About certificate and application validation

The CyberArk Trust Protection Foundation™ validation feature validates your encryption system certificates and applications to determine if the correct certificate is being used. It also determines if it is functional and if it is installed in the correct place on its associated platform or keystore.

Security, compliance, and technological innovation have introduced new criteria for the validation of certificates and the servers that host them.

Trust Protection Foundation offers certificate validation that is easy to use, provides more actionable results, helps assure compliance with industry standards, and supports best security practices.

  • You can configure validation and see results in Certificate Manager - Self-Hosted.
  • When you view validation results, you can clearly see every target that was scanned for the certificate.
  • Validation provides complete, qualitative analysis of the certificate chain presented by the hosting server.
  • Validation identifies the SSL or TLS protocols that the hosting server supports. CyberArk provides these communication protocols: SSL 2.0, SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3.
  • Different certificates that are hosted on the same IP address and port can be validated.

For more information about configuring application and certificate validation, see SSL/TLS network validation.