47 Day Certificates
The CA A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA./Browser Forum has announced that by 2029, TLS
TLS (Transport Layer Security) and its predecessor SSL (Secure Sockets Layer) are protocols for establishing authenticated and encrypted links between networked computers. certificate lifespans will be limited to just 47 days. This shift means organizations must adopt frequent certificate rotations as the new normal. Manual certificate management will no longer be sustainable—especially for enterprises with large certificate inventories. Automation is no longer a luxury; it’s a necessity.
To meet this shortened lifecycle, organizations will need fully automated, end-to-end certificate lifecycle management solutions. Without automation, managing certificate renewals every few weeks could become impractical—or even impossible. For more details, see:
Manual steps in the rotation process introduce risk and slowdowns. The goal should be to eliminate manual intervention for routine certificate deployments, allowing teams to focus their attention on more complex or critical scenarios that truly require human oversight.
Automated, End-to-End Certificate Lifecycle Management
A complete automation solution for certificate lifecycle management should include the following key stages:
1. Certificate Enrollment and Renewal
Automation begins with securely requesting and issuing certificates. This includes:
-
Authorization Checks
The requesting entity (user or device) must demonstrate authorization to request a certificate for:
-
Subject Alternative Names (SANs) such as DNS
The Domain Name System is a service that translates names into IP addresses. names, IP addresses, URIs, or email addresses
-
Key usages and extended key usages, typically defined by the certificate profile or template
A certificate template defines the policies and rules that a CA uses when a request for a certificate is received.
-
CA Routing and Signing
The request must be routed to the correct Certificate Authority
A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA. (CA) and signed according to policy.
2. Certificate Deployment
Once issued or renewed, the certificate must be installed in the appropriate locations with minimal delay. Deployment targets may include:
-
Web servers
-
Applications
-
Containers
-
Windows certificate stores
-
Load balancer listeners (e.g., F5, A10, IIS)
-
Remote file systems (e.g., PEM
A PEM format certificate file is a base64-encoded certificate. Since it's presented in ASCII, you can open it in any text editor. PEM certificates always begin and end with entries like ---- BEGIN CERTIFICATE---- and ----END CERTIFICATE----. PEM certificates can contain a single certificate or a full certifiate chain and may contain a private key. In general, extensions of .cer and .crt are certificate files with no private key, .key is a separate private key file, and .pem is both a certificate and private key., JKS
A Java KeyStore (JKS) is a file containing security certificates with matching private keys. They are often used by Java-based applications for authentication and encryption., PFX
A PFX file (personal information exchange format), also known as a PKCS#12 archive, is a single, password-protected certificate archive that contains both the public and matching private key and, optionally, the certificate chain. It is a common format for Windows servers./PKCS#12
A PFX file (personal information exchange format), also known as a PKCS#12 archive, is a single, password-protected certificate archive that contains both the public and matching private key and, optionally, the certificate chain. It is a common format for Windows servers. formats)
Available Solutions
Several suggested solutions are available on the Keyfactor client support portal. Use the following links to explore your options, and refer to Table 8: Solutions Table (Pros/Cons) for a comparison of solution advantages and trade-offs.
Solution Options:
-
Use Certbot with ACME on EJBCA
Automate certificate issuance using Certbot and the ACME protocol against an EJBCA instance.
-
Use kfutil to bulk create Windows IIS bindings
Efficiently deploy certificates by generating IIS bindings across multiple Windows servers.
-
Use kfutil to bulk create JKS bindings
Automate the deployment of certificates into Java KeyStores (JKS) at scale.
-
Use kfutil to bulk create PEM bindings
Streamline PEM-based certificate deployments for systems or applications that consume PEM format.
Table 8: Solutions Table (Pros/Cons)
Approach | Pros | Cons | More Information |
---|---|---|---|
ACME (Automated Certificate Management Environment) |
|
|
Keyfactor ACME Documentation |
SCEP (Simple Certificate Enrollment Protocol) |
|
|
Keyfactor SCEP Documentation |
EST (Enrollment over Secure Transport) |
|
|
Keyfactor EJBCA EST |
Keyfactor Command Issuer (external issuer for cert-manager) |
|
|
Keyfactor Command Issuer for cert-manager |
AD AutoEnrollment |
|
|
The Keyfactor Cloud Gateway supports AD AutoEnrollment (see Cloud Gateway). |
Workflows & Alerts (Keyfactor Command) |
|
|
|
Orchestrators & Certificate Store Integrations |
|
|
|
Keyfactor API |
|
|
Keyfactor API Reference |
Was this page helpful? Provide Feedback