Gain complete visibility and control over your crypto-key environments. Prevent costly service downtime and impersonation attacks via end-to-end life cycle management of SSH keys and SSL/TLS certificates.
Features and benefits:
Discover all SSL certificates in the network, as well as which systems and users have SSH keys.
Consolidate all discovered certificates and keys in a secure, centralized repository.
Deploy newly acquired certificates to their respective domain servers. Associate new key pairs with users and deploy them on target systems.
Receive alerts about soon-to-expire certificates.
Rotate key pairs automatically at periodic intervals.
Launch direct SSH connections with target systems.
Enforce policies for key creation. Remove all existing keys for a fresh start or append new keys.
Get a holistic view of all deployed wildcard certificates.