docs/documentation/platform/pki/quick-starts/issue-first-certificate.mdx
Issue a TLS certificate from your own private CA in about 10 minutes. You'll set up a certificate authority, create a policy and profile, then issue your first certificate.
| Field | Value |
|-------|-------|
| Name | `my-root-ca` |
| Type | Root CA |
| Key Algorithm | EC_prime256v1 |
[Learn more about CAs →](/documentation/platform/pki/ca/overview)
| Field | Value |
|-------|-------|
| Preset | TLS Server Certificate |
| Name | `tls-server` |
The preset pre-configures all the right settings for standard TLS certificates.
[Learn more about policies →](/documentation/platform/pki/settings/policies)
| Field | Value |
|-------|-------|
| Name | `web-servers` |
| Certificate Authority | Select `my-root-ca` |
| Certificate Policy | Select `tls-server` |
[Learn more about profiles →](/documentation/platform/pki/settings/profiles)
| Field | Value |
|-------|-------|
| Name | `my-first-app` |
| Certificate Profile | Select `web-servers` |
[Learn more about Applications →](/documentation/platform/pki/applications/overview)
[Learn more about enrollment →](/documentation/platform/pki/applications/enrollment-methods/overview)
| Field | Value |
|-------|-------|
| Profile | Select `web-servers` |
| Common Name | `example.local` |
Click **Request** and download your certificate and private key.
You now have two files:
certificate.pem — Your TLS certificateprivate-key.pem — The private key (keep this secure)Verify your certificate:
openssl x509 -in certificate.pem -text -noout
You should see your certificate details including the Common Name (example.local), validity period, and that it was signed by my-root-ca.