docs/documentation/platform/pki/concepts/certificate-lifecycle.mdx
Typically, a certificate goes through a series of stages during its lifetime from creation to retirement. This is called the certificate lifecycle. The exact names of these stages may vary from vendor to vendor, but they typically include discovery, enrollment, deployment, renewal, revocation, and retirement.
Note that not every stage is needed. For instance:
Certificate discovery is the process of identifying all active and inactive certificates across an environment, including those found on web servers, load balancers, services, and devices. A complete inventory prevents outages from forgotten certificates and creates the foundation for automation and monitoring.
Certificate enrollment is the process of requesting a certificate from a CA and can follow different approaches depending on the system or protocol in use.
Common approaches to certificate enrollment include:
Enrollment can be manually completed via API or fully automated using protocols like EST or ACME. The choice of enrollment method depends on security requirements, operational constraints, and integration context.
Certificate approval is an optional workflow that adds a human review step before certificates are issued. When an approval policy is configured for a certificate profile, certificate requests are placed in a pending state until the required approvers review and approve them.
Approval workflows help organizations:
Approval policies can be configured with multiple sequential steps, each requiring a specified number of approvals from designated users or groups. Machine identities can optionally bypass approval when automated certificate issuance is required for workloads.
Once all approval steps are completed, the certificate is automatically issued and made available to the requester. If rejected, the request is closed and no certificate is issued.
Certificate deployment involves installing the issued certificate on the appropriate systems and services, such as web servers, load balancers, or internal endpoints. It can also include distributing or synchronizing certificates to external systems like cloud key stores (e.g., AWS Secrets Manager, Google Secret Manager, Azure Key Vault) so they can be securely consumed by workloads running in the cloud.
Deployment can happen manually or through automated mechanisms such as configuration pipelines, agents, or webhook integrations.
Certificate renewal is the process of requesting a new certificate from a CA before it expires to maintain trust and availability; this process can involve reusing the same key pair or rotating to a new one.
The renewal process can be server-driven or client-driven:
This flexibility allows certificates to be renewed in a way that aligns with different security, automation, and infrastructure models.
Certificate revocation is the process of invalidating a certificate to prevent it from being used. This is required when a certificate is compromised, misconfigured, or no longer needed. The CA signals this status to clients through CRLs or OCSP. A new certificate can be issued and deployed if needed.
Certificate retirement is the process of removing a certificate from the system. This is typically done when a certificate is no longer needed or has expired.