Skip to main content

Discovered Certificates

You can view, manage, and categorize all certificates found through discovery operations.

Access Path

To view discovered certificates, you can use the following paths in the application panel:

  • Discovery β†’ Certificate-In-Use β†’ Network List - Server-based view
  • Discovery β†’ Certificate-In-Use β†’ Certificate List - Certificate-based view

Discovered Certificates List​

You can examine discovered certificates in SecTrail CM in two different views:

  • Certificate-Based List - Shows each unique certificate in a single row
  • Server-Based List - Lists certificates according to the servers they're found on

Server-Based List View​

Discovered Certificates - Server-Based List

Discovered Certificates - Server-Based View

List Information​

The following information is displayed for each row in the server-based view:

  • Last Seen - Date and time the certificate was last seen
  • Server - IP address or hostname of the server where the certificate is found
  • Port - Which port the certificate is running on (e.g., 443, 8443)
  • Type - Network type of the certificate (Network, External, F5, etc.)
  • Subject - Common Name (CN) information of the certificate
  • Not Before - Certificate validity start date
  • Not After - Certificate validity end date
  • Status - License status of the certificate (Managed or Monitored)

Operations on the List​

From the toolbar at the top of the page, you can perform the following operations:

  • Show X rows - Set the number of rows to display per page (25, 50, 100)
  • Selection - Select multiple rows for batch operations
  • Export - Export the list (in Excel, CSV, PDF formats)
  • Status - Filter by license status (Managed, Monitored)
  • Details - View details of selected certificate
  • Delete - Delete selected records
  • Add Device - Add new device
  • Generate CSR - Create Certificate Signing Request (CSR)
  • Last - Filter by last seen time
  • Network Type - Filter by network type
  • Certs - Filter by certificate chain type (Server Certificate, Signing Certificate)
  • Show/Hide Columns - Customize displayed columns
Column Customization

With the Show/Hide Columns button, you can customize displayed columns. You can add or remove columns according to your needs to use the list more efficiently.

Certificate-Based List View​

Discovered Certificates - Certificate-Based List

Discovered Certificates - Certificate-Based View

List Information​

In the certificate-based view, each row represents a unique certificate and includes the following information:

  • Subject - Certificate's Common Name (CN) and DN information
  • Subject Alternative Names - Certificate's SANs (DNS names) list
  • Not Before - Certificate validity start date
  • Not After - Certificate validity end date
  • Status - Certificate license status

Status (License Status)​

There are two different statuses for discovered certificates:

StatusDescriptionUsage Purpose
ManagedCertificates fully managed by SecTrail CMAutomatic renewal, deployment, lifecycle
MonitoredCertificates only displayed in inventory (read-only)Provides inventory visibility, no alarms/warnings
Managed vs Monitored
  • Managed: Full control over certificates - create, renew, deploy, rotate operations possible
  • Monitored: Inventory visibility only - certificates are displayed in inventory, but alarm, warning, and management operations cannot be performed

Network Configuration (Network Type Configuration)​

Values in the Network Type column determine which network category the certificates belong to. These values can be customized with the Network Configuration feature.

Network Configuration Access

You can access network type configuration settings from the Network Configuration tab found on the Discovery β†’ Certificate-In-Use β†’ Network List or Certificate List pages.

Network Configuration List

Network Configuration Management - Network Type Definitions

What is Network Configuration?​

Network Configuration allows you to automatically categorize certificates based on Subject (CN) information. This way:

  • You can automatically separate internal and external certificates
  • You can group certificates belonging to specific Certificate Authorities (CA)
  • You can make certificate reporting more meaningful
  • You can speed up filtering and search operations

Network Configuration List​

On the list page, you can see all defined network type rules:

  • Type - Network type category (External, Internal)
  • Condition - Matching condition (usually contains)
  • Regex - Matching rule (text or regex to search within Subject)

Creating New Network Configuration​

Create Network Configuration

New Network Configuration Add Form

Configuration Parameters​

ParameterDescriptionOptions
TypeDetermine network typeβ€’ External: External certificates (signed by public CAs)
β€’ Internal: Internal certificates (private CAs, self-signed)
ConditionSelect matching methodβ€’ contains: Text searched in Subject (used in most cases)
β€’ equals: Exact match
β€’ regex: Regular expression matching
RegexEnter text or regex pattern to search in Subjectβ€’ CN=GlobalSign (all certificates containing GlobalSign)
β€’ CN=localhost (localhost certificates)
β€’ CN=.*\.mycompany\.com (all subdomains under mycompany.com)

After entering the form information, click the Submit button to save the configuration.

Viewing Certificate Details​

You can view detailed information of a certificate by clicking on any certificate row or pressing the Details button:

  • Subject DN - Full Distinguished Name information
  • Issuer DN - CA that signed the certificate
  • Serial Number - Certificate serial number
  • Signature Algorithm - Signature algorithm (e.g., SHA256withRSA)
  • Public Key - Public key information and algorithm
  • Validity - Validity dates (Not Before / Not After)
  • Extensions - Certificate extensions (SAN, Key Usage, etc.)
  • Thumbprint - Certificate fingerprint (SHA1, SHA256)
Automation Tip

When you define Network Configuration rules correctly, newly discovered certificates are automatically assigned to the correct categories and no manual action is required.