Skip to main content

Certificate Creation

This guide explains step-by-step how to create different types of certificates through SecTrail CM. SecTrail CM allows you to manage your own Certificate Authority (CA) infrastructure and sign certificates for various purposes.

About the Feature

With the certificate creation feature, you can perform Root CA, Intermediate CA, Self-Signed, CSR, and external CA signing operations. Each certificate type is optimized for different use cases.

Certificate Creation Screen​

You can use the built-in certificate manager in SecTrail CM to create a new certificate.

Access Path

To create certificates: Go to Inventory β†’ Create Certificate menu.

Create New Certificate

Certificate Creation Form

Certificate Types​

SecTrail CM supports the following certificate types for different use cases:

Certificate Type Options​

Certificate TypeDescriptionUsage Purpose
Root CARoot certificate authorityTop level of your CA infrastructure, signs all other certificates
Intermediate CAIntermediate certificate authoritySigned by Root CA, signs end-user certificates
Self-SignedSelf-signed certificateFor test environments, internal applications, development
Sign With Local CASigning with local CASign new certificates with existing CA in SecTrail CM
CSRCertificate Signing RequestCreate certificate request to be signed by external CAs
External CASigning with external CASigning with integrated CAs like ADCS, GlobalSign, DigiCert, Hashicorp Vault

Certificate Parameters​

You can configure the following parameters when creating a certificate:

Basic Information​

FieldRequiredDescriptionExample
Common Nameβœ… RequiredMain domain name (FQDN) of the certificateexample.com, *.example.com
Subject Alternative Namesβšͺ OptionalAdditional domain names and IP addressesDNS:example.com,IP:1.1.1.1
Certificate Typeβœ… RequiredCertificate type selectionRoot CA, Intermediate CA, etc.
Organizationβšͺ OptionalOrganization namebntpro.com
Organizational Unitβšͺ OptionalDepartment or unitIT Department, Engineering
Localityβšͺ OptionalCityIstanbul, Ankara
Stateβšͺ OptionalState or provinceIstanbul, California
Countryβšͺ OptionalCountry code (2 characters)TR, US
E-mail Addressβšͺ OptionalContact email addressadmin@example.com
Required and Optional Fields
  • Common Name and Certificate Type are required fields
  • All other fields are optional but recommended for professional certificates
  • When obtaining certificates from public CAs (DigiCert, GlobalSign, etc.), fields like Organization, Country may be required
Subject Alternative Names (SAN)

You can define multiple domain names and IP addresses in the SAN field. Format:

  • DNS:example.com - For domain names
  • IP:192.168.1.1 - For IP addresses
  • Separate multiple values with commas: DNS:example.com,DNS:www.example.com,IP:1.1.1.1

Security Parameters​

FieldDescriptionRecommended Value
LifetimeCertificate validity period (days)365, 730, 825
Pfx PasswordPrivate key protection passwordStrong and complex password
Confirm Pfx PasswordPassword verificationSame password
Key AlgorithmKey algorithmRSA, ECDSA
Key LengthKey length (bits)2048, 4096
Hash FunctionHash algorithmsha256, sha384, sha512
Encrypt KeyPrivate key encryptionActive (recommended)

Key Management​

FieldDescriptionOptions
Key ImportWhere the key will be storedβ€’ Key: Together with certificate
β€’ Database: In SecTrail CM database
β€’ HSM: Hardware Security Module
β€’ BeyondTrust: BeyondTrust Password Safe
Extended Key UsageCertificate usage areasserverAuth, clientAuth, codeSigning, emailProtection
Key Storage Options

SecTrail CM offers multiple options for securely storing private keys:

  • Key: Private key is stored together with certificate (default)
  • Database: Stored encrypted in SecTrail CM database
  • HSM (Hardware Security Module): Stored in hardware security module (most secure, recommended for enterprise environments)
  • BeyondTrust Password Safe: Stored in central password vault with BeyondTrust integration

For configuring HSM and BeyondTrust integrations, review the Integrations page.

Extended Key Usage (EKU) Values​

Determines the purposes for which the certificate can be used:

EKU ValueDescriptionUse Case
serverAuthServer authenticationWeb servers (HTTPS), TLS/SSL
clientAuthClient authenticationVPN, mutual TLS, user certificates
codeSigningCode signingSoftware, application signing
emailProtectionEmail protectionS/MIME, email encryption
timeStampingTime stampingDocument and transaction timestamps
ocspSigningOCSP response signingOCSP responder certificates

Certificate Types and Creation Steps​

1. Creating Root CA​

Root CA forms the foundation of your own PKI infrastructure. It is used to sign all other certificates.

When to Use?
  • When setting up a new PKI infrastructure
  • When creating your own internal certificate authority
  • When you want to centrally manage all organization certificates

Steps​

  1. Select Root CA from Certificate Type field
  2. Fill in basic information:
    • Common Name: CA name (e.g., MyCompany Root CA)
    • Organization: Company name
    • Country: Country code
  3. Set security parameters:
    • Lifetime: 3650 days (10 years - Root CAs are long-lived)
    • Key Length: 4096 bit (maximum security)
    • Hash Function: sha256 or sha384
  4. Set and confirm Pfx Password
  5. Leave Extended Key Usage field empty (Root CA is used for all purposes)
  6. Click Submit button
Very Important

The Root CA private key is extremely critical. If you lose or have this key stolen, your entire PKI infrastructure is compromised. You must:

  • Use a strong password
  • Take encrypted backup
  • Keep access limited

2. Creating Intermediate CA​

Intermediate CA acts as a bridge between Root CA and end-user certificates.

When to Use?
  • To protect Root CA (Root CA can be kept offline)
  • When creating separate CAs for different departments or regions
  • As a good security practice (recommended)

Steps​

  1. Select Intermediate CA from Certificate Type field
  2. Fill in basic information:
    • Common Name: MyCompany Intermediate CA
    • Fill in fields like Organization, Country
  3. Set security parameters:
    • Lifetime: 1825 days (5 years)
    • Key Length: 2048 or 4096 bit
    • Hash Function: sha256
  4. Signing with Root CA: The existing Root CA in the system will automatically sign this Intermediate CA
  5. Set Pfx Password
  6. Click Submit button
Best Practice

Use Intermediate CA for daily certificate signing operations, keep Root CA offline and in a secure location.

3. Creating Self-Signed Certificate​

Self-signed certificates are ideal for quick test and development environments.

When to Use?
  • For development and test environments
  • For internal network applications
  • For proof-of-concept work
  • For quick prototyping

Steps​

  1. Select Self-Signed from Certificate Type field
  2. Fill in basic information:
    • Common Name: dev.example.com or *.dev.example.com (wildcard)
    • Subject Alternative Names: DNS:dev.example.com,DNS:*.dev.example.com
  3. Set security parameters:
    • Lifetime: 365 days
    • Key Length: 2048 bit (sufficient for testing)
    • Hash Function: sha256
  4. Extended Key Usage: serverAuth (for web servers)
  5. Set Pfx Password
  6. Click Submit button
Caution

Self-signed certificates are marked as untrusted by browsers. Do not use in production environments.

4. Sign With Local CA (Signing with Local CA)​

Create new certificates using your existing CAs in SecTrail CM.

When to Use?
  • When creating certificates for production servers
  • When signing certificates with your trusted CA
  • When producing certificates compliant with corporate standards

Steps​

  1. Select Sign With Local CA from Certificate Type field
  2. Select CA to sign: Choose one of the registered CAs in the system
  3. Fill in basic information:
    • Common Name: web.example.com
    • Subject Alternative Names: Add all needed domains
  4. Set security parameters:
    • Lifetime: 365 or 825 days (according to public trust requirements)
    • Key Length: 2048 bit
    • Hash Function: sha256
  5. Extended Key Usage:
    • For web servers: serverAuth
    • For VPN: serverAuth,clientAuth
  6. Set Pfx Password
  7. Click Submit button

5. Creating CSR (Certificate Signing Request)​

Create CSR to obtain certificate from an external CA (Let's Encrypt, DigiCert, GlobalSign, etc.).

When to Use?
  • When purchasing public certificates
  • When using third-party CA services
  • If your organization has external CA agreements

Steps​

  1. Select CSR from Certificate Type field
  2. Carefully fill in basic information:
    • Common Name: Domain for which you'll request certificate
    • Organization: Company name to be verified by CA
    • Organizational Unit, Locality, State, Country: Required for verification
    • E-mail Address: Contact email
  3. Set security parameters:
    • Key Length: 2048 bit (accepted by most CAs)
    • Hash Function: sha256
  4. Set Pfx Password (for private key protection)
  5. Click Submit button
  6. Download the created CSR and send to CA
Post-CSR Steps
  1. Download CSR from SecTrail CM
  2. Go to your CA provider's website
  3. Upload or paste CSR
  4. Complete domain verification process
  5. Receive signed certificate from CA
  6. Import certificate to SecTrail CM (Import)

6. External CA (Signing with External CA)​

Sign certificates directly with external CA systems integrated with SecTrail CM.

When to Use?
  • If you have Microsoft ADCS (Active Directory Certificate Services) integration
  • If you have enterprise CA agreements like GlobalSign, DigiCert
  • If you're using Hashicorp Vault PKI
  • If you want automatic certificate management

Supported External CAs​

SecTrail CM supports the following external CA integrations:

CA ProviderDescriptionUsage
ADCSMicrosoft Active Directory Certificate ServicesWindows environments, enterprise PKI
GlobalSignGlobalSign HVCA (Managed PKI)Enterprise, high-volume certificate management
DigiCertDigiCert CertCentral APIPublic SSL/TLS certificates
Hashicorp VaultVault PKI Secrets EngineCloud-native, dynamic certificate management
Prerequisite: CA Integration

You must configure the relevant CA integration before signing certificates with external CA.

For Integration Setup:

  1. Go to Settings β†’ Integrations β†’ CA Integrations section
  2. Select the CA you want to use (ADCS, GlobalSign, DigiCert, Hashicorp Vault)
  3. Configure API information and connection settings
  4. Test the connection

For detailed setup instructions, review the Integrations page.

ADCS Signing Steps​

  1. Certificate Type: Select External CA
  2. From External CA Dropdown: Select ADCS
  3. ADCS Configuration:
    • CA Server: ADCS server address
    • Certificate Template: Template name to use
    • Credentials: Authorization information
  4. Fill in certificate information (Common Name, SAN, etc.)
  5. Click Submit button

GlobalSign Signing Steps​

  1. Certificate Type: Select External CA
  2. From External CA Dropdown: Select GlobalSign
  3. GlobalSign Configuration:
    • API Key: GlobalSign HVCA API key
    • API Secret: API secret key
    • Profile: Certificate profile
  4. Fill in certificate information
  5. Click Submit button

DigiCert Signing Steps​

  1. Certificate Type: Select External CA
  2. From External CA Dropdown: Select DigiCert
  3. DigiCert Configuration:
    • API Key: DigiCert CertCentral API key
    • Organization ID: Org ID in DigiCert
    • Certificate Type: OV, EV, DV selection
  4. Fill in certificate information
  5. Click Submit button

Hashicorp Vault Signing Steps​

  1. Certificate Type: Select External CA
  2. From External CA Dropdown: Select Hashicorp Vault
  3. Vault Configuration:
    • Vault Address: Vault server address
    • PKI Path: PKI secrets engine path
    • Token: Vault authentication token
    • Role: Vault PKI role name
  4. Fill in certificate information
  5. Click Submit button

Post-Certificate Creation Operations​

After a certificate is successfully created, it is automatically added to inventory and you can perform various operations.

Automatic Inventory Recording

Every certificate you create is automatically added to the inventory list on the Inventory β†’ Certificate List page. From here you can view, manage, and track all your certificates. For detailed information about the inventory list, review the Inventory Management page.

Viewing and Downloading Certificate​

Immediately after certificate creation, the Show Certificate screen opens and you can view certificate information:

Show Certificate

Certificate Details and Download Options

Displayed Information​

FieldDescription
NameCertificate's Common Name (CN) value (e.g., sectrail.local)
CertificateComplete certificate content in PEM format (starts with -----BEGIN CERTIFICATE-----)
PasswordCertificate private key password (shown hidden for security, can be viewed by clicking eye icon)

Downloading Certificate​

After certificate creation, you can download in different formats using download buttons on the screen:

  • Download Zip - Archive containing all files (cert, key, chain, pfx, der, jks, bundle)
  • Download Pfx - PFX/P12 format for Windows IIS and Exchange
  • Download Jks - Java KeyStore format for Java/Tomcat
  • Download Crt - Certificate file only (public key)
  • Download Chain - CA chain files
  • Download Bundle - Complete certificate chain (cert + intermediate + root)
  • Download Key - Private key only
Important Note

You will need the Pfx Password value you set to use downloaded certificates.

Access from Inventory List​

After certificate creation, you can also access and manage from the Inventory β†’ Certificate List page. You can view, filter, and perform various operations on your certificates in the list.

Next Steps​

After creating your certificates:

  1. Inventory Management - List and manage your certificates
  2. Managed Certificates - Automatic management and tracking
  3. TLS Alarm Configuration - Set up expiry alarms
Help and Support

For more information or support, review SecTrail CM documentation or contact the support team.