Certificate Provisioning¶
Certificate provisioning is the process of requesting and generating new X.509 certificates through the Zaita platform. Provisioned certificates are issued by a configured certificate authority — either the platform's built-in Local PKI or an integrated external CA — and are tracked in the centralised certificate inventory alongside any discovered certificates.
What Is Certificate Provisioning?¶
When you provision a certificate through Zaita, the platform:
- Validates your request against registered domains and any applicable policies.
- Generates or receives a key pair and constructs a certificate signing request (CSR).
- Submits the CSR to the selected certificate authority.
- Stores the resulting certificate in the inventory with
source: managed.
Provisioned certificates are linked to the request that created them, which means they can be tracked for renewal, revoked through the platform, and monitored for upcoming expiry.
Prerequisites¶
Before requesting a certificate, you must have at least one active domain registered under Admin → Domains. A domain is active when it is both registered and enabled. The Common Name (CN) and all Subject Alternative Names (SANs) in a certificate request must match an active registered domain. Certificate requests for unregistered or disabled domains are rejected.
If no active domain exists, the Continue button on the Request New Certificate page is disabled and a message directs you to Admin → Domains to add or enable a domain before proceeding.
Individual users can also be restricted to specific domains. A user without permission for a domain cannot request certificates for it even if the domain is registered and active.
Certificate Providers¶
The platform supports multiple certificate providers. The available provider types are:
| Provider | Type | Description |
|---|---|---|
| Zaita Local PKI | builtin |
Issues certificates signed by an active Local PKI Intermediate Certificate. All cryptographic operations are handled by the Back Control Plane. |
| DigiCert CertCentral | digicert |
Issues certificates through the DigiCert CertCentral API. Requires an active DigiCert integration configured under Admin. |
| GlobalSign Atlas | globalsign |
Issues certificates through the GlobalSign Atlas API. Requires an active GlobalSign integration. |
| ACME | acme |
Issues certificates using the ACME protocol against any compatible ACME directory (Let's Encrypt, ZeroSSL, or a custom server). |
The Zaita Local PKI provider is always available once a Root and Intermediate certificate have been generated. External providers must be configured and set to active before they can be used in a certificate request.
Request Pathways¶
There are two ways to request a new certificate through the platform:
Automated Request¶
The automated request pathway guides you through a four-step wizard:
| Step | Content |
|---|---|
| Step 0 — Domain Names | Common Name (CN) and optional Subject Alternative Names (SANs) |
| Step 1 — Subject Information | Organisation, Organisational Unit, Country, State, Locality |
| Step 2 — Cryptographic Options | Certificate provider, algorithm, digest, validity period, key usage |
| Step 3 — Review and Submit | Summary of all selections before dispatch |
At Step 2, you select whether to use the Built-In Local PKI or an external provider. The platform generates the key pair on your behalf and submits the request to the chosen CA.
CSR Upload¶
The CSR upload pathway accepts a PEM-format Certificate Signing Request that you generate externally (for example, from an HSM or hardware key store). The platform parses the CSR, validates the domains and policies, and signs the certificate using an active Local PKI Intermediate Certificate.
Note: The CSR upload pathway only supports the Built-In (Local PKI) provider. Key generation occurs outside the platform; only the signing step is performed by the Back Control Plane.
Cryptographic Options¶
When using the automated pathway, you select the algorithm, digest, and validity period for the certificate.
Algorithms¶
| Value | Description |
|---|---|
rsa-2048 |
RSA 2048-bit |
rsa-3072 |
RSA 3072-bit |
rsa-4096 |
RSA 4096-bit |
ec-256 |
ECDSA P-256 |
ec-384 |
ECDSA P-384 |
ec-521 |
ECDSA P-521 |
Digest Algorithms¶
| Value | Description |
|---|---|
sha256 |
SHA-256 (default) |
sha384 |
SHA-384 |
sha512 |
SHA-512 |
Validity¶
Validity is specified in days, from 1 to 3650. Common values: 90 days (3 months), 365 days (1 year), 730 days (2 years).
Key Usage¶
| Value | Description |
|---|---|
digitalSignature |
Digital Signature |
nonRepudiation |
Non-Repudiation |
keyEncipherment |
Key Encipherment |
dataEncipherment |
Data Encipherment |
keyAgreement |
Key Agreement |
Default: digitalSignature, keyEncipherment.
Extended Key Usage¶
| Value | Description |
|---|---|
serverAuth |
TLS Web Server Authentication |
clientAuth |
TLS Web Client Authentication |
codeSigning |
Code Signing |
emailProtection |
E-mail Protection |
timeStamping |
Time Stamping |
Default: serverAuth.
Policy Enforcement¶
Policies are evaluated against the certificate request at each step of the wizard. If any applicable policy matches the CN or SANs, the platform applies policy rules before you can proceed:
- Enforced values — policy rules that set organisation, algorithm, digest, key usage, or validity period automatically populate the corresponding fields. Enforced fields are displayed as read-only with a lock icon.
- Hard-fail violations — policy rules that evaluate to hard-fail block the request. You cannot proceed until the violation is resolved. A
CertificateAlertof typepolicy_hard_failis created. - Soft-fail violations — policy rules that evaluate to soft-fail allow the request to proceed but record a warning. A
CertificateAlertof typepolicy_soft_failis created.
Policy evaluation runs on every step transition, so changing domain names or subject information will re-evaluate applicable policies.
Asynchronous Generation¶
Certificate generation is dispatched as a background job and processed asynchronously. After submission, you are redirected to the order's status page, which updates in real time. Once complete, the certificate is available in the inventory under CLM → Certificates.
Certificate Orders¶
Every certificate request — automated wizard, CSR upload, or requests submitted by Couriers and ACME clients — is tracked as an Order. To view all orders for your account, navigate to CLM → Certificates → Orders.
The Orders page provides:
- Status summary cards showing counts of pending, processing, complete, and failed orders
- Search and filter by common name, order type, or status
- A Requested By column that shows whether an order was submitted by a user, a Courier, or an ACME client
Order statuses follow this progression:
| Status | Description |
|---|---|
pending |
Request submitted, waiting to be picked up |
processing |
Certificate generation is actively in progress |
complete |
Certificate issued successfully and available in the inventory |
failed |
Certificate generation failed; error details are shown on the order detail page |
Completed orders link directly to the issued certificate for quick access. Failed orders display error details to assist with troubleshooting and re-submission.
Other Provisioning Pathways¶
The web UI wizard is the primary way to request certificates interactively. The platform also supports additional automated provisioning pathways:
- Target Systems — Certificate profiles attached to a Target System can trigger provisioning and renewal automatically, with certificates deployed to on-premises systems via a Bridge. Target System orders appear alongside user-initiated orders in the Orders view. See Target Systems.
- Couriers — Automated agents (Couriers) request certificates programmatically via the REST API. Courier-initiated orders follow the same domain validation and policy rules as the web UI, and are visible in the Orders view with the Courier name as the requester. See Couriers.
Next Steps¶
- Setting up Certificate Provisioning — configure providers and request your first certificate.
- Managing Provisioned Certificates — download, view, and revoke certificates.
- Best Practices for Certificate Provisioning — guidance on domains, providers, and policies.