Manage Certificate Expiry and Reap the Benefits
Cogito’s Certificate Lifecycle Management prevents unplanned outages by managing certificate expiry. Jellyfishes Certificate Lifecycle Management (CLM) capability includes a full Configuration Management DataBase (CMDB). This is also know as an Asset Management Tool. As well as an Identity and Access Management (IdAM) capability. This allows the CLM to build relationships between users, devices, applications, services and the certificates generated for this. This makes Jellyfish unique in that it is business outcome centric, not just certificate centric. It also allows for better integration between other components in the technology stack.
The Certificate Lifecycle Management functionality prevents unplanned outages in in a number of ways. They are:
Certificate Automation
Certificate automation is the automatic registration and generation of certificates for users, devices, services and applications as well as the renewal of these entities’ certificates automatically. This is the primary method by which the CLM assists in avoiding an unplanned outage. It has the added benefit of reducing the workload of ICT staff. Jellyfish offers the following automation methods:
It utilises Discovery tools and build relationships with certificates to make managing and reporting far better and service centric.
Jellyfish offers full credential and key management. It is also much more than just a Certificate Lifecycle Management platform. It can also do:
- Token management
- HSM Key management
- Mobile credential management
- And automation in other areas
- Integration with SIEM
Certificate Notifications
The Jellyfish CLM tool provides automated notifications which can be customised to the individual business needs. These notifications can be sent via email automatically to a default group and even sent to an individual for a specific individual certificate. Webhooks can also be used for notifications and the REST API can also be used to query for this information.
Certificate Reporting
Detailed reporting not just on certificates but on the users, devices, applications and services that use them is an invaluable tool in the fight against certificate based unplanned outages. It also aids an ICT team in other ways such as improving the security posture of the systems and services they support. The advanced reporting tool within Jellyfish has the ability to report on any facet of a certificate or on the entity that certificate is used for or by. These reporting capabilities are customisable and complex searches can be created and saved for future use. The Boolean based capability not only supports a diverse array of positive searches but also allows for the exclusion, or combination of information in order to get the exact information that the organisation requires.
Reporting information can also be downloaded to form reports in other systems such as business intelligence systems or in excel spreadsheets for graphing. All of this capability is also available via our REST API allowing any system or service that has the requisite authorisation to access this capability.
Discovery
Our Discovery tools discover certificates on network and inside of devices. Discovery also builds relationships with certificates to make managing and reporting far better and service centric. Discovery does this through two mechanisms. They are network based where no client is required to request certificate information from devices, services and applications. The second method that can be used in conjunction with the network based approach is a client based approach. This is used where certificate information is not available to network based services. This could be because the device does not allow access to the certificate from a network connection or where there is no ability to have discovery components reach into that network segment.