For the latest version, please use Certificate Lifecycle Manager 6.11.0!

Optimizing Certificate Issuance

The Challenge of Manual Provisioning

Traditional certificate provisioning is a fragmented, error-prone process. Administrators and application owners are frequently required to manually generate Certificate Signing Requests (CSRs) via command-line tools, navigate complex certificate authority (CA) web interfaces and manually download and distribute resulting key pairs. This lack of standardization introduces delays, misconfigurations and severe security risks, such as improperly stored private keys or unauthorized attribute requests.

Standardized Enrollment with MTG CLM

MTG CLM optimizes this pipeline by decoupling the request mechanism from the underlying cryptographic complexity. Through a guided, policy-driven workflow, users can request and provision certificates without needing direct access to the CA or deep knowledge of X.509 structures.

The system ensures that all requests are automatically validated against organizational constraints before the CA processes them, eliminating the risk of rogue issuance and reducing administrative overhead.

The Four-Step Issuance Workflow

Certificate issuance in MTG CLM is executed through a strictly sequenced workflow that guarantees data isolation, policy enforcement and identity validation.

  1. Select the Operational Realm Certificates are always issued within a specific realm. This enforces strict multi-tenancy and data isolation, ensuring that the resulting certificate, its metadata and its lifecycle events cannot be accessed or managed by users outside of the designated operational scope.

  2. Apply the Certificate Policy The user selects a pre-configured policy, which dictates the destination CA, the required cryptographic template (e.g., key size and algorithms) and any mandatory approval workflows (such as four-eyes authorization). The policy acts as the immutable rule set for the issuance.

  3. Bind the End Entity The user selects one or more end entities to bind to the certificate. MTG CLM validates that the attributes defined in the end entity mathematically comply with the strict constraints defined in the chosen policy. If a mismatch occurs, the issuance is automatically blocked.

  4. Define the Certificate Source

    The user determines how the cryptographic key pair is generated. MTG CLM supports two methods:

    • PKCS#10 Request: The user uploads an external CSR. MTG CLM extracts only the public key, explicitly discarding any unauthorized attributes embedded in the CSR file.

    • Server-Side Generation: MTG CLM securely generates the key pair internally, allowing users to download the completed certificate and private key together via PKCS#12 or PEM formats.

    Specify Cryptographic Parameters

    For Server-Side Generation:

    • Algorithm: Choose RSA, EC (Elliptic Curve), or EdDSA.

    • Key Parameters: Select appropriate key size or curve.

    • Validity Period: Suggest certificate lifetime (CA may override based on configuration).

Request Processing and Approval

After completing the wizard steps, MTG CLM creates a certificate request. Processing depends on your policy configuration:

Automatic Approval: Certificate issued immediately if policy allows.

Email Verification: End entity must verify email before issuance.

Manual Approval: Designated approvers review and approve the request.

Business Value Summary

Operational Risk MTG CLM Mechanism Business Outcome

Cross-departmental data leaks

Realm-Based Execution

Guarantees strict data segregation; an administrator in one business unit cannot issue or view certificates belonging to another.

CSR misconfigurations

Policy and End Entity Binding

Eliminates manual CSR errors by discarding unauthorized attributes and enforcing identity data mapped directly from the End Entity.

Insecure key generation

Centralized Server-Side Generation

Removes the need for end-users to manage local key generation tools (like OpenSSL), ensuring cryptographic strength and simplifying deployment.

Unauthorized issuance

Policy-Driven Approval Workflows

Ensures high-value assets automatically trigger manual review or multi-party authorization prior to CA fulfillment.

Troubleshooting

Policy Mismatch

Verify end entity attributes comply with policy requirements.

Validation Failures

Check that user information matches identity provider data.

CA Connection Issues

Ensure selected CA is operational and accessible.

Request Declined

Review policy requirements and resubmit with correct information.