To learn how to use REST API to add a new SSL/TLS Certificate monitor: Click here
To create a new monitor, follow the steps given below:
Following are the list of metrics that are monitored in SSL/TLS Certificate monitoring:
Parameter | Description |
---|---|
CERTIFICATE CHAIN SUMMARY | |
Certificate Order | Shows the position of the certificate within the certificate chain. |
Common Name (CN) | Name of the host or domain to which the certificate is issued. |
Issued By | The name of the certificate authority (CA) that provided the certificate for the domain. |
Days to Expire | Displays the expiration date of the certificate. |
Expiry Status | The expiration status of the certificate. (Active, Expiring Soon, or Expired). |
CERTIFICATE ORDER: SERVER CERTIFICATE/ CERTIFICATE CHAIN | |
VALIDITY | |
Issued On | Date at which the certificate was issued. |
Expires On | Date at which the certificate will expire. |
Days to Expire | Number of days to expiry. |
ISSUED BY | |
Common Name (CN) | Name of the host or domain that issues the certificate. |
Organization (O) | Name of the organization that issues the certificate. |
Organization Unit (OU) | Name of the organization unit making the request. |
ISSUED TO | |
Common Name (CN) | Name of the host or domain to which the certificate is issued. |
Organization (O) | Name of the organization to which the certificate is issued. |
Organization Unit (OU) | Name of the organization unit making the request. |
SHA-256 fingerprint | The hashed value of the SSL certificate's entire data, including its public key and other details. |
Signature Algorithm | Displays the signing algorithm used for the certificate. |
Parameter | Description |
---|---|
Vulnerability Status | Indicates whether the cipher is secure or weak. |
Secure Cryptographic Components | The essential security features within the SSL/TLS domain, providing crucial protections for data transmission and integrity. |
PROTOCOLS AND CIPHERS | |
Ciphers | The primary column for protocols and ciphers. |
Protocol Version | The version of the protocol associated with the cipher. |
Key size(bits) | The key size of the encryption algorithm (in bits). |
Cipher Status | Indicates whether the cipher is secure or weak. |
Thank you for your feedback!