Skip to main content
banner image
venafi logo

Certificate Enrollment: What You Should Know [Expert Insights]

Certificate Enrollment: What You Should Know [Expert Insights]

certificate enrollment
April 30, 2021 | David Bisson

Certificate enrollment refers to the process by which a user requests a digital certificate to use as a machine identity on a public-facing system, application, API, container or cluster. The process starts when you submit a certificate request with a certification authority (CA), an entity which issues and manages digital certificate for use within the public key infrastructure (PKI). Users can request a digital certificate from a CA manually or automatically without any interaction on their part.
 

Here’s a brief guide that includes the steps required for certificate enrollment.

Step 1. You request a certificate

A certificate enrollment procedure begins when you file a certificate enrollment request with a CA. The request should contain sufficient information to enable the CA to verify the identity of the user requesting the certificate. These pieces of data generally include your domain name, a business telephone number that is obtainable via public sources, and the details for three contacts:

  1. An authorization contact, or someone who is authorized to request certificates for your organization
  2. A technical contact, or someone who receives an approved certificate and who will coordinate its renewals/updates
  3. A billing contact who can manage purchases of certificates.

The CA may also request additional information based upon the type of certificate requested.
 

Step 2. You add required characteristics

Besides submitting relevant information for verification purposes, you must submit other details. For instance, the PKCS#10: Certification Request Syntax Specification, one of the most common formats for certificate enrollment submissions, requires users to send over their public key for the CA's signature, the digital signature, and the hashing algorithm used to create the digital signature. You are usually not responsible for creating the public key yourself. As reported by Tech-FAQ, you send your certificate request to a Cryptographic Service Provider (CSP) installed on your computer. The CSP, in turn, creates the public and private key pair for the request, adds the public key to the request information, and passes it on to the CA.
 

Step 3. CA validates your request

After receiving the enrollment request, the CA decrypts the digital signature using the public key, calculates a hash, and uses that product to verify the hash in the decrypted signature. It also uses all of the verification information provided by the user for validation purposes. For instance, it verifies that the requesting company is in good standing by confirming active registration in corporate registries and reaches out to the contact listed in the requester website's whois record to confirm the company's domain. If validation is successful, the CA digitally signs the public key, adds it to an X.509 certificate, and sends the completed certificate to the user.
 

Step 4. You install the certificate on your machine

At that point, you should verify the certificate, install it on your server, and make sure you make a note of its location so that relevant software like Apache can find it in the future. You should also consider copying the file received from Certification and storing a certificate's relevant keys in a secure location. Only then should you publicize copies of your certificate so that digital entities like web sites and browsers can authenticate it.
 

Step 5. You track the certificate throughout its lifecycle

To maintain that authentication, users who purchase a certificate need to make sure they know all locations where certificates are installed and used by applications after enrollment. If you do not have an automated solution for machine identity management, you will need to manually gather and document that information and use it to manage all certificate purchases and renewals. If you lose track of a certificate that you have installed, it can expire and trigger an application outage. So, you want to take extra special care to keep track of all your organization’s certificates.


That's where Venafi comes in. Our Machine Identity Management platform features an enrollment portal that helps users configure multiple CAs. This allows organizations to more quickly request and renew certificates. But more importantly, the Venafi Trust Protection Platform allows organizations to verify that the certificate is installed correctly and will work as intended. The solution also features the ability to centrally generate key pairs and CSRs for users requesting certificates, and it enables dual controls for installation and enrollment.
 

Streamline your certificate enrollment process today.

Related blogs


Learn more about machine identity management. Explore now.

Like this blog? We think you will love this.
acme-protocol-and-https
Featured Blog

What is the ACME Protocol and How Does It Work?

How does the ACME protocol work?

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies
eBook

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

David Bisson
David Bisson

David is a Contributing Editor at IBM Security Intelligence.David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more