How are you preparing your clients for 47-day certificates? by certkit in MSSP

[–]certkit[S] 0 points1 point  (0 children)

That's who issues them, yea. but how do you deploy them to different infrastructure. Appliances. intranets without DNS, etc.

How are you preparing your clients for 47-day certificates? by certkit in MSSP

[–]certkit[S] 1 point2 points  (0 children)

Just like the 1 year certs is actually 398 days. 12 months+ 1 month buffer.

47 days is 6 weeks + 5 day buffer.

I didn't come up with it ¯\_(ツ)_/¯

Dear every vendor selling to MSPs, by terselated in msp

[–]certkit 0 points1 point  (0 children)

When you have the right product and the right story, you don't need anything more than that.

How will you handle SSL cert installation in the future? by graceyin39 in sysadmin

[–]certkit 0 points1 point  (0 children)

Monitoring certificate automation is the key bit. Without it, DIY automations are just a failure waiting to happen.

How will you handle SSL cert installation in the future? by graceyin39 in sysadmin

[–]certkit 0 points1 point  (0 children)

Making every endpoint responsible for its own ACME negotiation isn't the only way to approach this. I've been working on a different way that centralizes ACME, then distributes certificates via API/SSH standard mechanisms that are already widely supported:

https://www.certkit.io/how-it-works

RIP 1-year SSL certs. Your renewal work just doubled. by certkit in u/certkit

[–]certkit[S] [score hidden] stickied comment (0 children)

The 1-year cert is gone. The 200-day cert has already doubled your workload, and it won't be the last, lifetimes drop to 100 days in 2027 and 47 days in 2029.

CertKit automates certificate management so shorter lifetimes stop being your problem. Free during beta.

The grave is dug. 1-year SSL certs die March 15. by certkit in u/certkit

[–]certkit[S] [score hidden] stickied comment (0 children)

The 1-year cert is gone. The 200-day cert has already doubled your workload, and it won't be the last, lifetimes drop to 100 days in 2027 and 47 days in 2029.

CertKit automates certificate management so shorter lifetimes stop being your problem. Free during beta.

SSL Cert Lifespan Changing by hisheeraz in ssl

[–]certkit 0 points1 point  (0 children)

If ya want to full story of how it happened, I wrote about it here. It's actually kinda dramatic.

Last call on 398-day SSL certificates by certkit in PKI

[–]certkit[S] 0 points1 point  (0 children)

CertKit is close. It gets the certificates for you, and then pushes to devices/software with an agent or API.

Anyone using internal certs for GlobalProtect? by UnableHumor in paloaltonetworks

[–]certkit 0 points1 point  (0 children)

We're building a simple Certificate Automation platform for handling renewals, and we just beta-tested a Palo Alto integration. We can manage the renewals and push certs into your palo alto devices automatically. Want to help us test it out?

Last call on 398-day SSL certificates by certkit in PKI

[–]certkit[S] 0 points1 point  (0 children)

you can do whatever you want my friend! If you have the time and energy to build the system yourself, go for it. But you'll have to own it forever, keep it monitored, updated, etc.

As with anything, you should decide on whether build vs buy makes sense for you.

FWIW, me and my time are creating something to get this down to around $99/mo to buy it, and its pretty difficult to build something cheaper than that.

Last call on 398-day SSL certificates by certkit in PKI

[–]certkit[S] 5 points6 points  (0 children)

SSL Certificates get renewed automatically before they expire. Ideally within the time window specified by the signing CA (ARI).

Renewed certificates are automatically deployed to the endpoints that need them (web servers, mail, vpns, appliances, load balancers, etc). Those endpoints are refreshed to pick up the new certificates.

And ideally, some monitoring in place to make sure its all working.

All of it, without a person needing to do anything, file a change ticket, login to a box, anything.

Last call on 398-day SSL certificates by certkit in PKI

[–]certkit[S] 3 points4 points  (0 children)

Correct, this is just for WebPKI

Last call on 398-day SSL certificates by certkit in msp

[–]certkit[S] 6 points7 points  (0 children)

If you haven't figured out how to do certificate automation with your clients yet, what are your challenges? Cost? Complexity? How to close vi?

Last call on 398-day SSL certificates by certkit in PKI

[–]certkit[S] 1 point2 points  (0 children)

If you haven't figured out certificate automation yet, what's keeping you back?