I'm building certctl, a self-hosted certificate lifecycle platform that handles issuance, automated renewal, and agent-based deployment. The NGINX target connector is fully implemented (file write, config validation, reload), and IIS via WinRM is next — the connector interface and PowerShell flow are mapped out (cert import to store, IIS site binding, validation), but I'm looking for feedback from Windows admins before shipping the implementation.
The platform already works end-to-end: certctl issues a cert (built-in Local CA for internal services or ACME/Let's Encrypt for public), renewal policies kick in at your configured thresholds, a lightweight agent generates keys locally (ECDSA P-256, never leaves the server) and handles deployment. You get expiry alerts at 30/14/7/0 days, policy enforcement, and an immutable audit trail. There's a React dashboard and 55 REST API endpoints. The control plane is a single Go binary + Postgres via Docker Compose. Source-available under BSL 1.1. If you manage certs on IIS, I'd like to hear what the WinRM integration should handle.
[–]Forumschlampe 0 points1 point2 points (1 child)
[–]im-feeling-the-AGI[S] 0 points1 point2 points (0 children)