The Jellyfish Discovery Services Module includes certificate discovery tools to perform discovery of certificates in use within the targeted networks.
Networks are scanned to identify any devices operating on them, and the devices are then scanned to determine any certificates present. Details of discovered certificates and devices are stored within the Jellyfish data store, allowing reports to be generated on data relating to the discovery run.
How does Discovery work?
This process will poll servers, services, and applications to attempt to detect the use of certificates within the network. These will then be registered within the Jellyfish application. As the responsible entity for these certificates may not be known, these certificates are reported to Jellyfish administrators to ensure that action can be taken to determine the person or group responsible for their management.
One stop shop for managing assets