<h2>Run Certificate Discovery via individual URL scans</h2><br/><div style="overflow-x:auto"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head><meta content="text/html; charset=UTF-8" /><meta name="copyright" content="(C) Copyright 2024" /><meta name="DC.rights.owner" content="(C) Copyright 2024" /><meta name="generator" content="DITA-OT" /><meta name="DC.type" content="concept" /><meta name="DC.title" content="Visibility to TLS certificates" /><meta name="abstract" content="The Certificate Inventory and Management application allows Discovery to automatically scan for certificates on specific ports through your existing CI-based Discovery schedules. In addition, you can create Discovery schedules to scan for specific URLs." /><meta name="description" content="The Certificate Inventory and Management application allows Discovery to automatically scan for certificates on specific ports through your existing CI-based Discovery schedules. In addition, you can create Discovery schedules to scan for specific URLs." /><meta name="DC.creator" content="Sarah Iwamiya" /><meta name="DC.creator" content="Lisa Hultman" /><meta name="DC.creator" content="ServiceNow" /><meta name="DC.date.created" content="2023-08-03" /><meta name="DC.date.modified" content="2024-02-01" /><meta name="DC.format" content="XHTML" /><meta name="DC.identifier" content="run-cert-discovery" /><link rel="stylesheet" type="text/css" href="../../../CSS/commonltr.css" /><title>Visibility to TLS certificates</title></head><body> <div class="nested0" id="run-cert-discovery"> <h1 class="title topictitle1" id="ariaid-title1">Visibility to TLS certificates</h1> <div class="body conbody"><p class="shortdesc">The <span class="ph">Certificate Inventory and Management</span> application allows <span class="ph">Discovery</span> to automatically scan for certificates on specific ports through your existing CI-based Discovery schedules. In addition, you can create Discovery schedules to scan for specific URLs.</p> <p class="p"><span class="ph">The <span class="ph">ServiceNow Store</span> regularly releases new applications and updates to applications that are created by <span class="ph">ServiceNow</span>. If you already have the application, you can download the latest version to enhance your existing experience with our products. Since different features are available or enhanced each time an application is released in the Store, the content and features available in a particular release are indicated by version number in this document.</span></p> <p class="p">In Version 1.1.7 <span class="ph">Certificate Inventory and Management</span>, you can add a list of imported certificates and scan for certificates from your Certificate Authority (CA) such as GoDaddy and DigiCert. In Version 1.2.0, you can also scan Sectigo and Entrust CAs.</p> <div class="p">In Version 1.3.8 <span class="ph">Certificate Inventory and Management</span>, the application enhanced existing certificate authority patterns for DigiCert to collect the following fields as part of the CA Trust Certificate discovery. All of these fields are stored in the Certificate Extensions [sn_disco_certmgmt_certificate_extension] table.<ul class="ul" id="run-cert-discovery__ul_mhh_spv_mqb"><li class="li">Certificate Id</li><li class="li">Order id</li><li class="li">Thumbprint</li><li class="li">Serial Number</li><li class="li">Certificate Status</li></ul> </div> <p class="p">To Import Certificates or Discovery CA Trust with more than 1500 certificates, create the discovery schedule with more than one serverless patterns configured. Each pattern execution supports a maximum of 1500 certificates discovery.</p> <p class="p"><img class="image" id="run-cert-discovery__image_q3n_gxk_cmb" src="../image/multiple-serverless-executions.png" alt="execution pattern" /></p> <p class="p">To discover all the certificates, the limit (defaults to 1500) and start_offset (defaults to 0), must be configured accordingly. For example to fetch up to 6 K certificates, add four serverless patterns with start_offset 0, 1500, 3000, and 4500. Start_offset and limit parameters are configured as shown.</p> <p class="p"><img class="image" id="run-cert-discovery__image_a2w_kxk_cmb" src="../image/execution-patterns-config.png" alt="pattern config" /></p> </div> <div class="topic task nested1" id="run-cert-inventory-mgmt-ports"> <h2 class="title topictitle2" id="ariaid-title2">Run Certificate Discovery via port scans</h2> <div class="body taskbody"><p class="shortdesc">When the TLS port probe [tls_ssl_certs] is enabled, <span class="ph">Discovery</span> automatically scans 14 preauthorized ports through your existing CI <span class="ph">Discovery</span> schedules.</p> <div class="section prereq p">Role required: admin or discovery_admin. </div> <ol class="ol steps"><li class="li step stepexpand"> <span class="ph cmd">Activate the TLS port probe [tls_ssl_certs].</span> <ol type="a" class="ol substeps"><li class="li substep substepexpand"> <span class="ph cmd">Navigate to <span class="ph menucascade"><span class="ph uicontrol">Discovery Definition</span> > <span class="ph uicontrol">Port Probes</span></span>.</span> </li><li class="li substep substepexpand"> <span class="ph cmd">Open <span class="ph uicontrol">tls_ssl_certs</span>.</span> </li><li class="li substep substepexpand"> <span class="ph cmd">Click the <span class="ph uicontrol">Active</span> checkbox to enable the probe and then save your changes.</span> <div class="itemgroup info">This box will be unchecked by default for any new installation.</div> </li></ol> </li><li class="li step stepexpand"> <span class="ph cmd">Add IP service to help configure the TLS port probe.</span> <ol type="a" class="ol substeps" id="run-cert-inventory-mgmt-ports__substeps_zjf_mpt_kjb"><li class="li substep"> <span class="ph cmd">Navigate to <span class="ph menucascade"><span class="ph uicontrol">Discovery Definition</span> > <span class="ph uicontrol">IP services</span></span>.</span> </li><li class="li substep"> <span class="ph cmd">Create a new IP service with a port.</span> </li></ol> </li><li class="li step stepexpand"> <span class="ph cmd">Configure the TLS port probe.</span> <div class="itemgroup info">You can add additional ports, up to a total of 138, or remove any existing ports by editing the Port Probe definition.</div> <ol type="a" class="ol substeps" id="run-cert-inventory-mgmt-ports__substeps_u54_xpt_kjb"><li class="li substep"> <span class="ph cmd">Navigate to <span class="ph menucascade"><span class="ph uicontrol">Discovery Definition</span> > <span class="ph uicontrol">Port Probes</span></span>.</span> </li><li class="li substep"> <span class="ph cmd">Open <span class="ph uicontrol">tls_ssl_certs</span>.</span> </li><li class="li substep"> <span class="ph cmd">Click the <span class="ph uicontrol">lock icon</span> next to <span class="ph uicontrol">Triggered by services</span> to unlock this field.</span> </li><li class="li substep"> <span class="ph cmd">Delete any ports on the list or add more from the search area and then save your changes.</span> </li></ol> </li></ol> <div class="section result" id="run-cert-inventory-mgmt-ports__result_nyl_qqt_kjb">Your existing <span class="ph">Discovery</span> schedules should then automatically scan for any certificates on the specified ports. You can monitor the results on the <a class="xref" href="cert-mgmt-dashboard.html" title="The Certificate Inventory and Management application provides a Certificate Management dashboard which displays a summary of all your Certificates and Certificate tasks.">Certificate Management Dashboard</a>.</div> </div> </div> <div class="topic task nested1" id="run-cert-inventory-mgmt-urls"> <h2 class="title topictitle2" id="ariaid-title3">Run Certificate Discovery via individual URL scans</h2> <div class="body taskbody"><p class="shortdesc">To discover certificates from URL scans, you need to manually add individual URLs and then set up a new certificate <span class="ph">Discovery</span> schedule.</p> <div class="section prereq p">Role required: admin or discovery_admin<div class="note"><span class="notetitle">Note:</span> Only the certificates that are available on the server during URL scans can be discovered. To verify what certificates are available, use the <span class="keyword cmdname">openssl s_client -showcerts -connect <URL>:<PORT> </dev/null</span> command.</div> </div> <ol class="ol steps"><li class="li step stepexpand"> <span class="ph cmd">Navigate to <span class="ph menucascade"><span class="ph uicontrol">All</span> > <span class="ph uicontrol">Certificate Management</span> > <span class="ph uicontrol">Certificate Discovery Source URLS</span></span>.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Click <span class="ph uicontrol">New</span> to add individual URLs to the table.</span> <div class="itemgroup info">Make sure to enter URLs in this format to ensure accurate results. The port is by choice and defaults are used if the port is not provided: scheme://host:port<p class="p">For example: https://www.servicenow.com or https://servicenow.com:443, ldaps://myldap.com or ldaps://myldap.com:636.</p> </div> </li><li class="li step stepexpand"> <span class="ph cmd">Create a <span class="ph">Discovery</span> schedule with the following fields.</span> <div class="itemgroup info">See <a class="xref" href="../../../Chunk1984444959.html" title="A Discovery schedule determines what horizontal Discovery searches for, when it runs, and which MID Servers are used. Create a Discovery schedule for your local environment or a schedule for discovering the resources in your cloud service account.">Schedule a horizontal discovery</a> for more information on setting up your <span class="ph">Discovery</span> schedules.</div> <ol type="a" class="ol substeps" id="run-cert-inventory-mgmt-urls__substeps_f4w_gtt_kjb"><li class="li substep"> <span class="ph cmd">Select <span class="ph uicontrol">Discovery</span>: <span class="ph uicontrol">Certificates</span></span> </li><li class="li substep"> <span class="ph cmd">Select <span class="ph uicontrol">Certificate Discovery Type</span>: <span class="ph uicontrol">URL Certificate Discovery</span>.</span> </li><li class="li substep"> <span class="ph cmd">Leave the batch size as it is, unless recommended to change.</span> </li></ol> </li><li class="li step stepexpand"> <span class="ph cmd">From the <span class="ph uicontrol">Certificate URLs</span> tab, click <span class="ph uicontrol">Edit</span> to add or delete other URLs and then click <span class="ph uicontrol">Submit</span>.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Click the checkbox to include URLs from HTTP(s) Endpoint [cmdb_ci_endpoint_http] table in the discovery.</span> </li></ol> <div class="section result" id="run-cert-inventory-mgmt-urls__result_nyl_qqt_kjb"> <p class="p">When your <span class="ph">Discovery</span> schedule runs, it automatically scans for any certificates on the specified URLs and fetches all URLs from the cmdb_ci_endpoint_http table. It then creates a mapping between the URL and the schedule in the <span class="keyword parmname">sn_disco_certmgmt_cert_url_sched_m2m</span>.</p> <p class="p">With <span class="ph">Service Mapping</span> enabled, by default, it creates a relationship between the HTTP endpoint and application when it creates an entry in cmdb_ci_endpoint_http. For example, the Amazon application is automatically connected to amazon.com.</p> <p class="p">The relationship is: cmdb_ci_endpoint_http[parent] --> [Implement End Point To::Implement End Point From] --> cmdb_ci_appl[child].</p> <p class="p">If the above relationship exists, the URL certificate discovery creates an additional relationship between the certificate and application. This relationship is: cmdb_ci_appl[parent] --> [Uses::Used by] --> cmdb_ci_certificate[child].</p> <div class="note"><span class="notetitle">Note:</span> URL discovery schedules do not create server CIs.</div> </div> </div> </div> <div class="topic task nested1" id="run-cert-inventory-mgmt-bulk-url"> <h2 class="title topictitle2" id="ariaid-title4">Use bulk certificate upload</h2> <div class="body taskbody"><p class="shortdesc">Starting in version 1.2.0 of <span class="ph">Certificate Inventory and Management</span>, you can bulk import SSL certificates to save time and resources. You can upload a maximum of 5000 certificates in one .xlsx file.</p> <div class="section prereq p">Role required: Default admin is both pki_user and pki_admin. The users with following roles will be able to access bulk certificate upload:<ul class="ul" id="run-cert-inventory-mgmt-bulk-url__ul_rw2_qn5_ylb"><li class="li">sn_disco_certmgmt.pki_user</li><li class="li">sn_disco_certmgmt.pki_admin</li></ul> </div> <ol class="ol steps"><li class="li step stepexpand"> <span class="ph cmd">Navigate to <span class="ph menucascade"><span class="ph uicontrol">All</span> > <span class="ph uicontrol">Certificate Management</span> > <span class="ph uicontrol">Bulk Upload Certificates</span></span>.</span> </li><li class="li step stepexpand"> <span class="ph cmd">From the Bulk Upload page, Click <span class="ph uicontrol">Download Template File</span> (.xlsx) link to download the sample_cmdb_ci_certificate.xlsx file.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Open the downloaded sample_cmdb_ci_certificate.xlsx.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Use the values in the columns as samples and add the SSL certificate’s property to the appropriate columns.</span> <div class="itemgroup info">Each row in the Excel sheet is a CI certificate. The following required columns must be entered:<ul class="ul" id="run-cert-inventory-mgmt-bulk-url__ul_vmd_gdp_wlb"><li class="li">root_issuer</li><li class="li">issuer</li><li class="li">subject_common_name</li><li class="li">issuer_common_name</li><li class="li">fingerprint</li><li class="li">issuer_distinguished_name</li><li class="li">subject_distinguished_name</li><li class="li">fingerprint_algorithm</li><li class="li">valid_to: Cannot be less than valid_fom. By milliseconds. For example, 1586789478000 represents 13 April 2020 14:51:18</li><li class="li">valid_from: By milliseconds. For example, 1586789478000 represents 13 April 2020 14:51:18</li><li class="li">signature_algorithm</li><li class="li">key_size</li><li class="li">state: issued, installed, revoked, retired, or other</li></ul> <div class="note"><span class="notetitle">Note:</span> For maintaining the certificate’s chain relationship, every certificate should have the fingerprint of its root certificate in <span class="keyword parmname">root_issuer</span> column, and fingerprint of its issuer in the <span class="keyword parmname">issuer</span> column. For self-signed certificates, the <span class="keyword parmname">root_issuer</span> and <span class="keyword parmname">issuer</span> and should have the value of the certificates fingerprint.</div> </div> </li><li class="li step stepexpand"> <span class="ph cmd">Save your .xlsx file.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Navigate to <span class="ph uicontrol">Certificate Management</span> > <span class="ph uicontrol">Bulk Upload Certificates</span>.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Click <span class="ph uicontrol">Browse File</span> and select the completed .xlsx file.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Click <span class="ph uicontrol">Upload</span>.</span> </li></ol> <div class="section result" id="run-cert-inventory-mgmt-bulk-url__result_edh_12p_wlb"> <div class="note"><span class="notetitle">Note:</span> <p class="p">If any errors occur while uploading, a warning message and link to the error logs appears. Only users with the admin role can view these logs. Errors can occur when a mandatory field is left empty or a valid_from epoch value is greater than that of valid_to.</p> </div> After the file is successfully uploaded, you can see a success message displayed with a <span class="keyword parmname">View All</span> redirect link. You can view a list of the certificates that were added to the Unique Certificate [cmdb_ci_certificate] table.</div> </div> </div> <div class="topic task nested1" id="run-cert-inventory-mgmt-import"> <h2 class="title topictitle2" id="ariaid-title5">Run Certificate Discovery via certificate file import</h2> <div class="body taskbody"><p class="shortdesc">In Version 1.1.7 <span class="ph">Certificate Inventory and Management</span>, you can discover certificates from certificate files by importing the files into the system using pattern-based Discovery. Make sure TLS_keepOriginalCertificate is set to False.</p> <div class="section prereq p">Role required: admin or discovery_admin<div class="note"><span class="notetitle">Note:</span> The certificate must be in one of the following formats: <ul class="ul" id="run-cert-inventory-mgmt-import__ul_pfz_rps_hkb"><li class="li">.cert</li><li class="li">.pem</li><li class="li">.txt</li><li class="li">.der</li></ul> </div> </div> <div class="section context" id="run-cert-inventory-mgmt-import__context_otl_knk_nrb"> <div class="p">The Import certificates are discovered using the pattern Import SSL Certificate, which uses the following:<ul class="ul" id="run-cert-inventory-mgmt-import__ul_bxv_mnk_nrb"><li class="li">Server: Host name or IP address on which the certificates are hosted. If certificates are being imported from the <span class="ph">MID Server</span>, you can specify localhost as the server input parameter and can leave “temp_certificate_folder” empty.</li><li class="li">server_certificate_folder: Folder path on the server in which certificates are present.</li><li class="li">TLS_keepOriginalCertificate parameter: If the TLS_keepOriginalCertificate parameter is set to true, it increases the payload size which can cause out-of-memory issues. This should be set to false.</li><li class="li">temp_certificate_folder: The folder on the <span class="ph">MID Server</span> where the files will be copied temporarily.</li></ul> </div> </div> <ol class="ol steps"><li class="li step stepexpand"> <span class="ph cmd">Create a <span class="ph">Discovery</span> schedule with the following fields.</span> <div class="itemgroup info">See <a class="xref" href="../../../Chunk1984444959.html" title="A Discovery schedule determines what horizontal Discovery searches for, when it runs, and which MID Servers are used. Create a Discovery schedule for your local environment or a schedule for discovering the resources in your cloud service account.">Schedule a horizontal discovery</a> for more information on setting up your <span class="ph">Discovery</span> schedules.</div> <ol type="a" class="ol substeps" id="run-cert-inventory-mgmt-import__substeps_f4w_gtt_kjb"><li class="li substep"> <span class="ph cmd">Select <span class="ph uicontrol">Discovery</span>: <span class="ph uicontrol">Import Certificates</span></span> </li><li class="li substep"> <span class="ph cmd">Select <span class="ph uicontrol">Certificate Discovery Type</span>: <span class="ph uicontrol">Import Certificates</span>.</span> </li><li class="li substep"> <span class="ph cmd">Select <span class="ph uicontrol">MID Server selection method</span>: <span class="ph uicontrol">Specific MID Server</span>.</span> </li><li class="li substep"> <span class="ph cmd">Select <span class="ph uicontrol">MID Server</span>: Choose the desired MID Server.</span> </li><li class="li substep"> <span class="ph cmd">Add the Credentials for the <span class="ph">Windows</span> or <span class="ph">Linux</span> host machine where certificates are present.</span> </li><li class="li substep"> <span class="ph cmd">Fill out the necessary fields and then <span class="ph uicontrol">Save</span>.</span> </li></ol> </li><li class="li step stepexpand"> <span class="ph cmd">From the <span class="ph uicontrol">Serverless Execution pattern</span> tab, click <span class="ph uicontrol">New</span> to add the <span class="ph uicontrol">Import SSL Certificate</span> pattern and then click <span class="ph uicontrol">Submit</span>.</span> </li></ol> <div class="section result" id="run-cert-inventory-mgmt-import__result_a5s_cqs_hkb">When your <span class="ph">Discovery</span> schedule runs, it then automatically scans your files. You can monitor the results on the <a class="xref" href="cert-mgmt-dashboard.html" title="The Certificate Inventory and Management application provides a Certificate Management dashboard which displays a summary of all your Certificates and Certificate tasks.">Certificate Management Dashboard</a>.</div> </div> </div> <div class="topic concept nested1" id="maintain-cert-chain-relationships"> <h2 class="title topictitle2" id="ariaid-title6">Maintain certificate chain relationships via certificate import</h2> <div class="body conbody"><p class="shortdesc">To maintain the certificate chain relationships, the industry standard .txt extension is used. Certificate chain relationships are not maintained with any other file extensions. The expected order of certificates in a .txt certificate chain file is: Server certificate, Intermediate certificate, and Root certificate.</p> <div class="p">Use cases:<ul class="ul" id="maintain-cert-chain-relationships__ul_f4y_tnn_3kb"><li class="li">If two or more certificates are found in formats like .cert or .pem, only the first certificate is considered. The other certificates are not processed and no certificate chain relationships are maintained.</li><li class="li">If there is a .txt extension containing only one certificate, it is considered as a server certificate and no certificate relationship are maintained.</li><li class="li">If there is a .txt extension, containing two certificates, the first certificate is considered as server certificate and the second certificate is considered as root certificate, with no intermediate certificates.</li></ul> <div class="note"><span class="notetitle">Note:</span> The certificate chain relationship is updated based on the last URL/IP Discovery run. For example, any File import without certificate chain relations will break any existing chain relationships for the same certificate(fingerprint).</div> </div> </div> </div> <div class="topic task nested1" id="configure-credential-id-cert-mgmtl-"> <h2 class="title topictitle2" id="ariaid-title7">Configure Credential Identifier for Certificate Management credential type</h2> <div class="body taskbody"><p class="shortdesc">There is external storage credential support for discovery of TLS certificates from CA types including GoDaddy, DigiCert, and Sectigo. To use this, you need to configure the credential identifier in the instance for the particular Certificate Management credential type.</p> <div class="section prereq p">Role required: admin</div> <ol class="ol steps"><li class="li step stepexpand"> <span class="ph cmd">Navigate to <span class="ph menucascade"><span class="ph uicontrol">All</span> > <span class="ph uicontrol">Discovery</span> > <span class="ph uicontrol">Credentials</span></span>.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Click <span class="ph uicontrol">New</span>.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Select a credential type as <span class="ph uicontrol">Certificate Management Credential</span>.</span> </li><li class="li step stepexpand"> <span class="ph cmd">In the Credential form, select <span class="ph uicontrol">External Credential Store</span> check box.</span> </li><li class="li step stepexpand"> <span class="ph cmd">Fill in the <span class="ph uicontrol">Credential Alias</span> and <span class="ph uicontrol">Credential ID</span> fields.</span> <div class="itemgroup info">Credential ID and Arg_ID from Credential Resolver file should be same. </div> </li><li class="li step stepexpand"> <span class="ph cmd">Click <span class="ph uicontrol">Submit</span>.</span> </li></ol> </div> </div> <div class="topic task nested1" id="run-cert-inventory-mgmt-ca-query"> <h2 class="title topictitle2" id="ariaid-title8">Run Certificate Discovery via Certificate Authority query</h2> <div class="body taskbody"><p class="shortdesc"><span class="ph">Certificate Inventory and Management</span> can discover provisioned TLS certificates from Certificate Authorities (CA). Patterns are available for various certificate authority vendors.</p> <div class="section prereq p">Role required: pki_admin or discovery_admin<p class="p">During Discovery, the CA pattern uses the following API elements. The user that was added to the credentials in the instance must have permissions to send these queries.</p> <table cellpadding="4" cellspacing="0" summary="" id="run-cert-inventory-mgmt-ca-query__simpletable_qw5_ggv_ylb" border="1" class="simpletable"><col style="width:50%" /><col style="width:50%" /><thead><tr class="sthead"><th style="vertical-align:bottom;text-align:left;" id="d105001e1167" class="stentry">CA</th><th style="vertical-align:bottom;text-align:left;" id="d105001e1170" class="stentry">API element</th></tr></thead><tbody><tr class="strow"><td style="vertical-align:top;" headers="d105001e1167" class="stentry">GoDaddy</td><td style="vertical-align:top;" headers="d105001e1170" class="stentry"> <ul class="ul" id="run-cert-inventory-mgmt-ca-query__ul_egn_pgv_ylb"><li class="li">* /v1/certificates</li><li class="li">* /v1/certificates/{certificate_id}/download</li></ul> </td></tr><tr class="strow"><td style="vertical-align:top;" headers="d105001e1167" class="stentry">DigiCert</td><td style="vertical-align:top;" headers="d105001e1170" class="stentry"> <ul class="ul" id="run-cert-inventory-mgmt-ca-query__ul_g12_tgv_ylb"><li class="li">* /services/v2/order/certificate</li><li class="li">* /services/v2/certificate/{certificate_id}/chain</li></ul> </td></tr><tr class="strow"><td style="vertical-align:top;" headers="d105001e1167" class="stentry">Entrust</td><td style="vertical-align:top;" headers="d105001e1170" class="stentry"> <ul class="ul" id="run-cert-inventory-mgmt-ca-query__ul_pqm_wgv_ylb"><li class="li">* / v2/certificates</li><li class="li">* / v2/certificates/{certificate_id}</li></ul> </td></tr><tr class="strow"><td style="vertical-align:top;" headers="d105001e1167" class="stentry">Sectigo</td><td style="vertical-align:top;" headers="d105001e1170" class="stentry"> <ul class="ul" id="run-cert-inventory-mgmt-ca-query__ul_h1w_ygv_ylb"><li class="li">* /cert-manager/api/ssl/v1</li><li class="li">* /cert-manager/api/ssl/v1/collect/{certificate_id}/pem</li></ul> </td></tr></tbody></table> <div class="p">The patterns available with <span class="ph">Certificate Inventory and Management</span> Version 1.1.7 are:<ul class="ul" id="run-cert-inventory-mgmt-ca-query__ul_sgq_42l_vlb"><li class="li">GoDaddy</li><li class="li">DigitCert</li></ul> </div> <div class="p">The patterns available with <span class="ph">Certificate Inventory and Management</span> Version 1.2.0 are: <ul class="ul" id="run-cert-inventory-mgmt-ca-query__ul_cqf_52l_vlb"><li class="li">Entrust</li><li class="li">Sectigo</li></ul> </div> </div> <ol class="ol steps"><li class="li step stepexpand"> <span class="ph cmd">Create a credential alias if desired.</span> <div class="itemgroup info">See <a class="xref" href="../product/credentials/concept/discovery-credential-alias.dita/discovery-credential-alias.html" target="_blank" rel="noopener noreferrer">Credential aliases for Discovery</a>.</div> <div class="itemgroup stepresult">Create a new credential alias for new credentials. If multiple credentials have the same credential alias, during <span class="ph">Discovery</span> it first takes the Credential then starts <span class="ph">Discovery</span>. </div> </li><li class="li step stepexpand"> <span class="ph cmd">Create a new credential type for the CA.</span> <ol type="a" class="ol substeps" id="run-cert-inventory-mgmt-ca-query__substeps_apn_brs_hkb"><li class="li substep substepexpand"> <span class="ph cmd">Navigate to <span class="ph menucascade"><span class="ph uicontrol">Discovery</span> > <span class="ph uicontrol">Credentials</span></span> then click <span class="ph uicontrol">New</span>.</span> </li><li class="li substep substepexpand"> <span class="ph cmd">Select <span class="ph uicontrol">Certificate Management Credentials</span>.</span> </li><li class="li substep substepexpand"> <span class="ph cmd">Click the <span class="ph uicontrol">lock icon</span> to unlock the <span class="ph uicontrol">Credential alias list</span>.</span> <div class="itemgroup stepresult">The alias is then mapped to the credential.</div> </li><li class="li substep substepexpand"> <span class="ph cmd">Select <span class="ph uicontrol">Specify Type</span>: <span class="ph uicontrol">Credential</span>.</span> </li><li class="li substep substepexpand"> <span class="ph cmd">Select <span class="ph uicontrol">CA Type</span>.</span> <div class="itemgroup info">The available types are: GoDaddy, Digicert, Entrust, or Sectigo.</div> </li><li class="li substep substepexpand"> <span class="ph cmd">Fill in the fields that are specific to the CA type you selected.</span> <div class="itemgroup info"> <p class="p">Each CA has different form fields. See the: <a class="xref" href="../product/credentials/reference/API-key-credential-form.dita/API-key-credential-form.html" target="_blank" rel="noopener noreferrer">API Key credentials</a> for more information. See the below examples of each CA form.</p> <div class="fig fignone" id="run-cert-inventory-mgmt-ca-query__fig_ttw_zpm_1mb"><span class="figcap"><span class="fig--title-label">Figure 1. </span>GoDaddy form</span> <img class="image" id="run-cert-inventory-mgmt-ca-query__image_utw_zpm_1mb" src="../image/goDaddy.png" alt="godaddy" /> </div> <div class="fig fignone" id="run-cert-inventory-mgmt-ca-query__fig_op2_gqm_1mb"><span class="figcap"><span class="fig--title-label">Figure 2. </span>DigiCert form</span> <img class="image" id="run-cert-inventory-mgmt-ca-query__image_pp2_gqm_1mb" src="../image/Digicert.png" alt="digicert" /> </div> <div class="fig fignone" id="run-cert-inventory-mgmt-ca-query__fig_rhb_4qm_1mb"><span class="figcap"><span class="fig--title-label">Figure 3. </span>Entrust form</span> <img class="image" id="run-cert-inventory-mgmt-ca-query__image_shb_4qm_1mb" src="../image/Entrust.png" alt="entrust" /> </div> <div class="fig fignone" id="run-cert-inventory-mgmt-ca-query__fig_hty_qqm_1mb"><span class="figcap"><span class="fig--title-label">Figure 4. </span>Sectigo form</span> <img class="image" id="run-cert-inventory-mgmt-ca-query__image_ity_qqm_1mb" src="../image/Sectigo.png" alt="sectigo" /> </div> </div> </li></ol> </li><li class="li step stepexpand"> <span class="ph cmd">Create a <span class="ph">Discovery</span> schedule with the following fields.</span> <div class="itemgroup info">See <a class="xref" href="../../../Chunk1984444959.html" title="A Discovery schedule determines what horizontal Discovery searches for, when it runs, and which MID Servers are used. Create a Discovery schedule for your local environment or a schedule for discovering the resources in your cloud service account.">Schedule a horizontal discovery</a> for more information on setting up your <span class="ph">Discovery</span> schedules.</div> <ol type="a" class="ol substeps" id="run-cert-inventory-mgmt-ca-query__substeps_yqs_gss_hkb"><li class="li substep"> <span class="ph cmd">Select <span class="ph uicontrol">Discovery</span>: <span class="ph uicontrol">Certificates</span></span> </li><li class="li substep"> <span class="ph cmd">Select <span class="ph uicontrol">Certificate Discovery Type</span>: <span class="ph uicontrol">CA Trust Discovery</span>.</span> </li><li class="li substep"> <span class="ph cmd">Select <span class="ph uicontrol">MID Server selection method</span>: <span class="ph uicontrol">Auto Select</span> or <span class="ph uicontrol">Specific MID Server</span>.</span> </li><li class="li substep"> <span class="ph cmd">Fill out any other necessary fields and then <span class="ph uicontrol">Save</span>.</span> </li></ol> </li><li class="li step stepexpand"> <span class="ph cmd">From the <span class="ph uicontrol">Serverless Execution pattern</span> tab, click <span class="ph uicontrol">New</span> to add CA pattern you need for example, <span class="ph uicontrol">Entrust</span> pattern and then click <span class="ph uicontrol">Submit</span>.</span> <div class="itemgroup stepresult">If you check the <span class="ph uicontrol">Include cert status</span>, you can add multiple certificate status by separating them with commas.</div> </li></ol> <div class="section result" id="run-cert-inventory-mgmt-ca-query__result_ymz_qss_hkb">When your <span class="ph">Discovery</span> schedule runs, it automatically scans your files. You can monitor the results on the <a class="xref" href="cert-mgmt-dashboard.html" title="The Certificate Inventory and Management application provides a Certificate Management dashboard which displays a summary of all your Certificates and Certificate tasks.">Certificate Management Dashboard</a>.</div> </div> </div> <div class="topic task nested1" id="customize-cert-inventory-mgmt"> <h2 class="title topictitle2" id="ariaid-title9">Customize <span class="ph">Certificate Inventory and Management</span></h2> <div class="body taskbody"><p class="shortdesc">Discovery properties allow you to customize some of the aspects of <span class="ph">Certificate Inventory and Management</span>.</p> <div class="section prereq p">Role required: admin or discovery_admin.</div> <div class="li step p"> <span class="ph cmd">Navigate to <span class="ph menucascade"><span class="ph uicontrol">All</span> > <span class="ph uicontrol">Discovery Definition</span> > <span class="ph uicontrol">Properties</span></span> to edit these <a class="xref" href="../reference/r_DiscoveryProperties.html" title="Discovery properties allow you to control several aspects of the horizontal discovery process.">Discovery properties</a>:</span> <div class="itemgroup info"> <ul class="ul" id="customize-cert-inventory-mgmt__ul_qx5_hy4_sjb"><li class="li">glide.discovery.certs.cert_admin_user_id</li><li class="li">glide.discovery.certs.days_before_expiration_to_create_renewal_task</li><li class="li">glide.discovery.certs.enable_incident_creation_for_expired_certificates</li><li class="li">glide.discovery.certs.enable_renewal_task_creation_for_discovered_certificates</li><li class="li">glide.discovery.certs.slack_channel_id</li></ul> <div class="fig imagemap" id="customize-cert-inventory-mgmt__imagemap_xb4_52b_5jb"><img border="0" class="image" id="customize-cert-inventory-mgmt__image_yb4_52b_5jb" src="../image/ReferenceLink.png" alt="Certificate Discovery reference information link " /> <map id="d105001e1661"> </map></div> </div> </div> </div> </div> </div> </body></html></div>