Configure Scan Target

Setting up scan targets involves specifying the locations, systems, or assets that automated bots will scan to identify and assess digital certificates. This ensures that certificates across your infrastructure are valid, up-to-date, and correctly configured. The scan targets define which servers, applications, or networks will be monitored.

Scan targets can be configured through the following methods:

· SSL: Monitor SSL/TLS certificates for expiration, configuration, and compliance.

· HSM (Hardware Security Module): Scan and verify certificates stored within HSMs.

· LDAP (Lightweight Directory Access Protocol): Monitor certificates in LDAP-based directories for validity and usage.

· Certificate Store: Scan certificates stored within system or application certificate stores.

· Cloud Providers: Identify and monitor certificates deployed across cloud environments.

· File System: Monitor certificates stored in file directories for configuration and expiration.

· SSH: Scan SSH keys and certificates to ensure secure access configurations.

Last updated

© eMudhra. All Rights Reserved.