Certificate distribution has always been the messy part. Custom scripts, shared drives, passwords in plaintext somewhere.

We shipped deployment scripting with a template library for F5, Palo Alto, Azure, Exchange, and more. Variables encrypted, never on disk.

https://www.certkit.io/blog/deployment-scripting

#CertificateManagement #PKI

Remote deployment scripting

CertKit now ships centrally managed deployment scripts that push certificates directly to appliances, cloud platforms, and custom infrastructure, with a template library and encrypted variable storage.

CertKit SSL Certificate Management

Todd's Tenth Rule: any sufficiently complicated SSL certificate script contains a bad implementation of half a certificate lifecycle manager.

Named the pattern. Here's how it happens.

https://www.certkit.io/blog/todds-tenth-rule-certificate-automation

#CertificateManagement #PKI

Todd's Tenth Rule of certificate automation

Any sufficiently complicated SSL certificate renewal system contains an ad hoc, informally-specified, bug-ridden, slow implementation of half a certificate lifecycle manager. I'm taking credit for this one.

CertKit SSL Certificate Management

New in CertKit: copy and link agent configs across your fleet instead of configuring each server individually. Also added search and grouping for monitored domains, plus our first GDPR Data Processing Agreement.

https://www.certkit.io/blog/shared-configs-and-monitor-search

#CertificateManagement #SSL

Shared agent configs, monitor search, and a GDPR policy

Copy and share agent configurations across your fleet, search and sort your monitored domains, and our first official Data Processing Agreement for GDPR compliance.

CertKit SSL Certificate Management

CertKit 1.9: push agent updates from the dashboard, no more logging into every server. Plus Google Trust Store as a second ACME issuer alongside Let's Encrypt.

https://www.certkit.io/blog/agent-1.9

#CertificateManagement #SSL

Remote Agent Updates and Google Trust Store

Agent 1.9 adds remote push updates so you can upgrade your entire fleet from the dashboard, plus first-class support for Google Trust Store as an ACME certificate issuer alongside Let's Encrypt.

CertKit SSL Certificate Management

CertKit is out of beta.

600 signups. Real production deployments. A Keystore for keeping private keys on-prem. RDP and RRAS support for Windows shops.

Now there's real pricing — and 40% off forever if you get in before May 31st.

https://www.certkit.io/blog/out-of-beta

#PKI #CertificateManagement

CertKit is out of beta

We launched the beta in July 2025. Over 600 users later, the beta is over. Here's what we built, what we learned, and a thank you to the early adopters who helped make it real.

CertKit SSL Certificate Management

CertKit Agent 1.8: Windows Certificate Store, Java Keystore, and RDP auto-detection.

We also shipped a retro MS-DOS confirmation dialog on April Fools Day. It is fully keyboard-compatible.

https://www.certkit.io/blog/agent-1.8 #CertificateManagement #PKI

Some organizations have a hard requirement: private keys cannot leave the network perimeter. Third-party cert management has always meant violating that policy.

The CertKit Local Keystore is the fix. Keys stay on your infrastructure. Full automation still works.

www.certkit.io/blog/certkit-keystore

#PKI #CertificateManagement

We found a valid DigiCert certificate on a domain we just purchased, issued to someone we've never met. Getting it revoked took 6 emails. 72 hours after confirmed revocation, every browser still trusts it.

https://www.certkit.io/blog/bygonessl-happened-to-us

#InfoSec #CertificateManagement

BygoneSSL happened to us

We wrote about BygoneSSL and the 1.5 million domains with certificates owned by someone else. Then we bought certkit.dev and found one on our own domain. A DigiCert certificate, still valid for 98 days, issued to whoever owned this domain before us. Here's what we found, what we tried to do about it, and what happened when we tried to revoke it.

CertKit SSL Certificate Management

You can automate issuance and still ship outages.

Certificate lifecycle is a loop:

issue → deploy → verify.

Most teams stop at “renewal succeeded” and skip the only part users care about, what the endpoint is actually serving.

https://www.certkit.io/blog/issuance-automation-vs-certificate-automation
#ACME #CertificateManagement

Issuance Automation vs Certificate Automation

Most teams “automate certificates” by installing an ACME client and calling it a day. Then they still ship an outage because the hard parts were never automated: knowing what exists, keeping validation safe, and verifying what’s actually being served.

CertKit SSL Certificate Management

Let's Encrypt is moving to 45-day certificates by February 2028, a year before the industry mandate. Everyone focuses on the certificate lifetime, but the real disruption is authorization reuse dropping from 30 days to 7 hours.

That means nearly every cert request requires fresh validation. Batch operations across a day? Broken. Hardcoded 60-day renewal intervals? Expired certificates.

https://www.certkit.io/blog/45-day-certificates

#PKI #CertificateManagement

Let's Encrypt is moving to 45-day certificates before everyone else

The CA/Browser Forum set 47-day certificates as the target for 2029. Let's Encrypt decided to implement it a year earlier. Here's their roadmap and what it means for your automation.

CertKit SSL Certificate Management