About Applications
Table of Contents
Expand all | Collapse all
-
- Activate Next-Generation Trust Security
-
-
- Configure AWS connection
- Configure Azure Key Vault connection
-
- Workload Identity Federation authentication
- Workload Identity Federation - Azure Identity Provider authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Workload Identity Federation authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Supported OIDC claims
-
-
-
-
- Create an F5 BIG-IP LTM machine
- Create a Microsoft Azure Private Key Vault machine
- Create a Microsoft IIS machine
- Create a Microsoft Windows (PowerShell) machine
- Create a Microsoft SQL Server machine
- Create a Common KeyStore machine
- Create a Citrix ADC machine
- Create an Imperva WAF machine
- Create a VMware NSX Advanced Load Balancer (AVI) machine
- Create an A10 Thunder ADC machine
- Create a Cloudflare machine
- Create Kemp Virtual LoadMaster machine
- Create a Palo Alto Panorama machine
-
- Provision to an F5 BIG-IP LTM
- Provision to a Microsoft Azure Private Key Vault
- Provision to Microsoft IIS
- Provision to Microsoft Windows (PowerShell)
- Provision to Microsoft SQL Server
- Provision to a Common KeyStore
- Provision to a Citrix ADC
- Provision to an Imperva WAF
- Provision to VMware NSX Advanced Load Balancer (AVI)
- Provision to an A10 Thunder ADC
- Provision to Cloudflare
- Provision to a Kemp Virtual LoadMaster
- Provision to Palo Alto Panorama
-
-
- 47-Day Validity Readiness TLS Certificates dashboard
- About the Certificate Inventory
- Managing certificate lifecycle settings
- Reissuing certificates in Next-Gen Trust Security
- Downloading certificates, certificate chains, and keystores
- Retiring, recovering, and deleting certificates
- Finding certificates in the certificate inventory
- Importing certificates from a CA using EJBCA
- Notification Center overview
- Domain-based validation for external emails
- Managing user accounts
- Troubleshooting
About Applications
Applications allow you to group certificates based on rules you define. They also let you request certificates using shared application settings, which helps ensure consistency. When certificates are discovered, they can be automatically assigned to an application and then used for lifecycle operations such as renewals.
Access the Applications inventory by clicking Applications on the menu bar.
From the Applications inventory, you can view all defined applications and see which certificates and TLS server endpoints are associated with each application.
On the Applications inventory, you can do the following:
- Create a new application. Click New to define a new application. The new application wizard opens.
- Search for applications using the search field.
- Filter the applications list. Use Filters to narrow the list and display a subset of applications.
- Bulk actions. Use the checkboxes to select multiple applications and delete them in a single action.
- Application details. Click an application name to view or modify the application details.
- Quick actions. Use the context menu for an application to perform supported actions, such as requesting certificates using that application.
- View linked certificates. Click the link in the Certificates column to open the Certificates inventory with a pre-defined filter showing only certificates associated with that application.
- View TLS server endpoints. Click the link in the TLS Server Endpoints column to open the TLS Server Endpoints inventory with a pre-defined filter showing only endpoints associated with that application.
What's next?
If you don’t have any applications, start by creating a new one.
If you already have applications, you can edit an application or request new certificates using an existing application.