docs/documentation/platform/pki/enrollment-methods/est.mdx
The EST enrollment method allows you to issue and manage certificates against a specific certificate profile using the EST protocol. This method is suitable for environments requiring strong authentication and encrypted communication, such as in IoT, enterprise networks, and secure web services.
Infisical's EST service is based on RFC 7030 and implements the following endpoints:
These EST endpoints are exposed on port 8443 under the .well-known/est path
and structured under https://app.infisical.com:8443/.well-known/est/{profile_id}/...
In the following steps, we explore how to issue a X.509 certificate using the EST enrollment method.
<Steps> <Step title="Create a certificate profile in Infisical"> Create a [certificate profile](/documentation/platform/pki/certificates/profiles) with **EST** selected as the enrollment method and fill in EST-specific configuration.Here's some guidance on each EST-specific configuration field:
- Disable Bootstrap CA Validation: Enable this if your devices are not configured with a bootstrap certificate.
- EST Passphrase: This is also used to authenticate your devices with Infisical's EST server. When configuring the clients, use the value defined here as the EST password.
- CA Chain Certificate: This is the certificate chain used to validate your devices' manufacturing/pre-installed certificates. This will be used to authenticate your devices with Infisical's EST server.

The complete URL structure of the supported EST endpoints may look like the following:
- https://app.infisical.com:8443/.well-known/est/{profile_id}/cacerts
- https://app.infisical.com:8443/.well-known/est/{profile_id}/simpleenroll
- https://app.infisical.com:8443/.well-known/est/{profile_id}/simplereenroll
</Step>
<Step title="Configure EST clients">
To use the EST passphrase in your clients, configure it as the EST password. The EST username can be set to any arbitrary value.
Use the appropriate client certificates for invoking the EST endpoints.
- For `simpleenroll`, use the bootstrapped/manufacturer client certificate.
- For `simplereenroll`, use a valid EST-issued client certificate.
When configuring the PKCS#12 objects for the client certificates, only include the leaf certificate and the private key.
</Step>