Discovering certificates and keys

The first step in managing your organization’s encryption environment is to determine which encryption assets are deployed where. There are several methods for discovering and provisioning certificates and keys, and for managing them once they are found.

You can use TLS Protect to create several job types you can use to automate tasks, such as certificate and key discovery, import, placement and provisioning. For example, you can create network discovery jobs to get a complete list of your network certificates and SSH keys.

DID YOU KNOW?   Items not already under management can be brought under management, or you can leave them in an unassigned policy. To learn more, see Unassigned certificates.

You can also import certificates from a specific certificate authority (CA). To learn more, see Importing certificates from a certificate authority.

TIP  To browse topics in this section, use the menu on the left side of this page.