Provisioning a Certificate
The Provision Certificates module in CERTInext enables organizations to automate the issuance, renewal and deployment of certificates across servers, applications, load balancers and user endpoints. Using provisioning bots and Certificate Authority (CA) integrations, CERTInext ensures that certificates are securely delivered to target systems and maintained throughout their lifecycle.
Provisioning works in conjunction with certificate discovery and inventory, allowing enterprises to move from visibility to full automation. Whether managing a small set of certificates or operating at enterprise scale, the Provisioning module simplifies certificate operations while reducing manual effort and deployment risk.
The module allows administrators to configure end-to-end provisioning workflows by selecting the issuing CA, defining key and certificate parameters, and mapping deployment bots to target systems. Once configured, certificates can be automatically issued, renewed, and securely deployed to designated servers, load balancers, and applications without manual intervention.
Provisioning Dashboard
The Provisioning Dashboard provides a centralized view of all certificate provisioning activity. It allows administrators to monitor bot health, certificate readiness, deployment progress and S/MIME provisioning status from a single interface.
To access the dashboard, navigate to:
Certificates → Provisioning
The dashboard is designed to support both operational monitoring and troubleshooting by presenting real-time metrics and direct navigation into detailed views.
Provisioning Overview
At the top of the dashboard, a brief overview describes the scope of provisioning within CERTInext. This section highlights that provisioning automates:
Certificate issuance and renewal using public or private CAs
Secure certificate deployment to configured target systems
Ongoing lifecycle management through provisioning bots
This overview establishes the provisioning workflow before users interact with detailed metrics.

Fig: Provisioning Certificates Dashboard
Provisioning Certificates Dashboard Overview
Bot Overview
The Bot Overview section provides visibility into the status of all provisioning bots configured for the account. Provisioning bots are responsible for executing certificate deployment and renewal actions within target environments.
The following metrics are displayed:
Total Bots → All provisioning agents deployed to automate certificate deployment. These intelligent agents automatically install, update and manage certificates on your servers and applications, reducing manual work and human error
Active → Provisioning agents currently working on certificate deployments. These bots are actively installing certificates, monitoring for updates, and ensuring systems maintain secure, up-to-date encryption.
Pending → Provisioning agents awaiting setup or configuration. These bots are registered but need to be configured with deployment targets and policies before they can begin automating certificate management.
Stopped → Provisioning agents that have been paused or disabled. These bots are not currently managing certificates. Review this list to ensure critical systems maintain active automation coverage.
Each metric on the dashboard is clickable. Selecting any tile, such as Total Bots, Active, Pending or Stopped, filters the bot list to display only the bots in that category, allowing administrators to quickly review their status.
Create Bot → Allows administrators to create and register a new provisioning bot. Provisioning bots are used to automate certificate deployment, renewal, and installation across servers, applications, and load balancers. Once registered and configured, these bots securely deliver issued or renewed certificates to designated target systems and enforce lifecycle automation across the infrastructure.

Fig: Provisioning Bot Overview
Provisioning Configuration Summary
This section provides a consolidated snapshot of certificate readiness and server availability for provisioning.
Note: Throughout the Provisioning dashboard, information icons (ℹ️) are available next to key metrics. Hovering over these icons provides contextual explanations to help users quickly understand what each metric represents and what actions may be required.
Provisioning Results
Certificates
The certificate summary reflects how certificates are progressing through the provisioning lifecycle.
Total Certs → Total certificates available for provisioning. This list is directly populated from the discovery dashboard.
Bot Unassigned → Certificates ready for deployment but not yet assigned to an automation agent. These certificates have been ordered or generated but need to be assigned to a provisioning bot to automate their installation on target systems
Configuration Pending → Certificates that are awaiting further deployment configuration details. These certificates need additional information (like target servers, installation paths, or binding configurations) before they can be automatically deployed.
Deployment Pending → Certificates fully configured and queued for installation. These are ready to be deployed to your servers. The provisioning bot will install them according to the scheduled deployment plan.
Deployment Failed → Certificate deployments that encountered errors during installation. These failed deployments need investigation. Common issues include permission problems, connectivity issues, or incompatible certificate formats. Action required to resolve.
Each metric is clickable and opens a filtered view of the corresponding certificates, enabling administrators to quickly review their status and take necessary actions.
Server
The Server summary reflects the status of agentless server connections configured for provisioning. These servers are remote systems that are accessed by the CERTInext Bot using secure protocols to perform certificate deployment operations.
Total → Total number of servers added for agentless provisioning. These are the servers configured using IP address, credentials, and server type details for remote deployment.
Mapped Servers → Servers that have been successfully associated with a provisioning bot. Mapping ensures that the selected bot is responsible for handling certificate deployment to those specific systems.
Active → Servers that are reachable and ready for certificate deployment. These systems are available for provisioning actions such as installation, renewal, rotation and updates.

Fig: Certificates - Provisioning Configuration Summary
S/MIME Provisioning
The S/MIME Provisioning section focuses on certificate provisioning for enterprise email users. This module integrates with Azure Active Directory to discover users and automate S/MIME certificate issuance, deployment and configuration. This capability enables organizations to roll out secure email encryption and digital signing at scale.
Secure enterprise email with S/MIME by discovering users via Azure Active Directory and automating certificate issuance, deployment, and setup. This ensures encryption, digital signatures, and message integrity for Outlook users across the organization.
Displayed metrics include:
Total Users → All employees in your Azure Active Directory eligible for email security certificates.
Awaiting Orders → Employees ready for S/MIME certificates but orders not yet submitted. These users have been identified for email security but their certificates haven't been requested from the Certificate Authority yet. Initiate orders to enable secure email for these users.
Provisioned → Employees successfully equipped with S/MIME email security certificates.
The Connect to Azure AD option is used to establish or manage the directory integration required for S/MIME provisioning.

Fig: S/MIME Provisioning overview
Provisioning Orders
Provisioning Orders provide visibility into certificate issuance and deployment requests generated by provisioning workflows.
This section displays:
Total Orders → All S/MIME certificate requests submitted to the Certificate Authority. This tracks your organization's email security certificate orders from initial request through final issuance, providing complete visibility into the provisioning process.
CSR Pending → Certificate orders awaiting Certificate Signing Request (CSR) submission. The CSR contains the user's public key and identity information. These orders need CSR creation and submission to the Certificate Authority before certificates can be issued.
Certificate Issued → Successfully issued S/MIME certificates ready for distribution. The Certificate Authority has approved and issued these certificates. They can now be distributed to users, enabling secure, signed, and encrypted email communication.
These metrics help administrators track provisioning progress from request creation through certificate issuance.

Fig: Provisioning Orders
Manage Provisioning Bots Dashboard
The Provisioning Bots dashboard enables administrators to manage bots used for certificate provisioning activities. These bots execute certificate issuance, renewal and deployment tasks across configured environments and target systems.
All provisioning-capable bots are listed in a centralized view, providing administrators with visibility into bot health, configuration status and operational readiness.
Navigation Path
Certificates → Provisioning → Bots
Selecting Total Bots, Active, Pending or Stopped from the Provisioning Dashboard opens this Bots listing view.
Provisioning Bots Overview
The Bots page displays all provisioning bots associated with the account. Each bot represents a deployed agent installed within a specific network, environment, or location.
From this dashboard, administrators can:
Create new provisioning bots
Review bot connectivity and operational status
Filter and search bots using key attributes
Customize visible columns for focused analysis
Export bot data for audits and reporting
Perform bot configuration and lifecycle actions
Bots Table Overview
Each row in the table represents a single provisioning bot and displays key operational metadata.
Bot Attributes
Bot Name → A unique identifier assigned during bot creation. Used to distinguish bots across environments such as production, staging, or regional deployments.
IP Address → The network address of the system where the bot is installed. Helps validate network placement and troubleshoot connectivity issues.
Description → An optional field used to capture purpose, environment or regional context.
Status → Indicates the current operational state of the bot:
Active
Pending
Stopped
Inactive
This allows administrators to quickly identify bots that require attention.
Last Bot Update → Timestamp of the most recent communication between the bot and the CERTInext platform.
Bot Version → Displays the installed bot software version. Useful for upgrade tracking and version consistency.
Purpose → Indicates whether the bot is configured for:
Provisioning
Discovery
Discovery and Provisioning
Group → Logical grouping used to organize bots across teams, environments or business units.
Bot Token → A unique authentication token generated during bot creation. Used by the bot to securely communicate with CERTInext.
OS → The operating system on which the bot is installed (for example, Microsoft Windows or Linux).
Created Date → The date and time when the bot was created in CERTInext.
Created By → The user who created the bot.
Tags → User-defined key-value tags used for classification, filtering and reporting purposes.

Fig: Provisioning Dashboard (Bots)
Filtering and Search
The Provisioning Bots dashboard supports advanced filtering to quickly locate specific bots based on operational, administrative, or organizational attributes.
Each filter consists of three components:
Column → The attribute to filter on
Operator → The condition applied to the selected column
Value → The value used for comparison
Multiple filters can be combined to refine the results.
Supported Filter Columns
Administrators can filter bots using the following attributes:
Bot Name
Status
Purpose
Group
Bot Version
Bot Token
Created Date
Created By
Last Bot Update
Tags
Supported Operators
The available operators depend on the selected column type.
Text-Based Columns
(Example: Bot Name, Group, Created By, Tags, Bot Token)
Supported operators:
Contains
Equals
These operators match bots based on partial or exact text values.
Status and Purpose Columns
Supported operators:
Equals
Supported values include:
For Status:
Active
Pending
Stopped
Inactive
Pending Activation
For Purpose:
Provisioning
Discovery
Discovery and Provisioning
Date-Based Columns
(Example: Created Date, Last Bot Update)
Supported operators:
Before
After
These operators allow administrators to filter bots based on a specific date or time range.
Examples:
Last Bot Update Before 05-Feb-2026
Created Date After 01-Jan-2026
Filter Values
The Value field defines the comparison input for the selected filter.
For text and status-based filters, values are selected or entered directly.
For date-based filters, a date/time value is selected.
The value “All” can be used to include all possible values for a selected column, effectively removing restriction for that attribute while retaining other applied filters.
Example Filter Scenarios
Display all active provisioning bots: Status = Active AND Purpose = Provisioning
Identify bots that have not communicated recently: Last Bot Update Before 01-Feb-2026
Locate bots created after a specific rollout date: Created Date After 15-Jan-2026
Customize Columns
Administrators can tailor the table view by selecting which columns are displayed.
Default Columns
Bot Name
IP Address
Description
Status
Last Bot Update
Bot Version
Additional Columns Available
Group
OS
Created Date
Created By
Tags
This flexibility supports operational troubleshooting, compliance audits, inventory reporting, and lifecycle tracking.

Fig: Customize Columns
Export Options
The Provisioning Bots dashboard supports exporting bot data directly from the interface. Exported data reflects the currently applied filters and column selections.
Export to Excel Used for compliance reporting, audits, inventory tracking, and operational analysis.
Export to PDF Used for offline documentation, management summaries, and external reporting.
Actions Menu
Each bot row includes a Select Action menu that provides lifecycle controls.
Available Actions
Configure Bot Allows administrators to modify bot configuration attributes such as purpose, grouping or metadata.
Delete Bot Removes the bot record from CERTInext. This should be performed only after the bot has been decommissioned from the host system.
These actions allow administrators to manage provisioning bots throughout their lifecycle from a single interface.
Provisioning Certificates Page
The Provisioning Certificates page provides a centralized view of certificates discovered by provisioning bots and allows administrators to initiate, configure, deploy, rotate, or manage certificates as part of the automated provisioning lifecycle. This page acts as the operational bridge between discovery and active certificate lifecycle management, enabling administrators to move certificates from a discovered state into managed, issued, and deployed states.
Accessing the Page
Navigate to: Certificates → Provisioning → Provisioning Certificates
Page Overview
The Provisioning Certificates page displays a tabular view of certificates that are eligible for provisioning actions. These certificates are typically discovered by provisioning bots, imported into the provisioning workflow, and prepared for issuance, deployment, renewal, or rotation. The page provides operational visibility into certificate ownership, location, expiry timelines, issuing authority, and provisioning readiness, allowing administrators to manage certificate lifecycle activities from a single interface.
Each row in the table represents one certificate entry detected within the environment and provides contextual information required to assess and manage provisioning operations.

Fig: Provisioning Certificates
Certificate List View - Column Details
CN / SAN Name → Displays the certificate identity, showing the Common Name or the primary Subject Alternative Name associated with the certificate. This helps identify the system, application, or domain where the certificate is used.
Discovery Bot → Indicates the bot that originally detected the certificate in the environment, providing traceability into where the certificate was discovered.
Provisioning Bot → Shows the bot assigned to perform lifecycle operations such as issuance, deployment, renewal, and rotation. If not assigned, it may appear as “Not Mapped.”
Issuer CA → Identifies the Certificate Authority responsible for issuing the certificate, helping distinguish between internal enterprise CAs and public CAs.
CA Type → Indicates whether the certificate belongs to a Public CA or a Private CA environment, which is important for governance and policy alignment.
Certificate Location → Displays where the certificate was detected, typically represented as a hostname/IP and port combination (for example, domain:443 or IP:port).
Signature Algorithm → Shows the cryptographic signature algorithm used by the certificate, such as SHA256RSA or SHA384RSA, useful for security validation.
Expires On → Displays the certificate expiration date and time, helping administrators plan renewal activities.
Expires Within → Shows the remaining validity duration in days, allowing quick identification of certificates nearing expiration.
Order ID → Represents the CA order reference number associated with the certificate if it has been issued through a CA integration.
Organization → Displays the organization mapping associated with the certificate within the platform.
Tags → Shows metadata labels assigned to the certificate, useful for classification, grouping, and ownership tracking.
Status → Indicates the current lifecycle state of the certificate, such as Discovered, Initiated, Issued, Deployed, Rolled Back, or Order Pending.
Batch Name → Displays the batch identifier if the certificate is part of a bulk provisioning operation.
Scan IP Address → Indicates the IP address from which the certificate was detected during discovery (visible through column customization).
Scan Port → Displays the network port on which the certificate was identified (visible through column customization).
Issued On → Shows the date on which the certificate was issued by the Certificate Authority.
Last Provisioned On → Displays the most recent timestamp when a provisioning action was performed on the certificate.
Validation Status → Indicates the validation state of the certificate where applicable.
DCV Status → Displays the Domain Control Validation status associated with the certificate issuance process.
Deployment Type → Indicates how the certificate is deployed, such as automated provisioning or manual deployment.
Serial Number → Displays the unique serial number assigned to the certificate.
Vulnerable → Indicates whether the certificate is flagged as weak, outdated, or non-compliant based on policy checks.
Per-Certificate Action Menu
Each certificate row includes a Select Action dropdown that provides certificate-specific lifecycle operations.
Configure → Opens the provisioning configuration screen for the selected certificate, allowing administrators to define CA mapping, provisioning bot assignment, deployment targets, and lifecycle parameters before initiating provisioning.
Download Certificate → Allows administrators to download the certificate file in the supported format for backup, inspection, or manual deployment purposes.
Certificate Details → Displays a detailed metadata view of the certificate, including issuer information, validity period, key size, serial number, thumbprint, and certificate constraints for validation and troubleshooting.
View Certificate → Presents the certificate in a decoded, readable X.509 format showing subject, issuer, validity, signature algorithm, and public key details for inspection.
Ignore → Excludes the certificate from provisioning workflows without deleting it from the inventory, useful when certain discovered certificates are not intended to be managed.
Delete → Removes the certificate entry from the provisioning inventory, preventing it from appearing in provisioning workflows or operational views.
Server Configuration
The Add Server section allows administrators to register application servers for agentless provisioning. This configuration enables CERTInext to remotely connect to target servers, locate certificate stores, and perform lifecycle operations such as deployment, renewal, and rotation.
In an agentless model, the CERTInext Bot is installed on a central system and remotely manages certificates on application servers by identifying certificate locations, deploying new certificates, replacing expiring certificates and triggering service reloads.
To perform these lifecycle operations, CERTInext connects to configured servers using secure remote access protocols based on the target system’s operating system.
Communication Mechanism Used in Agentless Provisioning
CERTInext uses standard operating system protocols to securely access remote servers depending on the platform type. The connection method varies for Windows and Linux-based systems.
Windows Servers - SMB Based Connection
For Windows-based environments, CERTInext connects using SMB (Server Message Block), a standard Windows protocol for secure file and directory access. SMB allows the provisioning bot to securely access remote directories, copy certificate files and interact with configuration locations on Windows servers. Using the credentials provided during server configuration, the bot authenticates to the target system and performs the following operations:
Access certificate storage directories
Copy new certificate and key files
Replace existing certificates
Update configuration locations where applicable
Restart or reload application services using the defined service name
This method is commonly used for IIS, Tomcat, Apache and other application servers running on Windows systems.
Linux Servers - SSH Based Connection
For Linux and Unix-based environments, CERTInext connects using SSH (Secure Shell). SSH provides secure command-line level access to remote systems. Using the configured username and password, the provisioning bot establishes a secure session with the server and performs certificate deployment tasks.
Through SSH, the bot can:
Navigate to application installation directories
Locate SSL configuration files
Copy certificate and key files to defined paths
Update configuration references
Restart or reload application services
This method is used for servers such as Nginx, Apache HTTP, Tomcat, JBoss, Jetty and WebLogic running on Linux systems.
To establish this connection, administrators must register each server using the Add Server form by providing IP address, credentials, server type and application path details. Once configured, the provisioning bot can remotely access the system, locate the required configuration files and perform certificate installation and updates.
Below is a detailed explanation of each field available in the Add Server form.
Common Fields (Applicable to All Server Types)
Description → A user-defined name to identify the server entry. This helps distinguish environments such as Production, UAT, Load Balancer Node, etc.
IP Address → The IP address of the target server where the application is hosted. CERTInext connects to this system for certificate deployment and lifecycle operations.
Username → The login username used to authenticate to the server remotely.
Password → The password associated with the provided username for secure access.
Server Type → Specifies the application server installed on the system. Based on this selection, CERTInext prompts for server-specific path details.
Key Store Folder Path → Directory where certificates/keystores are stored on the server. Used during deployment and replacement operations.
Version → Version of the selected server (for example: Apache 2.4, Tomcat 9, Nginx 1.18). Helps ensure compatibility with deployment logic.
Ports → Port numbers used by the application server for SSL communication (for example: 443, 8443).
Service Name → System service name used to restart or reload the application after certificate deployment.
Server-Specific Path Fields
Tomcat
Tomcat Path → Root installation directory of the Tomcat server (for example: /opt/tomcat or C:\Program Files\Apache Tomcat). This path is used to locate SSL connector configurations and keystore references within server.xml and related configuration files.
Apache HTTP
Apache HTTP Path → Installation/configuration directory of Apache HTTP Server (for example: /etc/httpd/, /usr/local/apache2/, or C:\Apache24). CERTInext uses this path to locate SSL configuration files (httpd.conf, ssl.conf) and identify certificate deployment locations.
Nginx
Nginx Path → Base installation or configuration directory of Nginx (for example: /etc/nginx/). Used to locate nginx.conf and SSL certificate/key references for deployment and replacement.
IIS
Key Store Folder Path (Primary field for IIS) → For IIS, certificates are typically managed through the Windows Certificate Store. This path points to the location where certificate files or export artifacts are stored if applicable. IIS bindings are updated during deployment.
JBoss
JBoss Path → Installation directory of the JBoss server (for example: /opt/jboss/ or domain/server configuration path). Used to identify SSL configuration files and keystore references within the JBoss configuration structure.
Jetty
Jetty Path → Root directory of the Jetty server installation. CERTInext uses this path to locate SSL connector configurations and keystore definitions inside Jetty configuration files.
WebLogic
WebLogic Path → Domain or installation directory of WebLogic. Used to locate keystore configurations and SSL settings associated with managed servers and admin servers.

Fig: Add Server Details
S/MIME Provisioning
The S/MIME Provisioning module enables secure enterprise email communication by issuing and deploying user-level S/MIME certificates. It integrates with identity sources such as Azure Active Directory to discover users and automate certificate provisioning, ensuring encryption, digital signatures, and message integrity across the organization.
Administrators can manage provisioning through:
Automated user discovery
Manual user import
Profile-based configuration using Azure AD credentials
Lifecycle tracking through the dashboard
Certificates → Provisioning Dashboard → Provisioning
This screen displays all users identified for S/MIME certificate provisioning.
S/MIME Provisioning List
The S/MIME Provisioning List presents a structured list of users for whom S/MIME certificates can be issued, tracked, and managed. Each row represents one user account mapped for certificate provisioning.
Name → Displays the full name of the user identified for S/MIME provisioning.
Email → Primary email address associated with the user. This email is used as the certificate identity for secure mail encryption and signing.
Status → Indicates the current provisioning stage of the user’s S/MIME certificate lifecycle.
Common values include:
Awaiting Order
CSR Pending
Certificate Issued
Certificate Installed
Ignored
This provides quick visibility into provisioning progress.
Designation → Displays the user’s role or job title as received from the identity source or manual entry. Helps in identifying ownership and business context.
Source → Indicates how the user was discovered or added.
Examples:
Azure AD Test
Manual Import
This helps distinguish automated discovery from manually added users.
Expiry Date → Displays the certificate expiry date once a certificate has been issued. If provisioning has not started, this may appear blank.
Action → Provides user-specific operational controls.
Primary action:
Ignore Email → Excludes the selected user from provisioning workflows.

Fig: S/MIME Provisioning
Filter Capability
The dashboard supports filtering to locate specific users. Filters allow administrators to narrow results based on attributes such as:
Name
Email
Status
Designation
Source
Filters support structured operators:
Contains
Equals
For status filtering, the Value dropdown allows selection of lifecycle states such as:
Awaiting Order
CSR Pending
Certificate Issued
Certificate Installed
Ignored
This enables precise identification of users at specific provisioning stages.
Import Manually
Administrators can manually add users for S/MIME provisioning when they are not available through directory integration.
Access Path
Click Import Manually on the dashboard.
Form Fields:
Name → Full name of the user to be provisioned.
Email ID → Primary email address that will be used to generate the S/MIME certificate.
Designation → User’s role or department identifier. Helps with organizational classification and reporting.
Actions
Save → Adds the user to the provisioning dashboard and marks them ready for certificate processing.
Reset → Clears all entered values.
This method is typically used for:
External users
Pilot testing
Non-directory environments

Fig: Import Manually
Create a New Profile
Profiles are used to integrate with Azure Active Directory for automated user discovery and provisioning.
Access Path
Click Create a new profile
Purpose
Profiles store secure credentials required to connect to Azure AD and retrieve user details. Once configured, users from Azure AD appear automatically in the dashboard.
Form Fields:
Client ID → Azure application client identifier used for authentication.
Client Secret → Secure key associated with the Azure application.
Tenant ID → Azure directory identifier representing the organization.
Description → Profile name or identifier used to distinguish integrations (Example: Azure AD – Production).
Actions
Save → Creates and activates the profile, enabling automated user discovery.
Reset → Clears all entered values.

Fig: Create a New Profile
CA Connectors
CA connectors (Certification Authority connectors) are software or middleware components that allow systems, applications, or services to integrate with Certification Authorities (CAs) for the management and automation of digital certificates within an organization’s IT infrastructure.
A Certification Authority (CA) is a trusted entity responsible for issuing, validating, renewing, and revoking digital certificates. These certificates are used to establish secure communication, verify identity, enable encryption, and support digital signing across systems, users, applications, and devices. CAs form the backbone of a Public Key Infrastructure (PKI), ensuring that identities and systems can be trusted within secure environments.
In enterprise environments, organizations typically work with both private and public CAs.
Private CA → Private CAs are used internally to issue certificates for enterprise applications, internal domains, user authentication, devices, VPNs and internal services. They provide full control, policy enforcement and customization.
Public CA → Public CAs are used to issue publicly trusted certificates for external-facing services such as websites, public APIs, and internet-facing platforms. Certificates issued by public CAs are trusted by browsers and operating systems globally.
The CA Connectors section in CERTInext allows administrators to integrate the platform with different Certification Authorities so that certificate issuance, renewal, and lifecycle operations can be automated from a single interface. Once a CA connector is configured, CERTInext can directly communicate with the CA to request, renew and manage certificates without manual intervention.
The platform supports multiple CA integrations, including emSign, emCA, AD CS, and DigiCert. emSign and emCA are eMudhra-specific Certification Authorities. emSign is primarily used as a public CA offering publicly trusted certificates, while emCA is used as a private PKI solution for enterprise environments. AD CS is Microsoft’s private CA solution used within Active Directory environments. DigiCert is a globally trusted public CA used for external certificate issuance. Each connector allows CERTInext to securely authenticate with the respective CA and perform certificate lifecycle operations such as issuance, renewal, rotation, and provisioning.

Fig: CA Connectors
Types of Certification Authorities Supported
[1] emSign CA (Public CA - eMudhra)
emSign is a globally trusted public Certification Authority from eMudhra that issues publicly trusted SSL/TLS and enterprise certificates. It is used for securing internet-facing applications, APIs, websites, and external services that require globally recognized trust across browsers, operating systems, and devices.
[2] emCA (Private CA - eMudhra Enterprise PKI)
emCA is eMudhra’s enterprise-grade private PKI solution used for internal certificate issuance and lifecycle management. It enables organizations to issue and manage certificates for internal domains, users, devices, applications, and services, while maintaining full control over policies, identity validation, and trust frameworks. emCA supports enterprise-scale deployments requiring centralized governance and secure internal trust models.
[3] AD CS (Private CA - Microsoft Active Directory Certificate Services)
AD CS is Microsoft’s native enterprise PKI solution integrated with Active Directory. It is commonly used for domain-based certificate issuance such as user certificates, machine authentication, internal TLS certificates, and enterprise identity validation.
[4] DigiCert (Public CA)
DigiCert is supported as a public CA integration for organizations that use DigiCert for issuing certificates for external-facing applications, websites, and services.
Why CA Connectors Are Required
CA connectors act as a bridge between CERTInext and the Certification Authority. Without configuring a CA connector, provisioning workflows cannot request certificates from a CA.
They enable:
Automated certificate issuance
Secure communication with the CA
Centralized certificate lifecycle management
Renewal and rotation automation
Policy-driven provisioning
Once configured, the connector can be used in provisioning workflows to request and deploy certificates automatically.
Adding a CA Connector
Each CA type has its own configuration form because authentication methods, policies, and integration mechanisms differ.
[1] emSign Connector
This page allows you to configure the connection between CERTInext and emSign. By providing the required API URLs and authentication details, you can enable secure communication and renew certificates directly through emSign before they expire.
emSign Connector - List Page
This page displays all configured emSign connectors.
Columns available:
Name → Displays the configured connector name.
Base URL → Shows the emSign API endpoint used for certificate operations.
Status → Indicates whether the connector is active.
Actions → Provides management controls for the connector:
Edit Template → Allows modification of connector details.
Disable Template → Temporarily disables the connector.
Delete Template → Permanently removes the connector configuration.
Use the + Create button to add a new CA connector. This connector enables integration with the emSign public CA using API-based communication.
Add Connector - Field Details
Name → A unique identifier for the connector. This helps administrators distinguish between multiple connectors such as sandbox and production environments.
emSign API Base URL → The API endpoint used to communicate with the emSign system. This URL is environment-specific and must point to the correct emSign service.
emSign Account Number → The customer account identifier assigned by emSign. This links certificate requests to the correct account.
emSign AccessKey → The authentication key used to securely access emSign APIs. This acts as the credential for API communication.
Full Name → The profile name associated with the connector identity. Typically represents the administrative or service identity.
Email → The email linked with the connector profile for identification and record tracking.
Purpose of this connector: Allows CERTInext to request, issue, and renew publicly trusted certificates from emSign.

Fig: Create emSign Connector
[2] emCA Connector Configuration
This page allows you to configure the connection between CERTInext and emCA. By providing the required API URLs and authentication details, you can enable secure communication and renew certificates directly through emCA before they expire.
emCA Connector - List Page
This page displays all configured emCA connectors.
Columns available:
Name → Displays the configured connector name.
Base URL → Shows the emCA API endpoint used for certificate operations.
Status → Indicates whether the connector is active.
Actions → Provides management controls for the connector:
Edit Template → Allows modification of connector details.
Disable Template → Temporarily disables the connector.
Delete Template → Permanently removes the connector configuration.

Fig: emCA Connector
Use the + Create button to add a new CA connector. This connector integrates CERTInext with emCA, the private enterprise PKI solution from eMudhra.
Add Connector - Field Details
emCA Version → Specifies the version of emCA deployed in the environment. This ensures compatibility with the correct API format.
Name → Friendly name used to identify the connector configuration.
Base URL → The emCA API endpoint where certificate requests will be sent.
Username → Service account username used to authenticate with emCA.
Issuing CA → The name of the issuing CA within the emCA hierarchy that will sign the certificates.
Subscriber ID → The organization-specific identifier provided in the emCA portal that maps requests to the correct tenant or account.
Password → The password for the service account used to authenticate with emCA.
Upload File → A required file used for establishing secure communication or validation as part of the emCA integration configuration.
Purpose of this connector: Used for internal enterprise certificate issuance, policy-controlled deployments, and private PKI management.

Fig: Create emCA Connector
[3] AD CS Connector Configuration
This page allows you to configure the connection between CERTInext and AD CS. By providing the required API URLs and authentication details, you can enable secure communication and renew certificates directly through AD CS before they expire.
AD CS Connector - List Page
This page displays all configured AD CS connectors.
Columns available:
Name → Displays the configured connector name.
Base URL → Web service URL used to communicate with AD CS
Status → Indicates whether the connector is active.
Actions → Provides management controls for the connector:
Edit Template → Allows modification of connector details.
Disable Template → Temporarily disables the connector.
Delete Template → Permanently removes the connector configuration.
Use the + Create button to add a new CA connector. This connector integrates CERTInext with Microsoft Active Directory Certificate Services.

Fig: AD CS Connector
Add Connector - Field Details
Name → Identifier for the AD CS connector configuration.
Base URL → The web service endpoint for the AD CS enrollment service, typically pointing to the certsrv path.
CA Setup Type → Specifies whether the CA is a Standalone CA or an Enterprise CA.
Standalone CA → Used when the CA operates independently without domain integration.
Enterprise CA → Used when the CA is integrated with Active Directory and uses domain authentication.
Username → Required when Enterprise CA is selected. Represents a domain service account used for authentication.
Password → Password for the service account used to access AD CS services.
Purpose of this connector: Allows CERTInext to request and manage internal domain-based certificates in Windows enterprise environments.

Fig: Create AD CS Connector
[4] DigiCert Connector Configuration
This page allows you to configure the connection between CERTInext and Digicert. By providing the required API URLs and authentication details, you can enable secure communication and renew certificates directly through Digicert before they expire.
DigiCert Connector - List Page
This page displays all configured DigiCert connectors.
Columns available:
Name → Displays the configured connector name.
Base URL → Web service URL used to communicate with AD CS
Status → Indicates whether the connector is active.
Certificate Validity → Default validity period configured.
Actions → Provides management controls for the connector:
Edit Template → Allows modification of connector details.
Disable Template → Temporarily disables the connector.
Delete Template → Permanently removes the connector configuration.
Use the + Create button to add a new CA connector.
This connector enables integration with DigiCert’s public CA services.

Fig: DigiCert Connector
Fields:
Name → Identifier for the DigiCert connector configuration.
DigiCert API Base URL → Endpoint used to communicate with DigiCert services.
DigiCert API Key → Authentication key used to securely connect to DigiCert APIs.
Server Platform ID → Identifier representing the server platform mapping in DigiCert.
Organization ID → The organization identifier in the DigiCert system used to map certificate orders.
Container ID → The container within DigiCert where certificate products are managed.
Certificate Validity → Defines the validity period for issued certificates based on policy and allowed limits.
Payment Type → Specifies how certificate issuance charges are handled.
Balance → Uses available account balance for certificate issuance.
Profile → Uses a configured billing profile for payment handling.
Purpose of this connector: Used for automated issuance and renewal of publicly trusted certificates from DigiCert.

Fig: Add DigiCert Connector
Last updated
