Back to Infisical

Certificate Syncs

docs/documentation/platform/pki/applications/certificate-syncs/overview.mdx

0.160.15.1 KB
Original Source

Push certificates from your Application to external services automatically. When paired with auto-renewal, renewed certificates are synced to their destinations — keeping your infrastructure current without manual intervention.

<Info> Certificate Syncs are configured per Application. Select which certificates to sync, then configure the destination. </Info>

How It Works

mermaid
flowchart LR
    subgraph Application
        C1[Certificate 1]
        C2[Certificate 2]
        C3[Certificate 3]
    end
    
    S[Certificate Sync]
    AC[App Connection]
    
    subgraph Destination["Destination Service"]
        D1[Certificate 1]
        D2[Certificate 2]
        D3[Certificate 3]
    end
    
    C1 --> S
    C2 --> S
    C3 --> S
    S --> AC
    AC --> D1
    AC --> D2
    AC --> D3
    
    style C1 fill:#e1f5fe,stroke:#01579b
    style C2 fill:#e1f5fe,stroke:#01579b
    style C3 fill:#e1f5fe,stroke:#01579b
    style S fill:#fff9c4,stroke:#f57f17
    style AC fill:#e8f5e9,stroke:#2e7d32
    style D1 fill:#f3e5f5,stroke:#7b1fa2
    style D2 fill:#f3e5f5,stroke:#7b1fa2
    style D3 fill:#f3e5f5,stroke:#7b1fa2
  1. Select certificates to sync from your Application
  2. Configure a destination using an App Connection
  3. Certificates are pushed to the destination automatically
  4. Renewals sync automatically when using server-side auto-renewal
<Note> Only certificates managed by Infisical are affected during sync operations. Certificates created directly in the destination service remain untouched. </Note>

Supported Destinations

<CardGroup cols={2}> <Card title="AWS Certificate Manager" icon="aws" href="/documentation/platform/pki/applications/certificate-syncs/aws-certificate-manager"> Import certificates into ACM for use with AWS services. </Card> <Card title="AWS Elastic Load Balancer" icon="aws" href="/documentation/platform/pki/applications/certificate-syncs/aws-elastic-load-balancer"> Deploy certificates directly to ALB/NLB listeners. </Card> <Card title="AWS Secrets Manager" icon="aws" href="/documentation/platform/pki/applications/certificate-syncs/aws-secrets-manager"> Store certificates as secrets for application retrieval. </Card> <Card title="Azure Key Vault" icon="microsoft" href="/documentation/platform/pki/applications/certificate-syncs/azure-key-vault"> Import certificates into Azure Key Vault. </Card> <Card title="Cloudflare" icon="cloudflare" href="/documentation/platform/pki/applications/certificate-syncs/cloudflare-custom-certificate"> Deploy custom SSL certificates to Cloudflare zones. </Card> <Card title="Chef Infra" icon="utensils" href="/documentation/platform/pki/applications/certificate-syncs/chef"> Distribute certificates via Chef data bags. </Card> <Card title="NetScaler" icon="server" href="/documentation/platform/pki/applications/certificate-syncs/netscaler"> Deploy certificates to Citrix NetScaler ADC. </Card> </CardGroup> <Note> Need a destination that isn't listed? Contact [email protected] to request it. </Note>

Creating a Certificate Sync

<Steps> <Step title="Create an App Connection"> If you haven't already, create an [App Connection](/integrations/app-connections/overview) for your destination service. This provides the credentials needed to push certificates. </Step> <Step title="Configure the sync"> In your Application, go to the **Certificate Syncs** tab and click **Create Sync**.
Configure:
- **Destination**: Select the App Connection and target endpoint
- **Certificates**: Choose which certificates to sync
- **Options**: Configure sync behavior (see below)
</Step> <Step title="Certificates are synced"> Selected certificates are immediately pushed to the destination. Future renewals sync automatically. </Step> </Steps>

Sync Options

OptionDescription
Remove on expiryAutomatically remove expired certificates from the destination
Include Root CAInclude the root CA certificate in the chain
Certificate namingCustomize how certificates are named in the destination (default: Infisical-{certificateId})
<Note> Some destinations don't support automatic removal of expired certificates. Certificates managed by Infisical may be overwritten if modified directly in the destination. </Note>

What's Next?

<CardGroup cols={2}> <Card title="AWS Certificate Manager" icon="aws" href="/documentation/platform/pki/applications/certificate-syncs/aws-certificate-manager"> Import certificates into ACM for AWS services. </Card> <Card title="Azure Key Vault" icon="microsoft" href="/documentation/platform/pki/applications/certificate-syncs/azure-key-vault"> Store certificates in Azure Key Vault. </Card> <Card title="Alerting" icon="bell" href="/documentation/platform/pki/applications/alerting/overview"> Get notified about certificate lifecycle events. </Card> <Card title="Managing Certificates" icon="list" href="/documentation/platform/pki/applications/certificates"> View and manage certificates in your Application. </Card> </CardGroup>