See below for configuring and deploying Certificate Manager with the Management Console.

Repeat the following steps each time a configuration update is required. Do not forget to click Deploy to make the changes effective.

To configure and deploy Certificate Manager with the Management Console

  1. Open the following URL in a Web browser. 

    https://<machine>/management-console

    Where <machine> is the IP address or domain name of the machine hosting Cryptographic Security Platform.

  2. Log into the Management Console a user belonging to a role with Certificate Manager management permissions – for example, the initial admin administrator user. 

    See Starting up the Management Console for how to manage users and roles.

  3. In the content pane, click Manage Solution under Certificate Manager.


  4. Activate the Import configuration toggle switch if you want to import configuration settings from a file, such as a sample configuration file included in the product release.
  1. Click Next.
  2. Configure the solution settings described in the following sections. 
  3. CA Certificate(s)
  4. Click Validate to validate the configured settings. 
  5. Correct any detected configuration error until the Validate option displays no warnings.
  6. Optionally, click the Download button to export the current configuration. You can later import this configuration using the already mentioned Import configuration toggle switch.
  7. Click Submit and wait while Cryptographic Security Platform uploads the configuration and any attached file, such as a P12 file with authentication credentials.
  8. Click Deploy.

CM Hostname

The base hostname of the Kubernetes Ingress routing to the Certificate Hub application.

Mandatory: Yes.

Discovery Scanner version

The version of the Entrust Discover Scanner integrated with Certificate Manager.

Mandatory: No. Skip this field when Certificate Manager is not integrated with Discover Scanner.

Initial Administrator Username

The username of the initial Certificate Hub administrator.

Mandatory: Yes.

Initial Administrator Password

The username of the initial Certificate Hub administrator.

Mandatory: Yes.

Initial Administrator Email

The email address of the initial Certificate Hub administrator.

Mandatory: Yes.

Name of the PostgreSQL Database

The name of an external PostgreSQL database.

Mandatory: Yes.

Database User Name

The user name of the external PostgreSQL database.

Mandatory: Yes.

Database User Password

The user password of the external PostgreSQL database.

Do not include special characters such as "#", "!", or "*" in the user password.

Mandatory: Yes.

Host of the PostgreSQL database

The IP address or Fully Qualified Domain Name (FQDN) of the database host.

As explained in Database SSL certificate, the SSL certificate for the database host must include the IP address or FQDN of the host.

Mandatory: Yes.

External database port

The connection port with the external PostgreSQL database.

Mandatory: Yes.

SSLMode for the PostgreSQL external database

The SSL mode for connecting with the external PostgreSQL database. Supported values are:

  • require
  • verify-ca
  • verify-full

See https://www.postgresql.org/docs/current/libpq-ssl.html for a description of each mode.

Any of the supported  PostgreSQL modes requires enabling SSL.

Mandatory: Yes.

CA Certificate(s)

The CA certificate for validating the database SSL certificate. Click Select Files to import a file containing this certificate in PEM format and Base64 encoding.

As explained in Database SSL certificate, the SSL certificate for the database host must include the IP address or FQDN of the host.

Mandatory:  When the SSLMode for the PostgreSQL external database value is one of the following.

  • verify-ca
  • verify-full