Finding certificates in the certificate inventory
Table of Contents
Expand all | Collapse all
-
- Activate Next-Generation Trust Security
-
-
- Configure AWS connection
- Configure Azure Key Vault connection
-
- Workload Identity Federation authentication
- Workload Identity Federation - Azure Identity Provider authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Workload Identity Federation authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Supported OIDC claims
-
-
-
-
- Create an F5 BIG-IP LTM machine
- Create a Microsoft Azure Private Key Vault machine
- Create a Microsoft IIS machine
- Create a Microsoft Windows (PowerShell) machine
- Create a Microsoft SQL Server machine
- Create a Common KeyStore machine
- Create a Citrix ADC machine
- Create an Imperva WAF machine
- Create a VMware NSX Advanced Load Balancer (AVI) machine
- Create an A10 Thunder ADC machine
- Create a Cloudflare machine
- Create Kemp Virtual LoadMaster machine
- Create a Palo Alto Panorama machine
-
- Provision to an F5 BIG-IP LTM
- Provision to a Microsoft Azure Private Key Vault
- Provision to Microsoft IIS
- Provision to Microsoft Windows (PowerShell)
- Provision to Microsoft SQL Server
- Provision to a Common KeyStore
- Provision to a Citrix ADC
- Provision to an Imperva WAF
- Provision to VMware NSX Advanced Load Balancer (AVI)
- Provision to an A10 Thunder ADC
- Provision to Cloudflare
- Provision to a Kemp Virtual LoadMaster
- Provision to Palo Alto Panorama
-
-
- 47-Day Validity Readiness TLS Certificates dashboard
- About the Certificate Inventory
- Managing certificate lifecycle settings
- Reissuing certificates in Next-Gen Trust Security
- Downloading certificates, certificate chains, and keystores
- Retiring, recovering, and deleting certificates
- Finding certificates in the certificate inventory
- Importing certificates from a CA using EJBCA
- Notification Center overview
- Domain-based validation for external emails
- Managing user accounts
- Troubleshooting
Finding certificates in the certificate inventory
As your environment grows, the certificate inventory can contain thousands of certificates. To help you locate specific certificates, Next-Gen Trust Security provides search, filtering, and summary tools.
Open the certificate inventory by going to Inventory > Certificates. At the top of the page, you can access the Summary View dashboard. You can also use search, predefined filters, or custom filters to find certificates.
Using the Summary View dashboard
The Summary View dashboard provides an overview of certificate metrics based on your access level. All users can view the dashboard, but the data displayed is limited by role-based access controls (RBAC).
Administrators see metrics across the full inventory, while other users see only certificates they are permitted to access.
Select any of the following tiles to filter the inventory:
- Total certificates
- Expired certificates
- Revoked certificates
- Expiring in 15 days
- Not assigned to applications
Note: You can select more than one tile at a time to further refine the results.
Using search and filter options
Use the free-text search box or filters to locate certificates in the inventory. You can search by certificate name, domain, issuing certificate authority, and other attributes. Filters allow you to narrow results by criteria such as expiration date, revocation status, or assignment.
Using the free-text search box
When you enter text in the search box at the top of the inventory, Next-Gen Trust Security searches across all visible columns. This is useful when you know a specific value, such as a domain name or certificate identifier.
Using predefined filters
Next-Gen Trust Security includes several predefined filters. The default view is All certificates. To apply a predefined filter, open the filter dropdown and select one of the available options.
Examples include:
- My certificates: Displays only certificates you own.
- Retired certificates: Displays only retired certificates, which can help you locate certificates that may need to be recovered.
Using custom filters
Select Filters to create more targeted queries using one or more criteria.
Use the Column, Operator, and Value fields to define each filter. You can select Add Filter to apply multiple filters at the same time.
Filtering for wildcard certificates
A wildcard certificate secures multiple subdomains under a single primary domain. The wildcard character (*) appears in the certificate’s domain name.
For example, *.example.com secures:
- payment.example.com
- contact.example.com
- login-secure.example.com
- www.example.com
To filter for wildcard certificates:
- Select Certificate Name as the column.
- Choose contains as the operator.
- Enter an asterisk (*) as the value.