Dashboard and Widgets

The CertiNext dashboard provides a unified, real-time snapshot of certificate and key posture across the selected group or organizational context. Each widget highlights actionable information, enabling teams to proactively manage risk and operational workload.

User Statistics

This widget summarizes user access and onboarding status within the selected group:

  • Total Users – Number of active users with access to CertiNext.

  • Pending Invites – Users who have been invited but not yet onboarded.

  • Pending Admin Approval – Requests awaiting administrative approval.

This helps administrators maintain visibility into access governance and onboarding workflows.


Domain & Organization Pending Approval

This widget highlights validation tasks that require attention before certificates can be issued:

  • Domains – Domains awaiting ownership or control validation.

  • Organizations – Organizations pending verification or approval.

It ensures that validation bottlenecks are identified early, helping avoid delays in certificate issuance.


Certificate Statistics

This widget provides insight into certificate lifecycle status and potential risks:

  • Orders Pending Issuance – Certificate requests awaiting CA issuance.

  • Certificates Pending Provisioning – Issued certificates that are yet to be deployed to endpoints.

  • Expiring Within 30 Days – Certificates approaching expiry, requiring renewal or replacement.

  • Chaining Issues – Certificates with incomplete or incorrect trust chains.

These indicators help teams prioritize remediation and prevent service disruptions.


Bot Statistics

Bot statistics reflect the health and readiness of automation components:

  • Bots with Issues – Automation bots experiencing errors or failures.

  • Bots with Updates Available – Bots requiring updates for compatibility or enhancements.

This widget helps ensure that automation pipelines remain reliable and up to date.


End Point Statistics

This widget focuses on endpoint-level exposure:

  • Unprotected Endpoints – Systems or applications without valid certificate coverage.

  • Certificates with Vulnerabilities – Certificates identified with weak algorithms or configurations.

It provides early warning signals for security gaps at the infrastructure level.


Key Statistics

Key statistics offer cryptographic hygiene indicators:

  • Keys with Aging >180 Days – Keys that may require rotation based on policy.

  • Weak Keys – Keys that do not meet defined strength or algorithm requirements.

This supports proactive cryptographic governance and compliance alignment.


Certificates Issued (Public / Private)

This chart visualizes certificate issuance trends over time, segmented by:

  • Public Certificates

  • Private Certificates

It helps teams understand issuance patterns, growth trends, and dependency on public versus internal PKI.


Expiring Certificates Timeline

This widget presents a time-based view of upcoming certificate expirations across multiple horizons:

  • 1 Day

  • 1 Week

  • 15 Days

  • 1 Month

  • 6 Months

  • Max

The timeline enables forward-looking planning, ensuring renewals are automated or scheduled well in advance.


Interactive Graphs and Analytical Views

At the bottom of the Dashboard, CertiNext provides multiple interactive graphical views that offer visual insight into certificate distribution, security posture, and cryptographic lifecycle trends. These graphs are dynamic and allow filtering, time-range selection, and contextual drill-down.

Certificates Issued (Public / Private)

This bar chart displays certificate issuance trends by month.

• Toggle between Public and Private certificates. • View issuance volume across selected months. • Identify spikes in certificate generation (e.g., bulk provisioning or renewals).

This helps teams analyze growth patterns and CA dependency trends over time.


Expiring Certificates

This bar graph visualizes certificate expiration distribution across selectable time horizons:

• 1 Day • 1 Week • 15 Days • 1 Month • 6 Months • Max

The View All option navigates to the full certificate list filtered by expiration window.

This enables forward planning for renewal campaigns and workload balancing.


Expiring Certificates (Discovery)

This pie chart displays discovered certificates grouped by source:

• SSL/TLS • LDAP • File System • AWS • Others

Time filters (1D, 1W, 15D, 1M, 6M, MAX) allow viewing expirations within specific ranges.

This helps determine which discovery sources contribute most to upcoming expiry risks.


Certificates by Source (Discovery)

This interactive pie chart categorizes discovered certificates by source.

Available controls:

Filter By SourceFilter By CA

Source categories shown:

• SSL/TLS • LDAP • File System • AWS • Others

This visualization helps validate discovery coverage across infrastructure, cloud platforms, and repositories.


Certificates by Security Rating

This bar chart categorizes certificates by security posture:

• Excellent • Best • Good • Poor • Fail

Security ratings are derived from:

• Key size strength • Algorithm compliance • Certificate configuration • Trust chain validation

The Learn More option provides further rating methodology details.

This graph helps identify weak or non-compliant certificates requiring remediation.


Key Ageing

The Key Ageing section combines summary indicators with a time-series trend graph.

Top metrics displayed:

No. of Keys – Total keys in inventory • Keys Used – Keys currently in active use • Keys Rotated – Keys that have undergone rotation

The line graph shows key activity trends over time with selectable ranges:

• 1D • 1W • 15D • 1M • 6M • MAX

This supports enforcement of key rotation policies and long-term cryptographic hygiene monitoring.


Keys by Tags

This section provides tab-based categorization of keys:

Tabs available:

• Key by Source • Key by Type • Key by Size

The “Key by Source” view displays keys grouped by:

• SSH • HSM • PKCS12 • Database

The horizontal bar chart shows count distribution by key origin.

This enables governance teams to analyze key storage patterns and ensure secure key handling practices across environments.

Summary

Together, the CertiNext navigation and dashboard widgets provide:

  • Operational clarity for daily certificate management

  • Risk visibility for expiring, weak, or misconfigured assets

  • Governance oversight for users, domains, organizations, and keys

  • Automation health monitoring for large-scale environments

This design ensures CertiNext remains effective for both tactical execution and strategic certificate governance at enterprise scale.

Last updated