GlobalSign Certificate Provider

× Magnified Image

This page describes the steps needed to connect your existing GlobalSign account (from GlobalSign Atlas portal) to MTG CLM. This will enable you to use the GlobalSign API for issuance and revocation of GlobalSign public certificates for TLS and S/MIME purposes.

Some certificate request modes, cryptographic algorithms and ERS component might not be compatible with GlobalSign certificate provider. For more details, see here 🔗

Create Access Credentials

Create API Credentials

  1. In your GlobalSign Atlas Dashboard navigate to Access Credentials → API Credentials using the sidebar.

  2. Select Generate an API Credential.

  3. Choose how you want to receive your credentials and click Continue.

  4. Select the GlobalSign service to be connected with the credentials and click Continue.

    This will also influence the type of services you can use with these credentials.
  5. According to your previous choice of services type you will be prompted to choose an Organization. Choose and click Continue.

  6. Name your credentials set and click Continue.

  7. Copy your credentials over to MTG CLM UI into their respective fields.

    To avoid losing the credentials set due to possible browser session timeouts in either platforms, downloading it as .csv file is advised.

Create mTLS Certificate

  1. In your GlobalSign Atlas Dashboard navigate to Access Credentials → mTLS Certificate using the sidebar.

  2. Select Generate an mTLS Certificate.

  3. Choose Directly via the API and click Continue.

  4. You must now connect the mTLS Certificate to the API Credential set you created before. Select it and click Continue.

  5. Paste a CSR to proceed. You may create it using MTG CLM or another tool of your choice (such as OpenSSL).

    Refer to the Create PKCS10 Request using MTG CLM subsection on how to create it using MTG CLM.
  6. A Success! message will be shown.

Create PKCS10 Request using MTG CLM

To complete this interim flow, open a second tab of your MTG CLM UI instance in your browser so you do not lose your current progress.
  1. Navigate to Certificate Requests and select Create PKCS10 Request.

  2. Fill in the PKCS10 Request Subject and hit Apply:

    • Common Name: Add the URL of your instance (without https or slashes).

    • Country: DE

    • Organization: Add your organization.

    • Domain Names: Add your domain names and click the Add button before proceeding.

  3. Choose RSA as Public Key Algorithm and 2048 as RSA Key Size. Hit Apply, to proceed.

    2048 is the only RSA Key Size GlobalSign accepts.
  4. Download both the PKCS10 request (needed for GlobalSign) and the private key (needed for MTG CLM). Make sure to also store the Password, which is also gonna be needed later.

  5. Confirm that your downloads are complete, fill the checkbox and hit Finish. You may now close this instance.

Combine Certificate and Private Key into PKCS12

Now that you have a certificate and you also have the private key that you got before from MTG CLM, you must combine them into a PKCS12 file so that you can use it within MTG CLM for the credential field.

  1. Copy the certificate you got during Step 6 of Create mTLS Certificate.

  2. In your file browser create a new text file with this content and give a descriptive name to it (e.g., certificate.crt).

  3. Cd to your files folder and using OpenSSL combine the PKCS8 file you got during Step 4 of Create PKCS10 Request using MTG CLM and certificate.crt. The command is as follows:

    $openssl pkcs12 -export \
    -in certificate.crt
    -inkey your-pkcs8.pem
    -out certificate-and-private-key.p12
  4. Once you run the above command you will be asked for the password protecting the private key (the one copied over from MTG CLM during Step 4 of Create PKCS10 Request using MTG CLM). You will also be asked to create a new password (or use the same one) for the .p12 file you are currently creating.

Create the GlobalSign Certificate Provider

To perform the steps below, admin rights are required.
  1. Log in to MTG CLM UI and navigate from the sidebar to Administration → Certificate Providers.

  2. Create a new certificate provider of Type: GlobalSign and give a descriptive name to it (e.g., GlobalSign SSL/TLS).

  3. The chosen Type: GlobalSign enables the following specific GlobalSign fields that must be filled out for the connection to be successful:

    • API URL: The GlobalSign API URL. This field comes already pre-filled.

    • Intended Use: The different types of certificates GlobalSign can issue.

    • API Key & API Secret: The API Key and Secret you created before, in Create API Credentials.

    • Keystore and Keystore Password: The Keystore and Keystore Password you created before, in Create mTLS Certificate and Combine Certificate and Private Key into PKCS12.

    • Proxy Host & Proxy Port: If your instance is behind an enterprise proxy you need to fill those accordingly.

If everything went according to plan you should be seeing a Connection Status: Good indicator in the next page like below:

DNS Validation

MTG CLM supports DNS TXT validation for GlobalSign certificates. This validation method requires creating DNS TXT records for your domain, in order to prove domain ownership. DNS TXT validation enables certificate issuance for wildcard domains and scenarios where HTTP-based validation cannot be performed.

Domain validation and other validations are performed outside the CLM platform. CLM serves solely to request the certificate. For a successful certificate request, the requirements regarding validation must be met.