. You can filter the list by the following criteria:

  • Status. You may filter any status of the certificate request here. Clicking on the search button will filter the list based on the status that you have selected. List of status here.

  • CA Name. You may enter the full CA Name of the selected CA during the certificate request. Clicking on the search button will filter the list based on the CA Name that you input here.

To the right of each item, you may choose to perform several actions. Available actions depend on the status of each request.

  • View. Clicking on the View link brings you to another page that shows the details of the certificate request.

  • Edit. Clicking on the Edit link brings you to another page that allows you to edit the request. This page is same as the input page when the request is first made.

  • Checkout. Clicking on the Checkout link brings you to Shopping Cart list page.

  • Download. Clicking on the Download link will download the newly enrolled certificate. Depending on your browser settings, you may be able to choose where you want to save the file to.

  • Validation Text. Clicking on the Validation Text option will trigger a pop-up message that show the required action from user in order to complete the certificate enrollment.

  • Complete Validation. Clicking on the Complete Validation link will submit a request to CertCycle to continue the certificate issuance process. Upon successful certificate issuance, the status will be changed to Complete.

  • Check Status. Clicking on the Check Status link will submit a request to CertCycle to check the status from the issuing CA. Upon successful certificate issuance, the status will be changed to Complete.

  • Send Password. Clicking on the Send Password link will request for password to be sent to PIC for the issued keystore (for mode PKCS12 or JKS).

Certificate Request Status

The certificate request and enrollment process will involve several stages represented by different status. Issuance process might vary depending on issuing CA. Available stage/status are as below:

  • Pending Payment. Status for new request. Request can still be edited at this stage. In order to continue the certificate issuance, user will need to complete checkout and payment process. Refer to Checkout process for details.

  • In progress. Status for request that has been checked out. Cert-cycle is processing the request and will submit to corresponding CA based on user input during request.

  • Pending Issue. Status for request that has been submitted and CA is processing the request. User may request to check status at the Action menu Check Status to check if CA already completed the certificate issuance.

  • Require Validate. Status for request that has been submitted and CA requires some validation in order to complete the request. User can check the validation required at the Action menu Validation Text.

  • Completed. Status for request that certificate is already issued.

New Certificate Request

To request certificate, you must have New Certificate Request permission. If you want to have access to request Private CA certificate, you must include List Private CAs permission.

New request can be initiated at the Certificate request section or from certificate list via Renew action.

To Renew from the Certificate List, you must have List Certificates, Renew Certificate, New Certificate Request permissions.
certreq newreq
Figure 67. New Certificate Request
certreq renewreq
Figure 68. Renew Certificate Request

Select CA

certreq selectca
Figure 69. Certificate Request Select CA Page

First step of certificate request is to select the Certificate Authority (CA) you wish to issue your required certificate.

Upon selecting any CA, you will be directed to a next step which is to fill in required information for the certificate request.

Form

certreq form
Figure 70. Certificate Request Form Page

Second step of certificate request is to fill in required information. All field are mandatory.

Upon completing the information insertion. Click Save at the bottom of the page to continue the certificate request process. A successful request will create an entry at Certificate Request List with status Pending Payment.

To continue the certificate issuance, proceed to check out at Cart page. Refer to Shopping Cart section for more details.

Generate CSR

This page allows you to generate a CSR and a private key.

certreq gencsrpage
Figure 71. Generate CSR page

To generate a CSR, you need to provide the following information:

  • Subject DN. This is the subject DN to be contained in the CSR. Maximum length of the Subject DN is 2000 characters.

  • Subject Alternative Name. This is an optional parameter. If provided, it will be included in the CSR as the Subject Alternative Name. The maximum length of the Subject Alternative Name is 2000 characters.

  • Key Algorithm. You can select from the available key algorithms:

    • RSA

    • ECC

  • Key Specification. Choose the key specification based on your selected key algorithm.

    • RSA Key Size. If you opt for RSA, you need to choose the RSA key size. Cert-Cycle supports the following RSA key sizes:

      • 2048

      • 3072

      • 4096

    • ECC Curve Name. If you opt for ECC, you need to choose the ECC curve name. Cert-Cycle supports the following ECC curve names:

      • P-256

      • P-384

      • P-521

If you choose RSA, the signing algorithm will be SHA256withRSA. If you choose the ECC, the signing algorithm will be SHA256withECDSA.

Once you have filled-in all the required information, simply click on the Generate CSR button. Your request will be sent to the server, which will then display a modal dialog containing the generated CSR values and the private key.

certreq csrprivkey
Figure 72. A modal dialog containing the generated CSR and the private key will be displayed

Private CA Enrolment

To learn more about Private CA, please visit here.

When you are trying to enrol a certificate using our Private CA feature, you can choose among different certificate purposes. By default, Cert-Cycle allows you to enrol certificate for the following purposes:

  • Client Authentication (1 and 2-year active period).

  • Code Signing (1 and 2-year active period).

  • Document Signing (1 and 2-year active period).

  • Email Protection (1 and 2-year active period).

  • SSL (1 and 2-year active period).

Authentication Certificate Profile

To enrol an authentication certificate, you can only provide the following DN components during the process:

  • CN (Common Name). This field is required.

  • OU (Organisational Unit). This field is optional.

  • O (Organisation). This field is optional.

  • C (Country). This field is optional.

Code Signing Certificate Profile

To enrol a code signing certificate, you can only provide the following DN components during the process:

  • CN (Common Name). This field is required.

  • OU (Organisational Unit). This field is optional.

  • O (Organisation). This field is optional.

  • C (Country). This field is optional.

Document Signing Certificate Profile

To enrol a document signing certificate, you can only provide the following DN components during the process:

  • CN (Common Name). This field is required.

  • OU (Organisational Unit). This field is optional.

  • O (Organisation). This field is optional.

  • C (Country). This field is optional.

Email Protection Certificate Profile

To enrol an email protection certificate, you can only provide the following DN components during the process:

  • CN (Common Name). This field is required.

  • E (Email address in DN). This field is required.

  • OU (Organisational Unit). This field is optional.

  • O (Organisation). This field is optional.

  • C (Country). This field is optional.

Additionally, the following subject alternative name attributes can be provided:

  • RFC822Name (Email address). This field is required.

SSL Certificate Profile

To enrol an SSL certificate, you can only provide the following DN components during the process:

  • CN (Common Name). This field is required.

  • O (Organisation). This field is optional.

  • businessCategory (Organization type). This field is optional.

  • Jurisdiction Locality [EV Certificate]. This field is optional.

  • Jurisdiction State or Province [EV Certificate]. This field is optional.

  • Jurisdiction Country (ISO 3166) [EV Certificate]. This field is optional.

  • serialNumber, Serial number (in DN). This field is optional.

  • streetAddress. This field is optional.

  • OU (Organizational Unit). This field is optional.

  • organizationIdentifier (Organization identifier). This field is optional.

Additionally, the following subject alternative name attributes can be provided:

  • DNS Name. This field is optional. You can add maximum of 3 DNS Name fields.

  • IP Address. This field is optional. You can add maximum of 2 IP Address fields.

Shopping Cart

Cart page is a list of incomplete certificate request which allow user to perform check out and complete the certificate request purchase.

cart section
Figure 73. Cart Section

Cart List

cart list
Figure 74. Cart List Page

This page lists the incomplete certificate requests with status Pending Payment that you have requested earlier. You may select any certificate request (at least 1) to proceed with the purchase checkout process.

At the bottom of the page, there is a button Checkout which will bring user to the next checkout page.

Cart Checkout

cart checkout
Figure 75. Cart Checkout Page

The checkout page is a continuity of the certificate request checkout process from Cart List page. This page provides the summary of item(s) selected prior to the payment process. User may perform the following action at this page:

  • Back. Clicking on Back button will navigate user back to Cart List page.

  • Apply Promo. Clicking on Apply Promo button will open up a pop-up window for user to input promotion code. Refer promo section for more info.

  • Proceed Payment. Clicking on Proceed Payment button will open up a pop-up window for user to input payment details and complete the purchase. Refer payment section for more info.

Promotion Code must be entered before payment in order for the code to take effect. Each transaction allows ONE(1) active promotion code to take effect.

Promotion

cart promo
Figure 76. Promotion Window

Cert-cycle will release promotion from time to time to offer special rate during certificate purchase. This window allows user to insert promotion code for current checkout/purchase. User may perform the following action at this window:

  • Back. Clicking on Back button will close the pop-up window. User may also click on area out of the pop-up window to archive the same result.

  • Apply. Clicking on Apply button will apply the successfully verified promotion code and recalculate the total chargeable amount. This button is disabled by default until a code is successfully verified.

  • Search . Clicking on search button will validate the promotion code entered. If the code is valid, Apply button will be activated.

Payment

cart payment
Figure 77. Payment Window

This window direct user to Cert-cycle integrated payment gateway. This windows allows user to insert payment details and complete the payment required for the certificate request.

Upon the generation of this window, a transaction record will be created. User can later refer to the transaction at Transaction List page.

Upon completing the payment, the pop-up window will automatically redirect to a payment success page and will be closed automatically shortly. Main window will also be directed to Certificate Request List Page.

cart paymentsuccess
Figure 78. Payment Success Window

Transaction

All payment attempt during certificate request purchase regardless of the result will be recorded for audit and checking purposes.

trans section
Figure 79. Transaction Section

Transaction List

To view Transaction List, you must have Transaction History permission.
trans list
Figure 80. Transaction List Page

This page lists the transaction you have made at CertCycle during certificate request checkout. You can filter the list by the following criteria:

  • Status. You may filter any status of the certificate request here. Clicking on the search button will filter the list based on the status that you have selected.

  • Username. You may enter the Username of the active user during the transaction is generated. Clicking on the search button will filter the list based on the Username that you input here.

To the right of each item, you may click on Details link which will open a pop-up menu showing the details of each transaction.

Domain

This module allows you to interact with the domains that we discovered when you upload a certificate.

We retrieve domains based on the value of the CN from the certificates that you upload. This is applicable only for SSL certificates.
domain section
Figure 81. Domain Section

Domain List

To access this page, you must have List Domains permission.

In this page, you can see all the domains that we discovered.

domain list
Figure 82. Domain List Page

As can be seen from the above screenshot, the section 1 allows you to filter the list based on several criteria.

  • Domain. You may enter a text that is part of the domain that you want to search. Once you click on the Filter button, the list will be filtered based on the value that you entered here.

  • Connectivity Status. This status indicates whether your domain can be connected successfully or not. You can choose from several options.

    • All: It will not do any filtering to the list. This is the default.

    • Unknown: It will filter the list to show only domains that the connectivity status is unknown.

    • Up: It will filter the list to show only domains that the connectivity status is up.

    • Down: It will filter the list to show only domains that the connectivity status is down.

    • Pending for Update: It will filter the list to show only domains that is waiting for an update.

  • SSL Certificate Status. This status indicates whether your domain SSL certificate is valid or not. You can choose from several options.

    • All: It will not do any filtering to the list. This is the default.

    • Unknown: It will filter the list to show only domains that the SSL certificate status is unknown.

    • Ok: It will filter the list to show only domains that the SSL certificate status is OK.

    • Not Ok: It will filter the list to show only domains that the SSL certificate status is not OK.

    • Pending for Update: It will filter the list to show only domains that is waiting for an update.

domain health status
Figure 83. Domain Health Status

Manual Health Check

To check domain health, you must have Check Domain Health permission.

You can manually request CertCycle to check the health for a domain. Simply click on the Check link associated with a domain you want to check. It will send the request back to server and update the new status after a while.

domain health check
Figure 84. Domain Manual Health Check

Delete Domain

To delete domain, you must have Delete Domain permission.

To delete a domain, simply click on the Delete link associated with the domain you want to delete.

domain delete
Figure 85. Domain Delete Link

Bridge

Bridge is a component of CertCycle that allows connectivity between your local data centre with the CertCycle cloud.

This feature is only available for company account.
bridge section
Figure 86. Bridge Section

Bridge List

To access this page, you must have List Bridges permission.
bridge list
Figure 87. Bridge List Page

In this page, you can view all the bridges that you have created in the system. You can filter the list by the following criteria:

  • Initialised. You can choose among All, Yes, and No.

  • Enabled. You can choose among All, Yes, and No.

  • Build. You can choose among All, Ready, and Pending.

  • Name. You can enter the partial name of the bridge that you want to search for.

There is also an icon indicating whether or not your bridge is alive. If you hover over it, you will be able to see when was the last time the bridge connected to CertCycle cloud.

In addition to that, you can also apply one of the following operations to each of the bridges:

View Bridge

To view Bridge, you must have View Bridge permission.

This is used to view the details of a bridge. Click on it and you will be redirected to a new page with more detailed information on the bridge itself.

bridge view
Figure 88. Bridge View

Below are some information displayed with regard to a bridge:

  • Name. The name of the bridge. This is according to the name that you put during bridge creation.

  • Description. The description of the bridge. This is according to the description that you put during bridge creation.

  • Initialised. This flag indicates whether or not a bridge has been initialised. When a bridge is created, the default status is uninitialised. You will need the secret key to initialise your new bridge.

  • Enabled. This flag indicates whether or not a bridge is enabled. When a bridge is disabled, CertCycle will reject any connectivity from this specific bridge. You can enable the bridge back to bring it up online again based on what you deemed as appropriate. Go here on how to enable/disable a bridge.

  • Build Status. This flag indicates whether or not CertCycle has finished building the binary for this specific bridge. Once completed, the status will be changed to Ready which indicates that you can now download the binary and deploy it to your own premise.

  • Version. This is the version number of the bridge.

  • Secret Key. This key is required during first time bridge initialisation. It will only be displayed once.

Once you have viewed the secret key, there is no way to retrieve it back. If you lose the secret key before activating your bridge, you can simply delete this bridge and create a new one.
  • Bridge Hash. This is the hash value of the bridge’s binary computed using SHA-256. It is always a best practice to compare the hash value shown here with the hash value computed using your downloaded binary. If the values do not match, that means your download is corrupted or might have been tampered with. Since CertCycle do not store any binary once downloaded, you can simply delete this bridge and create a new one to resolve the issue.

  • Download Bridge. This part contains a link that you can click and download the bridge’s binary.

CertCycle does not keep your bridge’s binary once you decide to download it. Please make sure that you keep the binary safely on your side.

Besides displaying some of the details, this page also shows the history of commands that you have sent to this specific bridge. When applicable, you can Transfer the command to another bridge, or you can also Delete the command from the history.

Enable/Disable Bridge

To change the state of a bridge (enabled / disabled), you can click on either Enable or Disable on the actions dropdown list to the right of each of the bridges.

enable bridge
Figure 89. Enable Bridge
disable bridge
Figure 90. Disable Bridge
Delete Bridge
To delete bridge, you must have Delete Bridge permission.

To delete a bridge, click on the Delete on the actions dropdown list to the right of each of the bridges.

This action is not reversible. Once deleted, you will need to create a new bridge. Existing bridge will no longer be able to connect to CertCycle.
delete bridge
Figure 91. Delete Bridge
Transfer Command

There might be a case where the server in which your bridge is deployed is down. In this case, you can redirect (transfer) the command to another working bridge server. Note that only commands that are in Pending status can be transferred.

To transfer a command, simply click on the Transfer button to the right of the command.

click transfer
Figure 92. Transfer Button

A popup will show from where you can choose the target bridge to execute the command. You need to have at least another active bridge to be able to serve the command.

target bridge
Figure 93. Target Bridge

Once you select the correct target bridge, just click on the Transfer button and follow the on-screen instructions. You should be able to see a success message once the command transfer is completed.

Delete Command

If you wish to delete a command, you can simply click on the Delete button to the right of the command.

click delete
Figure 94. Delete Button

Just follow the on-screen instruction. Once the command is successfully deleted, you should be able to see a success message on the screen.

Send Command

To access this feature, you must have Bridge Command permission.

To send a command to a bridge, you can choose menu item Command. This will bring you to a new page from where you can put any details required based on whatever command you want to send to the bridge.

There are TWO (2) generic parameters you always have to provide before sending a command:

  • Target Bridge. You need to choose to which bridge this command should be sent to. You need to have at least ONE (1) bridge available to execute the command.

  • Type. You need to choose the type of the command that you wish to send. Currently, there are TWO (2) types of commands available:

    • Bridge Updater. This type is used to trigger the bridge to request a new build with a new version. Go here to have a more detailed discussion on this type of command.

    • Network Scanner. This type is used to trigger the bridge to do network scanning. Go here to have a more detailed discussion on this type of command.

    • JBoss Updater. This type is used to trigger the bridge to update the keystore and/or truststore of a JBoss/Wildfly. Go here to have a more detailed discussion on this type of command.

    • Apache Updater. This type is used to trigger the bridge to update the keystore and/or truststore of an Apache. Go here to have a more detailed discussion on this type of command.

    • Nginx Updater. This type is used to trigger the bridge to update the keystore and/or truststore of an Nginx. Go here to have a more detailed discussion on this type of command.

    • Tomcat Updater. This type is used to trigger the bridge to update the keystore and/or truststore of a Tomcat. Go here to have a more detailed discussion on this type of command.

    • IIS Updater. This type is used to trigger the bridge to update the keystore and/or truststore of an IIS. Go here to have a more detailed discussion on this type of command.

    • Discover EJBCA. This type is used to trigger the bridge to automatically connect with and retrieve data from your EJBCA instance. Go here to have a more detailed discussion on this type of command.

Bridge Updater

If there is a new version of a bridge available, you can tell a bridge to trigger a new build of the bridge using the latest version available. You need to provide some mandatory information before proceeding:

  • New Bridge Name. This will be the name of the new bridge. This field is mandatory. If you wish to reuse the existing bridge’s name, you can tick on the Reuse bridge name. This will rename your target bridge by appending the current version number.. As mentioned, the existing bridge will be renamed to something else.

  • New Bridge Description. This will be the description of the new bridge. This field is mandatory. If you wish to reuse the existing bridge’s description, you can tick on the Reuse bridge description..

Network Scanner

Network scanner is the capability of the bridge to scan the network based on the pre-defined constraints. The purpose of the scanning is to find any certificate available on the network. You need to provide some mandatory information before proceeding:

  • Start Address. This is the IP address from where the scan should begin. Currently only support IPv4.

  • End Address. This is the IP address to where the scan should complete (inclusive). Currently only support IPv4.

  • Ports to Scan. Tells the server how to determine the ports to be scanned. There are TWO (2) available options here: Use Comma Separated and Use Port Range. If you choose to use Use Comma Separated, you have to provide the port numbers into the Ports fields. If you choose to use Use Port Range, you have to provide the Start Port and End Port number.

Use comma separated port numbers is supported starting from Bridge version 1.4.0.
  • Start Port. This is the port number from where the scan should begin. The value should be between 2 and 65535 (inclusive). Displayed only if you choose Use Port Range in the Ports to Scan dropdown list.

  • End Port. This is the port number to where the scan should complete (inclusive). The value should be between 2 and 65535 (inclusive). Displayed only if you choose Use Port Range in the Ports to Scan dropdown list.

Please be reminded that the higher the IP and port ranges, the longer it will take for the scan to complete.
  • Ports. This is the comma-separated port numbers to be scanned. Each port number must be between 2 and 65535 (inclusive). Example: 442, 443, 8442, 8443. Displayed only if you choose Use Comma Separated in the Ports to Scan dropdown list.

  • Timeout. This is the timeout value before the bridge gives up trying to connect to a port. The value should be between 1 and 60 seconds (inclusive).

The higher the timeout, the longer it will take for the scan to complete, especially if you have a bigger range of ports which mostly not listening on.
  • Concurrency. This is the number of concurrent scanning the bridge shall proceed with. The value should be between 1 and 500.

The higher the value, the higher the load on your network will be, albeit considerably low. This is because the bridge will only try to connect to an IP and port, grab the TLS certificate, if any, and then disconnect. You will only notice a spike of network activity from the bridge server.

JBoss Updater

JBoss updater is the capability of the bridge to update the keystore and/or truststore of a JBoss/Wildfly deployment.

To proceed, You need to provide some mandatory information:

  • Endpoint. This is the target endpoint where the JBoss/Wildfly is deployed. Please refer to here to learn more about Endpoints in Cert-Cycle.

To access Endpoint option, you must have List Endpoints permission.
  • SSH Private Key. This is an optional parameter. If your server requires key to perform SSH authentication, you have to select the correct key. Please refer here to learn more about SSH private keys.

To access SSH Private Key option, you must have List Authentication Keys permission.
It will only show if your selected Endpoint is based on Linux.
  • Keystore. This is the certificate to be used to update the keystore of the JBoss/Wildfly. Note that this must be a keystore format (i.e. P12 / JKS) as private key is required to be used as a keystore.

To access Keystore option, you must have List Certificate Requests permission.
  • Keystore Password. This is the password to protect the new keystore.

It is a requirement that you use the same password as the one currently being used to protect your JBoss' keystore file.
  • Confirm Keystore Password. To confirm the keystore password. Must be the same value as the one you enter in the Keystore Password field.

  • Keystore Path. This is the full path to the keystore file. It must include the name of the current keystore file as well.

It is a requirement that you use the same file name for the keystore as the one currently being configured in your JBoss.
Cert-Cycle will perform password verification on the existing keystore file, hence it is imperative that the file must exist first in the system.
Cert-Cycle performs keystore password verification using the keytool command, hence please make sure that the keytool command is in the execution path.
  • Update Truststore. This is the flag indicating whether or not the truststore of the JBoss should be updated. If Yes is chosen, below truststore configuration parameters must be configured.

If you select "Yes" for the Truststore, you need to have List Certificates permission to view the Truststore.
  • Truststore. This is the certificate to be used to update the truststore of the JBoss/Wildfly.

  • Truststore Password. This is the password to protect the new truststore.

It is a requirement that you use the same password as the one currently being used to protect your JBoss' truststore file.
  • Confirm Truststore Password. To confirm the truststore password. Must be the same value as the one you enter in the Truststore Password field.

  • Truststore Path. This is the full path to the truststore file. It must include the name of the current truststore file as well.

It is a requirement that you use the same file name for the truststore as the one currently being configured in your JBoss.
Cert-Cycle will perform password verification on the existing truststore file, hence it is imperative that the file must exist first in the system.
Cert-Cycle performs truststore password verification using the keytool command, hence please make sure that the keytool command is in the execution path.
  • Restart JBoss. This is the flag indicating whether or not the JBoss should be restarted to apply the change. If Yes is chosen, below JBoss configuration parameters must be properly configured.

  • JBoss CLI. This is the full path to the JBoss CLI. It must include the name of the CLI script as well. The default value is /opt/jboss/bin/jboss-cli.sh. You can change the value based on your current deployment.

  • JBoss CLI Username. This configuration is optional. If your JBoss CLI is protected by username/password, then you have to put the username to be used here.

  • JBoss CLI Password. This configuration is optional. If your JBoss CLI is protected by username/password, then you have to put the password to be used here.

Apache Updater

Apache updater is the capability of the bridge to update the keystore and/or truststore of an Apache deployment.

You need to run Bridge at least version 1.3.2.

To proceed, You need to provide some mandatory information:

  • Endpoint. This is the target endpoint where the Apache is deployed. Please refer to here to learn more about Endpoints in Cert-Cycle.

To access Endpoint option, you must have List Endpoints permission.
  • SSH Private Key. This is an optional parameter. If your server requires key to perform SSH authentication, you have to select the correct key. Please refer th here to learn more about SSH private keys.

To access SSH Private Key option, you must have List Authentication Keys permission.
  • Keystore. This is the certificate to be used to update the keystore of the Apache. Note that this must be a keystore format (i.e. P12 / JKS) as private key is required to be used as a keystore.

To access Keystore option, you must have List Certificate Requests permission.
  • SSL Certificate Path. This is the full path to the SSL certificate file. It must include the name of the current SSL certificate file as well.

It is a requirement that you use the same file name for the SSL certificate file as the one currently being configured in your Apache.
  • SSL Certificate Key Path. This is the full path to the SSL certificate key file. It must include the name of the current SSL certificate key file as well.

It is a requirement that you use the same file name for the SSL certificate key file as the one currently being configured in your Apache.
  • Update Truststore. This is the flag indicating whether or not the truststore of the Apache should be updated. If Yes is chosen, below truststore configuration parameters must be configured.

If you select "Yes" for the Truststore, you need to have List Certificates permission to view the Truststore.
  • Truststore Path. This is the full path to the truststore file. It must include the name of the current truststore file as well.

It is a requirement that you use the same file name for the truststore as the one currently being configured in your Apache.
  • Restart Apache. This is the flag indicating whether or not the Apache should be restarted to apply the change. If Yes is chosen, below Apache configuration parameters must be properly configured.

  • Apache Service Name. This is the name of the Apache service configured in your environment. Cert-Cycle will issue systemctl restart command followed by the service name. If the service name is not listed here, you will want to restart the Apache yourself.

  • Use sudo. This is the flag indicating whether or not to use sudo command when executing the Apache restart command.

To be able to use sudo properly, you need to have your SSH password configured correctly at the target endpoint.

Nginx Updater

Nginx updater is the capability of the bridge to update the keystore and/or truststore of an Nginx deployment.

You need to run Bridge at least version 1.3.3.

To proceed, You need to provide some mandatory information:

  • Endpoint. This is the target endpoint where the Apache is deployed. Please refer to here to learn more about Endpoints in Cert-Cycle.

To access Endpoint option, you must have List Endpoints permission.
  • SSH Private Key. This is an optional parameter. If your server requires key to perform SSH authentication, you have to select the correct key. Please refer th here to learn more about SSH private keys.

To access SSH Private Key option, you must have List Authentication Keys permission.
  • Keystore. This is the certificate to be used to update the keystore of the Nginx. Note that this must be a keystore format (i.e. P12 / JKS) as private key is required to be used as a keystore.

To access Keystore option, you must have List Certificate Requests permission.
  • SSL Certificate Path. This is the full path to the SSL certificate file. It must include the name of the current SSL certificate file as well.

It is a requirement that you use the same file name for the SSL certificate file as the one currently being configured in your Nginx.
  • SSL Certificate Key Path. This is the full path to the SSL certificate key file. It must include the name of the current SSL certificate key file as well.

It is a requirement that you use the same file name for the SSL certificate key file as the one currently being configured in your Nginx.
  • Update Truststore. This is the flag indicating whether or not the truststore of the Nginx should be updated. If Yes is chosen, below truststore configuration parameters must be configured.

If you select "Yes" for the Truststore, you need to have List Certificates permission to view the Truststore.
  • Truststore Path. This is the full path to the truststore file. It must include the name of the current truststore file as well.

It is a requirement that you use the same file name for the truststore as the one currently being configured in your Nginx.
  • Restart Nginx. This is the flag indicating whether or not the Nginx should be restarted to apply the change. If Yes is chosen, below Nginx configuration parameters must be properly configured.

  • Nginx Service Name. This is the name of the Nginx service configured in your environment. Cert-Cycle will issue systemctl restart command followed by the service name. If the service name is not listed here, you will want to restart the Nginx yourself.

  • Use sudo. This is the flag indicating whether or not to use sudo command when executing the Nginx restart command.

To be able to use sudo properly, you need to have your SSH password configured correctly at the target endpoint.

Tomcat Updater

Tomcat updater is the capability of the bridge to update the keystore and/or truststore of a Tomcat deployment.

You need to run Bridge at least version 1.3.4.

To proceed, You need to provide some mandatory information:

  • Endpoint. This is the target endpoint where the Tomcat is deployed. Please refer to here to learn more about Endpoints in Cert-Cycle.

To access Endpoint option, you must have List Endpoints permission.
  • SSH Private Key. This is an optional parameter. If your server requires key to perform SSH authentication, you have to select the correct key. Please refer th here to learn more about SSH private keys.

To access SSH Private Key option, you must have List Authentication Keys permission.
  • Keystore. This is the certificate to be used to update the keystore of the Tomcat. Note that this must be a keystore format (i.e. P12 / JKS) as private key is required to be used as a keystore.

  • Keystore Password. This is the password to protect the new keystore.

It is a requirement that you use the same password as the one currently being used to protect your Tomcat’s keystore file.
  • Confirm Keystore Password. To confirm the keystore password. Must be the same value as the one you enter in the Keystore Password field.

  • Keystore Path. This is the full path to the keystore file. It must include the name of the current keystore file as well.

It is a requirement that you use the same file name for the keystore as the one currently being configured in your Tomcat.
Cert-Cycle will perform password verification on the existing keystore file, hence it is imperative that the file must exist first in the system.
Cert-Cycle performs keystore password verification using the keytool command, hence please make sure that the keytool command is in the execution path.
  • Update Truststore. This is the flag indicating whether or not the truststore of the Tomcat should be updated. If Yes is chosen, below truststore configuration parameters must be configured.

If you select "Yes" for the Truststore, you need to have List Certificates permission to view the Truststore.
  • Truststore. This is the certificate to be used to update the truststore of the Tomcat.

  • Truststore Password. This is the password to protect the new truststore.

It is a requirement that you use the same password as the one currently being used to protect your Tomcat’s truststore file.
  • Confirm Truststore Password. To confirm the truststore password. Must be the same value as the one you enter in the Truststore Password field.

  • Truststore Path. This is the full path to the truststore file. It must include the name of the current truststore file as well.

It is a requirement that you use the same file name for the truststore as the one currently being configured in your Tomcat.
Cert-Cycle will perform password verification on the existing truststore file, hence it is imperative that the file must exist first in the system.
Cert-Cycle performs truststore password verification using the keytool command, hence please make sure that the keytool command is in the execution path.
  • Restart Tomcat. This is the flag indicating whether or not the Tomcat should be restarted to apply the change. If Yes is chosen, below Tomcat configuration parameters must be properly configured.

  • Tomcat Service Name. This is the name of the Tomcat service configured in your environment. Cert-Cycle will issue systemctl restart command followed by the service name. If the service name is not listed here, you will want to restart the Tomcat yourself.

  • Use sudo. This is the flag indicating whether or not to use sudo command when executing the Tomcat restart command.

To be able to use sudo properly, you need to have your SSH password configured correctly at the target endpoint.

IIS Updater

IIS updater is the capability of the bridge to update the keystore and/or truststore of an IIS deployment.

You need to run Bridge at least version 1.5.0.

To proceed, You need to provide some mandatory information:

  • Endpoint. This is the target endpoint where the IIS is deployed. Please refer to here to learn more about Endpoints in Cert-Cycle.

To access Endpoint option, you must have List Endpoints permission.
  • Keystore. This is the certificate to be used to update the keystore of the IIS. Note that this must be a keystore format (i.e. P12 / JKS) as private key is required to be used as a keystore.

To access Keystore option, you must have List Certificate Requests permission.
  • Update Truststore. This is the flag indicating whether or not the truststore of the IIS should be updated. If Yes is chosen, below truststore configuration parameters must be configured.

If you select "Yes" for the Truststore, you need to have List Certificates permission to view the Truststore.
  • Truststore. This is the certificate to be used to update the truststore of the IIS.

  • Restart IIS. This is the flag indicating whether or not the IIS should be restarted to apply the change.

Discover EJBCA

Discover EJBCA is the capability of the bridge to discover certificates from EJBCA.

  • Authentication Key. Select an authentication key.

You must have Authentication Key List permission, with registered CLIENT authentication type.
Please refer to here for more information on how to add an authentication key.
  • Discovery Type:

    • New: You can select this option to provide new EJBCA REST API URL for discovery.

    • Existing: You can select this if you want to use URL from previous discoveries. You can check Incremental Discovery checkbox to continue from the last successful discovery session, or uncheck it to reset the discovery and start over.

  • EJBCA REST API URL. Provide the EJBCA REST API URL.

  • Page Size. Specify the number of records to retrieve per page during discovery process

Bridge Creation

It is extremely simple to create a new bridge. To create a new bridge, click on the Create menu item on the Bridges section.

create bridge
Figure 95. Create Bridge Menu Item

You will need to enter mandatory information below:

  • Name. The name of the bridge. This is used as an indicator or uniquely identify the bridges inside your company. We recommend that you are using the more indicative name (e.g.: hrserverbridge01) instead of some general name (e.g.: mybridge). Although, it’s up to you in the end.

  • Description. The description of the bridge to explain a little bit on what this specific bridge is about.

create bridge page
Figure 96. Create Bridge Page

Once you have clicked on the Create button, you will need to wait a while until the executable is ready to be downloaded. You can check and download the binary from the view bridge page. Refer to download bridge for more information.

As of now, the bridge can only be deployed on Linux and Windows OS. Support for other OS will be added in the future.

Bridge Deployment

Deploying and initialising a bridge is as simple as creating a new bridge. You can follow the steps below from creation to deployment of a bridge.

Create a new bridge

Go to BridgesCreate, and enter the required information.

bridge step1
Figure 97. Create a new bridge
Wait for the binary to be ready.

Download the bridge

Once the bridge is ready for download, you can click on the Click here to download [OS] version link to download the binary. You may download for the specific OS you would like to use. Upon first time run, the bridge will check whether or not you have the plugins ready. If you’re not, it will download and setup the plugins for you.

download link
Figure 98. Download binary link
We will retain the binary in our system for at most THREE (3) days. If you do not download the binaries within THREE (3) days, the binaries will be automatically cleared from our system. You can create a new one if necessary.

Initialise the bridge

To initialise the bridge, you need to have the secret key first. To get the secret key, you can go to the BridgeActionsView on the specific bridge you would like to initialise. After that, click on the Click here to retrieve link.

retrieve secret key
Figure 99. Retrieve Bridge Secret Key
The bridge needs to connect to bridge.cert-cycle.com to perform the necessary key exchange and grab the commands that you can send to it. Hence, it is imperative that the server where the bridge is deployed must have access to the internet.

To initialise the bridge, run the bridge executable. It will check whether or not the bridge has been initialised. If it’s not yet initialised, it will continue with initialisation sequence, where you will need to enter the secret key.

initialise
Figure 100. Bridge Initialisation

Once initialised, the bridge will be started successfully.

started
Figure 101. Bridge Started

Install as a startup service

To ensure that the bridge started together with the OS so that you do not need to keep running it manually, we recommend that you install the bridge as a startup service. To do this, please refer to your specific OS documentation.

Here, we provide a guide on configuring a bridge as a systemd service and has been verified on Ubuntu 22.04. Some adjustments might be needed for different operating systems or Linux distros without systemd.

  • Go to /etc/systemd/system

    cd /etc/systemd/system
  • With privileged access, create a file ccbridge.service with the following content:

Remember to put correct value for the ExecStart, User, and WorkingDirectory configurations.
[Unit]
Description=CertCycle Bridge
After=network.target

[Service]
ExecStart=/path/to/your/bridge/binary
User=service_username
WorkingDirectory=/path/to/your/bridge/folder
Type=simple
Restart=on-failure

[Install]
WantedBy=default.target
RequiredBy=network.target
  • Reload the systemd daemon using the following command.

    sudo systemctl daemon-reload
  • Enable the service to run on startup.

    sudo systemctl enable ccbridge
  • Run the service.

    sudo systemctl start ccbridge

Bridge Update

From time to time, there will be a new release of CertCycle bridge available. When an update is available, an indicator will be showing to the right of the version number when you view the bridge.

bridge update
Figure 102. Bridge Update

Clicking on the Update Available button shows the details of the update.

update details
Figure 103. Update Details

To trigger the bridge to generate an updated version, click on the Trigger Update button. It brings you to the Bridge Updater page. Once all the necessary information are submitted, a new bridge will be created in your company.

update1
Figure 104. Send Bridge Update Command

Once the bridge successfully executed the update, if you go to the List Bridges, you will see a new bridge has been created.

update2
Figure 105. New Bridge Created

You will see that the status for the new bridge is Initialised and Enabled by default. When the new build is ready, you can download the new bridge’s binary and use it to replace the one that you already have in your server.

Discovery

By utilising the network scanning feature, Bridge will be able to tell CertCycle what are the servers that have been discovered during the scanning process.

The discovered hosts will only be listed if there is at least ONE (1) port available and secured via TLS whereas the Bridge able to grab the SSL certificate.
discovery
Figure 106. Discovered Hosts

To the right of each of the discovered hosts, there is an Actions menu consists of the following actions:

  • Register Endpoint. This is used to register the host as an endpoint which can be used further inside CertCycle.

To register endpoint, you must have both List Endpoints, Delete Endpoint permissions.
  • Delete. This is used to delete that specific discovered host.

To delete this, you must have both List Endpoints, Add Endpoint permissions.

Register as Endpoint

To register a discovered host as an endpoint, you will need to enter the following information:

  • Hostname. The server’s hostname.

  • IP. The server’s IP address. This is already pre-populated by the system. You can change it if necessary.

  • Type. The type of the host.

  • OS. The OS of the host.

  • Remark. The remark or note associated with this endpoint for your own reference.

  • SSH Username. The username used to SSH to this endpoint. Available only if your selected OS is Linux.

  • SSH Password. The password used to SSH to this endpoint. Available only if your selected OS is Linux.

  • SSH Port. The port used to SSH to this endpoint. The default port number is 22 if left blank. Available only if your selected OS is Linux.

  • SSH Server Public Key. The SSH public key representing the server. Available only if your selected OS is Linux.

  • Environment Variables. This is the list of environment variables to be provided together when executing remote command against this particular endpoint. Available only if your selected OS is Linux.

  • WinRM Username. The username used to connect via WinRM protocol. Available only if your selected OS is Windows.

  • WinRM Password. The password used to connect via WinRM protocol. Available only if your selected OS is Windows.

  • WinRM Port. The port used to connect via WinRM protocol. Available only if your selected OS is Windows.

  • Use HTTPS. The flag indicating whether you want to use HTTPS to connect via WinRM protocol. Available only if your selected OS is Windows.

  • Insecure HTTPS. The flag indicating whether you want to proceed despite invalid SSL certificate presented by the target Windows endpoint, for example invalid DNSName value. This is usually more common for internal servers. Only change to Yes if you know what you are doing. Available only if your selected OS is Windows and Use HTTPS is Yes.

  • CA Certificate. The CA certificate used to connect via WinRM protocol. This is used to validate the SSL certificate presented by the target Windows Endpoint. Available only if your selected OS is Windows and Use HTTPS is set to Yes.

  • Client Certificate. The client certificate used to authenticate via WinRM protocol. This is used to authenticate yourself with the target Windows Endpoint. Available only if your selected OS is Windows and Use HTTPS is set to Yes.

  • Timeout (second). The timeout to connect via WinRM protocol in seconds. Available only if your selected OS is Windows.

  • Authentication Method. The method used to authenticate via WinRM protocol. Available only if your selected OS is Windows.

  • Kerberos Configuration. The Kerberos configuration to be used when connecting via WinRM protocol. Available only if your selected OS is Windows and Authentication Method set to Kerberos. Refer here for more information on Kerberos configuration.

Register Multiple Endpoints

To register multiple endpoints, you can select each of the host by checking the checkbox for each of it and then click on the Register Endpoint button at the below of the page.

You will be asked to enter the following details: - Type. The type of the host. - OS. The OS of the host.

The type and OS information is shared among all the selected hosts.
The hostname will be populated with the IP address. You can always change it later on by editing the endpoint.
All other optional information will be left empty.

Delete Multiple Discovered Hosts

To delete multiple discovered hosts, you can select each of the hosts by checking the checkbox for each of it and then click on the Delete button at the below of the page.

Note that this action is irreversible. You will need to do another round of discovery for it to show in the list again.
discovery certs
Figure 107. Discovered Certificates

To the right of each of the discovered certificates, there is an Actions menu consists of the following actions:

  • View. This is used to view some information of the certificates.

  • Make Managed. This is used to register the certificate to Cert-Cycle, hence making it managed by the Cert-Cycle.

To access Make Managed, you must have both List PIC, Add PIC permissions.
  • Delete. This is used to delete that specific discovered certificate.

To delete this, you must have Delete Certificate permission.

Make a Certificate Managed

To make a discovered certificate as managed, you will need to enter the PIC information. You can either choose from existing PIC that you already have in your company, or you can also add a new one by entering the new PIC information. Optionally, you can also choose an endpoint or multiple endpoints to associate the certificate with.

make managed single
Figure 108. Make Single Certificate Managed

Make Multiple Certificates Managed

To make multiple discovered certificates as managed, you can select each of the discovered certificates by checking the checkbox for each of it and then click on the Make Managed button at the below of the page.

You will need to enter the PIC information. You can either choose from existing PIC that you already have in your company, or you can also add a new one by entering the new PIC information. Optionally, you can also choose an endpoint or multiple endpoints to associate the certificate with.

The PIC and associated endpoint(s) (if any) will be shared among all the selected certificates.
make managed multi
Figure 109. Make Multiple Certificates Managed

Delete Multiple Discovered Certificates

To delete multiple discovered certificates, you can select each of the certificates by checking the checkbox for each of it and then click on the Delete button at the below of the page.

Note that this action is irreversible. You will need to do another round of discovery for it to show in the list again.

Authentication Key

This feature is only available for company account.

List Authentication Key

To access this page, you must have List Authentication Keys permission.

To connect to an endpoint securely, some organisations might enforce to use authentication keys instead of just a username and password. This module allows you to register authentication keys that can be used later to connect to an endpoint securely.

To view the list of registered SSH Private Keys, you can go to the menu Authentication KeyList.

list authkey
Figure 110. Authentication Key List
sshprivkeysactions
Figure 111. Authentication Key Actions

For authentication key, there are several actions can be done.

  • View Public Key. This action is used to display the public key associated with the private key.

  • View Private Key. This action is used to display the private key.

  • Edit. This action brings you to the edit key page, allowing you to update the details of the authentication key. Please refer to here for more details.

  • Enable / Disable. This action allows you to enable or disable a key. Disabled keys will not be able to be used.

  • Delete. This action is used to delete the authentication key.

To delete authentication keys, you must have Delete Authentication Keys permission.
Deleting an authentication key is irreversible. You need to register again the authentication key if you need to in the future.

Edit Authentication Key

To edit authentication keys, you must have Edit Authentication Keys permission.
edit authkeyssh
Figure 112. Edit SSH Authentication Key

To edit SSH authentication key, you may change several information regarding the SSH private key such as the description, private key, and the public key.

Edit Client Authentication Key

image::authkey/edit_authkeyclient To edit CLIENT authentication key, you may change the description, upload a new client keystore file, and update the keystore password.

Make sure the password correct and matches the uploaded keystore file.

Add Authentication Key

To access this page, you must have Add Authentication Keys permission.

To add a new authentication key, you can go to the menu Authentication KeyAdd.

add authkey
Figure 113. Add Authentication Key

There are several mandatory information that you have to provide to be able to successfully add a new authentication key.

  • Description. This is the description of the authentication key. It is recommended to use meaningful description so that it can be easily referenced in the future.

  • Authentication Key Type. You can select the type of key that you want to authenticate with.

  • Private Key. This is the SSH private key. Only available for SSH authentication key.

SSH private key must be enclosed within -----BEGIN OPENSSH PRIVATE KEY----- and -----END OPENSSH PRIVATE KEY-----.
  • Public Key. This is the SSH public key associated with the private key. Only available for SSH authentication key.

  • Client Keystore Upload. You need to upload a P12 or JKS file for client authentication. Only available with CLIENT authentication key.

  • Keystore Password. You have to put the password for the keystore. Only available with CLIENT authentication key.

The password must be correct and match the keystore file for successful authentication.

Endpoints

An endpoint is an entity that is registered and known by CertCycle. This can be used for some operations offered by CertCycle. To add an endpoint, please refer to Register as Endpoint.

This feature is only available for company account.

Endpoint List

To access this page, you must have List Endpoints permission.

In this page, you may see all the endpoints that have been registered in your company.

list
Figure 114. Endpoint List

You can filter the list by the following parameters:

  • Type. The type of the endpoint.

  • Hostname. The full hostname of the endpoint.

  • IP. The full IP address of the endpoint.

There are FOUR (4) actions available for an endpoint:

  • View. This option is used to view details of an endpoint.

view
Figure 115. View Endpoint
  • Edit. This option is used to edit an endpoint.

To edit endpoint, you must have Edit Endpoint permission.
edit
Figure 116. Edit Endpoint
  • Certificates. This option is used to see the certificate(s) associated with this endpoint.

certificates
Figure 117. Associated Certificates

You can remove a certificate and make it no longer associated with the endpoint by clicking on the Remove button.

Removing the certificate from an endpoint association does not delete the certificate from the system.
This action is irreversible. You will need to re-associate the certificate if you want it in the future.
  • Delete. This option is used to delete an endpoint.

To delete an endpoint, you must have Delete Endpoint permission.
Note that this action is irreversible. You will need to register again an endpoint if you need to afterwards.

Add Endpoint

To add an endpoint, you must have Add Endpoint permission.

In this page, you may see all the endpoints that have been registered in your company.

  • Hostname. The server’s hostname.

  • IP. The server’s IP address. This is already pre-populated by the system. You can change it if necessary.

  • Type. The type of the host.

  • OS. The OS of the host.

  • Remark. The remark or note associated with this endpoint for your own reference.

  • SSH Username. The username used to SSH to this endpoint. Available only if your selected OS is Linux.

  • SSH Password. The password used to SSH to this endpoint. Available only if your selected OS is Linux.

  • SSH Port. The port used to SSH to this endpoint. The default port number is 22 if left blank. Available only if your selected OS is Linux.

  • SSH Server Public Key. The SSH public key representing the server. Available only if your selected OS is Linux.

  • Environment Variables. This is the list of environment variables to be provided together when executing remote command against this particular endpoint. Available only if your selected OS is Linux.

  • WinRM Username. The username used to connect via WinRM protocol. Available only if your selected OS is Windows.

  • WinRM Password. The password used to connect via WinRM protocol. Available only if your selected OS is Windows.

  • WinRM Port. The port used to connect via WinRM protocol. Available only if your selected OS is Windows.

  • Use HTTPS. The flag indicating whether you want to use HTTPS to connect via WinRM protocol. Available only if your selected OS is Windows.

  • Insecure HTTPS. The flag indicating whether you want to proceed despite invalid SSL certificate presented by the target Windows endpoint, for example invalid DNSName value. This is usually more common for internal servers. Only change to Yes if you know what you are doing. Available only if your selected OS is Windows and Use HTTPS is Yes.

  • CA Certificate. The CA certificate used to connect via WinRM protocol. This is used to validate the SSL certificate presented by the target Windows Endpoint. Available only if your selected OS is Windows and Use HTTPS is set to Yes.

  • Client Certificate. The client certificate used to authenticate via WinRM protocol. This is used to authenticate yourself with the target Windows Endpoint. Available only if your selected OS is Windows and Use HTTPS is set to Yes.

  • Timeout (second). The timeout to connect via WinRM protocol in seconds. Available only if your selected OS is Windows.

  • Authentication Method. The method used to authenticate via WinRM protocol. Available only if your selected OS is Windows.

  • Kerberos Configuration. The Kerberos configuration to be used when connecting via WinRM protocol. Available only if your selected OS is Windows and Authentication Method set to Kerberos. Refer here for more information on Kerberos configuration.

Kerberos Configuration

Kerberos is one of the most widely used authentication mechanism used to authenticate with an endpoint. If you have Microsoft AD in your environment, you are likely have Kerberos configured by default. Cert-Cycle Bridge can utilise Kerberos to authenticate to an endpoint in a Windows based enterprise environment.

Add Kerberos Configuration

To access this page, you must have Add Kerberos Config permission.
addkbconfmenu
Figure 118. Add Kerberos Configuration Menu

Clicking here should redirect you to the add kerberos configuration page.

addkbconf
Figure 119. Add Kerberos Configuration Page

To add a new kerberos configuration, you need to enter the following details:

  • Realm. The logical grouping of resources and identities that use the Kerberos authentication protocol. Example: SECUREMETRIC.LAN.

  • SPN. The Service Principal Name. A unique identifier for a service instance. Example: WSMAN/SMCOMMAND.SECUREMETRIC.LAN.

  • Config. The Kerberos configuration. Example:

[libdefaults]
  default_realm = SECUREMETRIC.LAN

[realms]
  SECUREMETRIC.LAN = {
    kdc = sm-ad.securemetric.lan
    admin_server = sm-ad.securemetric.lan
    default_domain = securemetric.lan
  }

[domain_realm]
  .securemetric.lan = SECUREMETRIC.LAN
  securemetric.lan = SECUREMETRIC.LAN

Kerberos Configuration List

To access this page, you must have List Kerberos Configs permission.
krbconfsmenu
Figure 120. Kerberos Configs Menu

Clicking here should redirect you to the kerberos configuration list page.

krbconfs
Figure 121. Kerberos Configuration List Page

You can filter the list based on the Realm and SPN. If you click on the View Config button, you will be presented with the Kerberos configuration content, as shown in below example screenshot.

krbconfview
Figure 122. Kerberos View Configuration

You can also Edit and Delete the configuration if you want to in this page.

To edit Kerberos, you must have Edit Kerberos Config permission.
To delete Kerberos, you must have Delete Kerberos Config permission.
Deleting configuration is not reversible. You will need to re-add the configuration if you need it later.

Activity

Through this module, you can observe all activities performed by the user. It is available on the navigation panel to the left.

activity section
Figure 123. Activity Section

Activity List

To access this page, you must have List Activities permission.

This page will show the list of activities.

activity list
Figure 124. Activity List Page

You can filter the list by:

  • Event Code. You may choose only one event code at the time.

  • Username You can choose one of the username that performed the activity.

  • Date From and Date To. Date range of the activity

Reporting

This reporting module allow user to generate Certificate Report, Certificate Risk Report, Domain Monitoring Report and Activity Report. The report supports PDF, CSV, and XLS format

reporting section
Figure 125. Reporting Section

Generate Report

To access this page, you must have Generate Report permission.

This page will show how to generate the report

report certificate report
Figure 126. Generate Report

You can filter the report by:

  • Report Type. You can select the type of report that you want to generate.

To generate Certificate Report OR Certificate Risk Report, you must have List Certificates permission.
To generate Domain Monitoring Report, you must have List Domains permission.
To generate Activity Report, you must have List Activities permission.
  • Expiry Date From and Expiry Date To. You can choose expiry date range of the certificate. Only available for Certificate Report and Certificate Risk Report

  • Key Algorithm. You can choose available key algorithm. Only available for *Certificate Report

  • Key Size. You can choose available key size. Only available for *Certificate Report

  • Issuer DN. You can enter partial text from the Issuer DN of your certificates. Only available for Certificate Report and Certificate Risk Report

  • PIC. You can choose the list of available PIC. Only available for Certificate Report and Certificate Risk Report

To filter by PIC, you must have the List PICs permission.
  • Domain. You can choose the list of available domain. Only available for Domain Monitoring Report

  • Event Type. You may choose only one event code at the time. Only available for Activity Report

  • Username. You can choose available username. Only available for Activity Report

To filter by username, you must have List Admins permission.
  • Date From and Date To. You can choose date range of the activity. Only available for Activity Report

Click Submit to generate the report.