: Overview: Validating Certificates
Focus
Focus

Overview: Validating Certificates

Table of Contents

Overview: Validating Certificates

Certificate validation helps ensure that certificates are being used correctly to secure machine identities. After certificates are added to the certificate inventory, Next-Gen Trust Security validates them automatically every 24 hours.
Certificate validation is important because security, compliance, and technology requirements evolve over time. Next-Gen Trust Security continuously evaluates certificates and the servers that host them to help ensure certificates remain valid and are used appropriately.
Next-Gen Trust Security surfaces validation results directly in the dashboard and flags certificates that fail validation so administrators can take action.
In addition to automatic validation, you can manually run validation on certificates using Validate Now. Manual validation can also discover additional TLS server endpoints associated with certificates already in your inventory.

Types of Certificate Validations

Next-Gen Trust Security supports two types of certificate validation:
  • SSL/TLS validation
  • Certificate chain validation

About SSL/TLS Validation

Next-Gen Trust Security performs SSL/TLS validation on each certificate every 24 hours. You can also run validation manually at any time using Validate Now.
SSL/TLS validation confirms that:
  • The correct certificate is deployed on the TLS endpoint.
  • The certificate is properly configured for the target domain and port.
Validation statusDescriptionRisk levelResolution
Hostname mismatchThe TLS target presented a certificate, but the common name or SAN does not match the domain where the certificate is installed.HighInstall the correct certificate for the domain, or reissue the certificate with the correct CN and SAN values.
Old version of certificate foundOne or more TLS server endpoints is using an older version of a certificate that should be replaced.HighDeploy the current version of the certificate on the TLS server.
No certificate presentThe TLS target did not present a certificate on the specified port.WarningVerify the TLS server installation and port number. If the target is no longer valid, remove it from the discovery target list.
Unexpected certificate foundThe certificate found on the TLS target has a different fingerprint than expected.WarningInstall the correct certificate on the endpoint.
Unknown errorNext-Gen Trust Security encountered an error but could not identify it.WarningRetry validation. If the issue persists, contact CyberArk support.
PendingValidation has not yet occurred.WarningRun a manual validation or wait for the next scheduled validation cycle.

About Certificate Chain Validation

Each certificate in Next-Gen Trust Security includes its certificate chain, which starts with the end-entity certificate and continues through intermediate certificates up to a trusted root certificate.
Certificate chain validation ensures that the chain is complete, valid, properly signed, and anchored to a trusted root CA. Errors in the certificate chain can result in trust failures or outages.
To help prevent chain-related issues, Next-Gen Trust Security continuously monitors certificates and their chains.
The following table describes possible certificate chain validation states and recommended actions.
Validation statusDescriptionRisk levelResolution
Chain expiring soonOne or more CA certificates in the chain expires before the end-entity certificate or is nearing expiration.HighIdentify the expiring CA certificate, then download and install the updated chain. If unavailable, renew the certificate and install the full chain.
Chain building failedOne or more intermediate or root CA certificates is missing, preventing construction of a complete chain.WarningInstall the missing intermediate or root CA certificate on the TLS server.
Incomplete chainThe endpoint did not return enough valid intermediate certificates to build a trusted chain.WarningVerify intermediate certificates are valid and installed correctly, then redeploy the full certificate chain.
Chain not trustedThe certificate chain cannot be anchored to a trusted root CA.WarningAdd the required CA certificate to the trusted CA inventory.
Unknown errorNext-Gen Trust Security encountered an error but could not identify it.WarningRetry validation. If the issue persists, contact CyberArk support.
PendingValidation has not yet occurred.WarningRun a manual validation or wait for the next scheduled validation cycle.

What's Next?

Learn more about related tasks:
  • Using Validate Now to discover additional TLS server endpoints
  • Finding certificates in your inventory
  • Downloading certificates