Only this pageAll pages
Powered by GitBook
Couldn't generate the PDF for 151 pages, generation stopped at 100.
Extend with 50 more pages.
1 of 100

emSign Support Center

Loading...

Getting Started

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

emSign CERTInext

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Certificate Approval Process

Loading...

Loading...

Loading...

emSign

emSign is a brand, a business unit of eMudhra for providing certificate services under eMudhra's own root certificates. eMudhra is a leading Certifying Authority (CA) that specializes in providing digital certificate solutions to secure online communications and transactions. With a strong reputation for trustworthiness, reliability, and security, eMudhra has become a trusted name in the field of digital certificates.

Why emSign?

emSign is a brand and a business unit of eMudhra, providing certificate services under eMudhra's own root certificates. eMudhra, a leading Certifying Authority (CA), specializes in delivering digital certificate solutions to secure online communications and transactions. Renowned for its trustworthiness, reliability, and security, eMudhra has established itself as a trusted name in the field of digital certificates.

As a first CA from India to get globally accredited, emSign holds a unique position among a select few companies worldwide. emSign plays a critical role in fostering trust in the digital landscape by issuing digital certificates that act as electronic credentials, verifying the identity of entities engaged in online communications, such as websites, email servers, and software applications. emSign certificates are used globally by businesses, governments, and organizations to secure their online presence, protect sensitive information, and authenticate identities.

emSign offers a comprehensive range of digital certificate solutions to address diverse security needs. These include SSL/TLS certificates for securing websites with robust encryption, code signing certificates for authenticating software applications, document signing certificates for securing digital documents, and email certificates for encrypting email communication. Additionally, emSign provides managed PKI solutions for organizations requiring extensive certificate management within their complex environments. Our certificates are widely adopted with thousands of companies worldwide relying on them.

Beyond its technical expertise, emSign is recognised for its exceptional customer support. The company offers 24/7 customer assistance through various channels, including email and phone, helping customers with everything from certificate issuance to installation and beyond. emSign also provides a user-friendly certificate management platform, enabling customers to easily manage and monitor their certificates.

emSign is a Certifying Authority that has built a strong reputation for trust, reliability, and security in the digital world. Through its rigorous validation process, innovative solutions, robust security measures, and outstanding customer support, emSign plays a pivotal role in securing online communications and transactions, helping businesses and organizations establish trust in the digital realm.

Key Highlights

  • Domain Validation - Single Domain: Safeguard your website with our Domain Validation (DV) SSL certificate, delivering a secure and encrypted browsing experience for your visitors.

  • Domain Validation - Single Wildcard Domain: Wildcard certificates eliminate the need to purchase separate SSL products for each subdomain. With a single wildcard certificate, you can secure unlimited subdomains saving both time and costs.

About emSign

emSign is a global digital certificate provider and a business unit of eMudhra, a publicly listed, globally accredited Certifying Authority (CA) with over 16 years of expertise in operating CAs in large markets. emSign is headquartered in Salt Lake City, Utah and Bangalore, India

With offices in 10 countries and clients across 30+ nations, eMudhra delivers cutting-edge digital trust solutions to secure online communications and transactions.

Key Highlights:

  1. Comprehensive Digital Certificate Offerings:

  • SSL/TLS Certificates: Secure websites with robust encryption.

Domain Validation
- Multi-Domain:
Our Multi-Domain SSL Certificates are highly versatile and cost-effective. They secure multiple domains under a single SSL installation, offering simplicity and reduced expense. Also known as Subject Alternative Name (SAN) Certificates or Unified Communication Certificates (UCC), these are the optimal choice for organizations managing several domains.
  • Domain Validation - Multi-Domain Wildcard: Multi-Domain Wildcard certificates extend the flexibility of SAN SSL certificates by allowing the use of wildcard domains. This powerful combination enables organizations to secure multiple primary and subdomains under a single SSL installation, reducing complexity and cost.

  • Organization Validation - Single Domain: Establish trust with an Organization Validation (OV) SSL Certificate which verifies the authenticity of your organization and providing secure browsing experience for your visitors.

  • Organization Validation - Single Wildcard Domain: Wildcard certificates for OV domains simplify certificate management by securing unlimited subdomains with a single certificate, reducing the need for multiple installations and minimizing operational overhead.

  • Organization Validation - Multi-Domain: OV Multi-Domain SSL Certificates offer the same versatility as SAN SSL certificates but with the added assurance of organization-level validation. They are also called Subject Alternative Name Certificates (SAN SSL) or Unified Communication Certificates (UCC SSL). These certificates streamline the process of securing multiple domains with a single installation, ensuring both trust and efficiency.

  • Organization Validation - Multi-Domain Wildcard: Multi-Domain Wildcard certificates combine the power of multi-domain management with wildcard functionality, providing seamless protection for both primary and subdomains. With a single OV Multi-Domain Wildcard certificate, organizations can secure their entire domain structure while optimizing costs.

  • Extended Validation - Single Domain: For the highest level of trust, our Extended Validation (EV) SSL Certificate highlights your website authenticity by displaying the organization’s name in the browser address bar, reinforcing credibility and building customer confidence.

  • Extended Validation - Multi-Domain: EV Multi-Domain SSL Certificates offer robust security and validation for organizations managing multiple domains. These are also called Subject Alternative Name Certificates (SAN SSL) or Unified Communication Certificates (UCC SSL). These certificates simplify management and reduce costs while providing the assurance of the highest.

  • Code Signing Certificates: Authenticate and protect software.

  • Document Signing Certificates: Secure digital documents with legal electronic signatures.

  • Email Certificates: Encrypt and authenticate communications.

  • Managed PKI Solutions: Simplify certificate management for complex environments.

    1. Proprietary Expertise:

    • Innovator in Identity Management, PKI, and eSignature workflows.

    • Solutions deployed in Fortune 500 companies, leading banks, and eGovernment programs worldwide.

    1. Global Reach and Trust:

    • Certificates trusted by thousands of businesses, governments, and organizations globally.

    • Extensive experience in enabling secure communications, safeguarding sensitive data, and verifying digital identities.

    1. Exceptional Customer Support:

    • 24/7 assistance through multiple channels.

    • Intuitive certificate management platform for seamless monitoring and control.

    eMudhra’s leadership in digital security, supported by its innovative technology and unmatched reliability, empowers businesses and governments to establish trust in the digital landscape.

    Digital Certificate based login

    User can login to the CERTInext portal with Digital Certificate.

    To add the certificate, navigate to My Profile > Add Certificate.

    Add Certificate

    Digital Certificate can be added in two ways, Upload from system or Read from Store.

    • Upload: User can upload only certificates of the format .cer.

    Note: Files other than .cer extension cannot be uploaded and used for authentication and login.

    • Read from Store: The security certificates installed in the browser are listed and user can select and add the certificate.

    Change Certificate

    Users can change the certificate for login with a different one with same steps as above.

    Submitting a Certificate Signing Request (CSR)

    As a Customer

    Downloading Certificates

    Tools

    Ordering a Certificate

    Reseller/Enterprise/Retail users can create new request under New Request. Account users can create a new request, manage requests and track expiring certificates which are going to expiry in a specific time range.

    Key Lifecycle Management

    Effective key management is crucial for maintaining data security and compliance in today's digital landscape. CERTInext offers robust key management solutions tailored to various organizational needs.

    Reports

    Enforce 2FA

    To enhance account security, the platform offers the option to enable Two-Factor Authentication (2FA) via T-OTP (Time-Based One-Time Password).

    Enabling 2FA

    • Check the box for "Enforce 2FA via T-OTP authentication mode" in the Account Configuration settings.

    • Note that enabling 2FA is optional and can be configured by the administrator based on company policy.

    What Happens After Enabling

    Once enabled, users will need to configure T-OTP during their first login by:

    • Scanning the provided barcode .

    • Entering the generated OTP.

    T-OTP authentication will then apply to all users associated with the account.

    This feature ensures an added layer of security for platform access.

    IP Restrictions

    IP Restrictions

    The IP Restrictions feature enables administrators to restrict access to business data by specifying a range of authorized IP addresses. This ensures secure and controlled access to sensitive information.

    Configure IP Restrictions

    Select a User: Choose the user for whom the restriction will apply. Alternatively, you can apply the restriction to all users.

    Enter Allowed IP Range:

    • Specify the Allowed IP Start Address.

    • Specify the Allowed IP End Address.

    Add Description (Optional): Provide a description for the IP restriction for easy identification.

    This feature enhances security by ensuring that only authorized IP addresses can access your business data.

    A created IP Restriction Rule can be disabled at any time by the administrator, providing flexibility to adjust access controls as needed.

    Trust

    Trust is the backbone of every secure digital interaction—whether you’re making an online purchase, signing a contract electronically, or sending confidential data. In the context of Public Key Infrastructure (PKI), “trust” refers to the confidence placed in a Certificate Authority (CA) to accurately verify identities and issue digital certificates that prove the legitimacy of websites, applications, documents, and other online entities. This confidence is shared across browsers, operating systems, and software applications worldwide, ensuring that any certificate issued by a reputable CA is recognised as trustworthy.

    The Role of emSign as a Global CA

    As a global CA, emSign’s primary responsibility is to maintain and strengthen this trust through stringent validation processes, robust security practices, and ongoing compliance with industry standards such as the CA/Browser Forum Baseline Requirements and WebTrust/ETSI audits. When emSign issues a digital certificate, the recipient gains the advantage of a verifiable chain of trust that links the certificate back to emSign’s root certificate embedded in trusted root stores. These root stores are curated by browsers, operating systems, and device manufacturers, ensuring that any certificate stemming from emSign is automatically accepted by end users’ systems around the globe.

    Security

    In an interconnected world, security underpins the trust and reliability of digital communications. Ensuring that your data, transactions, and interactions remain confidential and tamper-proof is pivotal to conducting business online. For Certificate Authorities (CAs), this means following strict protocols and safeguarding the entire certificate issuance process so that end users and organizations can operate in an environment free from the risks of fraud, impersonation, and cyberattacks.

    emSign’s primary focus is to enable secure digital experiences by issuing high-assurance certificates. These certificates verify the identities of individuals, organizations, and even machines, ensuring that each entity is who it claims to be. eMudhra is committed to maintaining the highest standards of security and compliance to meet the evolving needs of our clients. We are compliant with industry-leading frameworks, which include:

    • WebTrust for CAs (Certificate Authorities):

      The audit checks if the CA's operations meet the standards set forth in its Certificate Policy and Certification Practice Statement. This is crucial for ensuring the security of digital certificates, which are used for encrypting communications and verifying identities online.

    Retail Customers

    Ideal for: Customers using the online platform for personal or business certificate needs.

    Any customer placing orders in emSign.com is considered as Retail customer.

    Retail accounts provide similar functionality to enterprise accounts, giving users access to the following:

    • Portal Access: Manage certificates, domains, and organizations through a user-friendly interface.

    • API Integration: Utilize REST and ACME APIs for key management.

    Download Interim DV

    Applicable only for SSL OV & EV Certificate orders

    To download any Interim DV Certificate, navigate to the order: Go to Certificates > Orders > View order

    Click on the of "Download Interim DV" which displays a a modal with all the necessary information.

    In the modal, click on "Download interim DV" button to download the certificate.

    Certificate Lifecycle and Key Management Platform (CERTInext)

    CERTInext is a unified platform that is part of emSign’s offerings for seamless digital certificate management, catering to enterprises, resellers, and individuals. It simplifies certificate lifecycle management with features like issuance, renewal, discovery, and monitoring. Key highlights include:

    • Certificate Management: Real-time insights, automated lifecycle handling, and pre-validation for instant issuance.

    • Automation & Integration: Supports ACME automation, REST APIs, and Bots for efficient large-scale operations.

    • Enterprise Features: Private PKI, role-based access, detailed reporting, and departmental management.

    Getting Started

    Reseller / Enterprise Sign up & Sign in flow

    In this section

    • Enterprise Sign up

    • Reseller Sign up

    • Multi-account Association

    Product Price List

    The Product Price List Report provides a summary view of product prices, helping users easily access and review pricing information.

    Navigate to Billing & Payments > Product Price List.

    Click on the Product Price List to open the page where all product prices will be displayed.

    Account users can also

    • Filter by Product: Use the Product filter to view prices for specific products.

    Download Certificate

    To download the certificate, Navigate to the order, Certificates > Orders > View order page.

    Click the "Download Certificate" button and the, certificate will be downloaded.

    Sales Summary

    The Sales Summary Report provides an overview of product pricing information in a summarized format.

    To view the Product Sales Summary, navigate to Reports > Sales Summary. The Product Sales Summary page will then be displayed, as illustrated below.

    Users can filter the Sales Summary by selecting the "Product" option, enabling a focused view of the desired product's pricing and sales details.

    By clicking the "Excel" button located in the top-right corner of the page, the Product Sales Summary Report will be downloaded in Excel format, based on the selected search criteria.

    Using APIs to Order

    Account users can generate an API access key to use it for authentication purpose while making API calls.

    RESTful services designed for scale, flexibility & ease of integration. emSign Interface-less APIs enables access to key functionalities offered on emSign product that can be consumed by your application. Our API's are built on REST and therefore interoperable with any existing web application framework that supports REST based API calls.

    emSign's ACME service is meticulously crafted to simplify the automation of SSL/TLS processes, mitigating the complexity and effort associated with managing numerous certificates within an enterprise. With organizations juggling a multitude of certificates, each demanding significant time and effort, ACME proves invaluable by completely automating the essential procedures needed to oversee SSL/TLS certificates across all endpoints in your organization.

    In this section

    • REST APIs

    Replace CSR for Pending Orders

    • To replace the CSR, navigate to Certificates > Orders > View order

    • Clicking the "Replace CSR" button will open a modal window, allowing you to upload the new CSR as shown below.

    • After the CSR is updated, click the "Update" button to apply the changes.

    Submit CSR for Pending Orders

    • To Submit the CSR, navigate to Certificates > Orders > View order page.

    • Clicking the "Submit CSR" button will open a modal window, allowing you to upload the CSR, as illustrated below

    • After uploading the new CSR, click the “Update” button to finalize the submission.

    Certificates Report

    Upon successfully running the bot, all certificates discovered by the bot will be displayed in the system for review and further action

    Users can also View or Download certificates from the action buttons.

    Key Report

    All keys created through the Key Store or Manage Key functions are displayed on the Key Report page for tracking and management purposes.

    How emSign Earns and Maintains Your Trust?

    1. Rigorous Validation: We follow proven validation procedures to confirm the identity of individuals and organizations before issuing certificates, reducing the risk of fraud and impersonation.

    2. Global Compliance: Our accreditation in multiple jurisdictions ensures that emSign certificates meet the highest international standards, making them globally accepted and recognized.

    3. Secure Infrastructure: We employ advanced cryptographic measures and maintain secure data centers to protect certificate issuance processes and private keys.

    4. Continuous Monitoring: Ongoing audits and certificate transparency practices help detect unauthorized or misissued certificates early, safeguarding both certificate owners and end users.

    5. Transparent Revocation: If a certificate is compromised or invalid, we swiftly revoke it and update revocation lists to prevent misuse.

    Together, these measures strengthen the digital ecosystem and foster an environment where individuals, businesses, and governments can confidently conduct secure online transactions. At emSign, we’re committed to upholding the highest standards of trust-so you can operate in a safe, authenticated digital space every single day.

    ISO 9001 (Quality Management System):

    ISO 9001 is a globally recognized standard for managing quality in organizations. This helps organizations demonstrate their commitment to delivering high-quality products and services.

  • CMMI Maturity Level 5 (Continuous Improvement):

    This refers to a high level of organizational maturity where processes are continually improved based on data-driven insights. At Level 5, organizations use a quantitative approach to understand business performance and the variation in processes. This enables them to make informed decisions that lead to continuous enhancements in their operations.

  • SOC 2 Type II Compliant:

    SOC 2 Type II is an audit report that evaluates an organization's internal controls related to the AICPA Trust Service Criteria. These criteria cover five key areas: security, availability, processing integrity, confidentiality, and privacy of data. is important for service providers that handle sensitive data to demonstrate they maintain strong security and privacy practices.

  • GDPR Compliant (General Data Protection Regulation):

    GDPR compliance refers to an organization's adherence to the General Data Protection Regulation, a legal framework designed to protect personal data of individuals in the EU. Organizations must meet specific obligations regarding how they collect, store, and process personal data, ensuring data privacy and security.

  • Group and User Management: Create groups and manage users within their account.

  • Billing and Finance Management: Manage billing details, access invoices, and view financial reports.

  • Private CA and Product Management: Create private CAs and develop customized products for internal use.

  • Reports and Tools: Generate reports and access platform tools for improved management.

  • Notifications: Receive alerts regarding expiring certificates and pending orders.

  • Security & Customization: MFA, Microsoft 365 SSO, IP restrictions, customizable profiles, and proactive alerts.

  • User-Friendly Interface: Centralized dashboards, intuitive workflows, and multi-language support.

  • CERTInext is a trusted solution for managing both public and private trust certificates, ensuring security and efficiency for organizations globally.

    Alerts and Notifications

    ACME APIs

    Download as PDF: Click on the Download PDF button to save the product price list as a PDF file.

    This report offers a convenient way to review and download up-to-date pricing information for various products.

    As a Partner

    Management

    Integrations

    Post Order Actions

    Group-based Certificates Ordering

    • Group Selection:

      • If multiple groups are configured by an organization, the same is available under New Certificate > New Request > For with a drop down containing the list of groups. The account user will have the option to select the desired group from this list.

    • Payment Deduction:

      • Upon placing the order, the amount will be deducted from the selected group.

    Requester Approval Workflows

    Certificate Lifecycle Management

    Billing & Payments

    Settings

    Templates

    Templates are predefined structures or configurations used for simplifying processes such as generating certificates, configuring servers, or automating SSL/TLS settings.

    Using ACME Clients with eMudhra CERTInext

    Overview

    The Automated Certificate Management Environment (ACME) protocol enables automated issuance, renewal, and revocation of SSL/TLS certificates, streamlining certificate lifecycle management. eMudhra’s CERTInext platform supports ACME clients to integrate with web servers, cloud services, and load balancers, ensuring secure and efficient certificate management. This article explores how to use ACME clients with CERTInext, drawing on industry-standard practices and recent advancements in automation.

    Why Use ACME Clients?

    ACME clients simplify certificate management by automating interactions with Certificate Authorities (CAs) like eMudhra. Benefits include:

    • Automation: Eliminates manual certificate tasks, reducing errors.

    • Scalability: Supports high-volume certificate deployments across diverse environments.

    • Compliance: Ensures certificates meet CA/Browser Forum (CABF) requirements.

    • Efficiency: Minimizes downtime with seamless renewals, critical for high-traffic systems.

    Supported ACME Clients

    CERTInext is compatible with popular ACME clients, including:

    • Certbot: Widely used for web servers like Apache and Nginx, offering simple setup and renewal automation.

    • acme.sh: A lightweight, shell-based client ideal for Linux environments and custom integrations.

    • Win-ACME: Designed for Windows IIS, integrating with the Windows Certificate Store.

    • Caddy: A web server with built-in ACME support for automatic HTTPS.

    Setting Up an ACME Client with CERTInext

    1. Install the Client: Install your chosen ACME client (e.g., sudo apt install certbot for Certbot on Ubuntu).

    2. Configure CERTInext: Register with eMudhra’s ACME server via the CERTInext dashboard, obtaining an External Account Binding (EAB) key if required.

    3. Issue Certificates: Run a command like certbot certonly --standalone -d example.com or acme.sh --issue -d example.com --webroot /var/www/html to request a certificate, specifying CERTInext’s ACME endpoint (e.g., ).

    Best Practices

    • Secure EAB Keys: Store EAB keys securely to prevent unauthorized access.

    • Monitor Renewals: Use CERTInext’s dashboard to track certificate status and renewal failures.

    • Test Configurations: Validate ACME workflows in a staging environment to avoid disruptions.

    • Leverage HTTP-01 or DNS-01: Choose HTTP-01 for web servers or DNS-01 for wildcard certificates, depending on your needs.

    Conclusion

    ACME clients, combined with CERTInext, enable automated, secure, and scalable certificate management. By integrating clients like Certbot or acme.sh, organizations can streamline SSL/TLS operations.

    Subscription Plan Coverage for SSL Products

    emSign SSL Subscription plan allows you to pay for a single price for up to three years of SSL/TLS certificate coverage for DV & OV products. With a Multi-year Plan, you select the SSL/TLS certificate, desired coverage period, and certificate validity. Until the subscription plan expires, you reissue your certificate at no additional cost either through manual or Auto approval based on your selected configuration.

    Step-by-Step Ordering Process

    Certificates > New Request.

    • To order a subscription plan, navigate to:

    Choose Product & Validity

    1. Choose Your SSL/TLS Product

      • Select either DV or OV product from the subscription plan.

    2. Fill in the Required Details:

    • For OV certificates: Provide Organization Details (e.g., Organization Name, Unit, Country).

    • For both DV and OV certificates: Enter the Certificate Requestor or Organization Representative Information (e.g., Name, Email ID, Mobile Number, etc.).

    1. Upload, Attach, or Skip the CSR:

    • You can either upload, paste, or skip the Certificate Signing Request (CSR).

    • Skipping CSR: You can submit it later using Order Quick Actions.

    1. Provide Certificate Information:

    Enter the SAN Name and any additional information required.

    1. Additional Information (Optional):

    Add Reporting Tags, Order Remarks, Technical POC details, Custom Fields, and Auto-renewal options.

    1. Proceed to Payment:

    Complete the payment process for your selected SSL/TLS DV or OV product.

    Choose Product & Validity

    • To order a subscription plan, navigate to: Certificates > New Request.

    • From the Products Dropdown List, select the emSign DV /OV product.

      • In the "Subscription For" field, choose the coverage duration:

      • 1 Year, 2 Years, or 3 Years.

    Subscription Plan coverage for SSL Products

    Auto-Renew Certificates Until Coverage:

    Enable the "Auto-renew certificates until coverage" checkbox to configure automatic renewal.

    • If enabled, emSign will automatically renew the certificate based on the selected criteria.

    • A successful reissuance notification email will be sent upon renewal.

    • If disabled, manual reissuance will be required before the certificate expires.

    You can modify the auto-renewal settings later from the Orders View page after the order ID is generated.

    Managing Orders and Subscription

    View Orders and Subscription Details:

    • Once the order is placed, the Orders View page will display the SSL subscription details.

    • You can also modify the auto-renewal configuration from this section.

    Certificate Management:

    • After downloading the certificate, the account user can:

    • Reissue the certificate as needed.

    • Add or Remove SANs based on changing requirements.

    Reissue Certificate

    To initiate Reissue Certificate Navigate to the order by, Certificates > Orders > View order page > Reissue Certificate.

    • The downloaded certificates can be Reissued by selecting the "Reissue Certificate" button is available in order quick action as shown below.

    • Upon clicking "Reissue Certificate" a modal will appear with all the necessary information as shown below.

    • To Reissue the certificate, the account user must provide a reason from the pre-defined options.

    Certificate Signing Request (CSR)

    • User can either upload the CSR file or paste the CSR or can choose to Skip the CSR as shown below.

    • Upon clicking on the "Request reissue" button, the system will generate a re-issuance order ID. All re-issued certificates can be tracked as shown below.

    What's Next?

    Certificate requester / Organization representative will be notified with-

    1. An order confirmation email

    2. All the order related communications

    3. Required actions specific to the product

    Procedure for Attested CSR Generation

    Attested CSR can be generated using HSM via emSign Click Tool.

    Step 1: Open emSign Click Tool.

    Step 2: Click "Tools" from the menu. Step 3: Click "Generate CSR for HSM".

    Step 4: Please follow the help section to generate your CSR.

    Step 5: Proceed to enter the mandatory details and click "Generate CSR". Note: emSign Click Tool supports the below HSM Providers.

    • ncipher HSMs

    • Safenet Luna HSMs

    • Utimaco HSMs

    Step 6: Please click Copy CSR / Save CSR to save the CSR in your computer.

    Step 7: Private Key stored successfully in the HSM.

    Step 8: Submit the CSR to emSign via Portal / API accordingly.

    Manage Keys

    User can view the key details along with the status of the keys generated. Navigate to Keys > Manage Keys

    Users can view key related actions such as View history, Rotate and Delete.

    View Key History

    In the Manage Keys table, under Actions, click on the View History icon.

    A popup appears displaying key details such as Alias Name, Key Type, Signature Algorithm, Created By, and Key Algorithm.

    Download a Key

    Click the Download Key icon under Actions to download the key to your system.

    Rotate a Key

    Click the Rotate Key icon.

    The key will be rotated, and its Alias Name will update accordingly.

    Delete a Key

    Select the Delete Key icon under Actions.

    Confirm deletion in the popup to remove the key.

    Create a New Key

    Navigate to Keys> Manage Key and click on the “+” icon on the top right corner

    Select either Symmetric or Asymmetric Key type from the drop down

    Enter further information regarding the key to be created.

    Once done, click on “Create Key Pairs” button to finish the process. The new pair gets created.

    REST APIs

    • User can manage or create new REST API under this page.

    • To create a new REST API, user need to click on "Add" button, a modal will be displayed.

    • Enter description & select the user for which you wanted to generate the access key, then click on "Generate Access Key" button to proceed further.

    • Upon submitting the request an access key will be generated by the system as shown below.

    Order for Customers

    If a reseller wants to place an order on behalf of the customer, it can be done in two ways

    1. Organizations pre-verified and mapped under the reseller

    Access the Pre-Verified List:

    • In the Organization Details section, click the "Click here" button.

    • A list of pre-verified organizations will be displayed.

    • Select the appropriate organization from the list to proceed with the certificate request.

    2. Organizations not mapped to the reseller

    Search for External Organizations:

    • If the reseller wishes to use an organization mapped to another account, click the "Search External Organization" link.

    • This will prompt the user to enter the representative’s email ID.

    Select External Organizations:

    • After entering the representative’s email ID, a list of available organizations will be displayed.

    • Select the desired organization and proceed with the certificate request.

    Switching Organization Views

    • If the user wants to switch back to the default organization view, click the "Switch to default view" link.

    What’s Next?

    1. Consent Email for External Organization:

      • Once the order is placed, a consent email will be sent to the external organization’s representative email ID.

      • The external representative must accept the organization reuse request.

    2. Verification Status Update:

    CA Connectors

    CA connectors (Certification Authority connectors) are software or middleware components that allow systems, applications, or services to integrate with Certification Authorities (CAs) for the management and automation of digital certificates within an organization's IT infrastructure.

    CERTInext has provision to create the following CA connectors:

    • emCA

    • Microsoft PKI

    • DigiCert

    emCA

    To create emCA credential, required fields are:

    • Name:

    • Base URL:

    • By default, its Common Connector

    • Username:

    Fill in all the details and click on ‘Create’ button.

    Microsoft PKI

    To create Microsoft PKI credential, the required fields are:

    • Name:

    • Base URL:

    • By default, its Common Connector

    • CA Setup Type: Select the type as Standalone CA or Enterprise CA

    Fill in all the details and click on ‘Create’ button.

    DigiCert

    To create DigiCert credential, the required fields are

    • Name:

    • DigiCert API Base URL:

    • DigiCert API Key:

    • Server Platform ID:

    Fill in all the details and click on ‘Proceed’ button.

    SMIME Certificates

    emSign S/MIME Mailbox Validated certificates provide "reasonable assurance" to both senders and recipients that the individual identified in the certificate has control over the associated email address.

    Below are the steps to order an S/MIME - Simple - Mailbox Validated - Strict certificate.

    Step-by-Step Ordering Process

    1. Choose Your S/MIME Product and Validity

    • Navigate to Certificates > New Request.

    • From the Product Dropdown List, select S/MIME - Simple.

    • Choose the validity period and click "Next" to proceed.

    1. Certificate Requester Information

    • Enter the following details:

    • Name

    • Email ID

    • Mobile Number

    1. Certificate Information

    • Enter the Email ID for which the certificate will be issued.

    • Alternatively, select "Same as Requester Email ID" to auto-fill the requester’s email ID.

    • Click "Next" to proceed.

    1. Certificate Signing Request (CSR)

    Refer to the SSL/TLS DV Certificate Ordering Flow for CSR submission options. Users can:

    • Upload or Paste the CSR.

    • Skip CSR and submit it later using the Order Quick Actions feature.

    1. Additional Information (Optional)

    • Provide any Reporting Tags, Order Remarks, or KYC Documents if applicable.

    • Custom fields may also appear here if configured by the account administrator.

    1. Order Summary & Payment

    • Review the order details and product information.

    • Proceed with the payment for the S/MIME certificate.

    • For detailed payment instructions, refer to the SSL/TLS DV Certificate Ordering Flow.

    What’s Next?

    • After successfully placing the order, the certificate requester will receive an Order Confirmation Email.

    • The email will contain a tracking link to monitor the progress of the certificate verification and issuance process.

    Key Store Report

    When a certificate is rotated, a new certificate is issued, and a corresponding new key is generated. This newly generated key is then listed on the Key Store Report page for easy reference and tracking.

    Certificate requests by Administrator

    • Order Placement: Upon clicking the "Submit" button on the order Summary & Payment page, the request will appear on the Orders page, with the status "Order Pending for Approval".

    • Administrator Action: Once the order is listed, the administrator can either approve or reject the request from the Orders page, as shown below.

    • Rejecting an Order:

      • Upon clicking the "Reject" button, the reason for rejection must be entered in the rejection field.

      • Click on “Reject” to finalize the rejection.

    • Approving an Order:

      • Upon clicking the "Approve" button, the system navigates to New Request > Order Summary & Payment Page

      • The account user must click "Pay now" to submit the request and generate the Order ID.

    • Order Completion: Once the payment is successful, the system redirects to the orders page with all the necessary information and associated Order actions as shown below.

    Administrator approval is required only when the order is placed by a Standard User or Basic User places an order.

    Order for Sub-accounts

    • If the reseller wants to place an order on behalf of the Enterprise account an option is available at the new request level.

    • If the reseller checks that check box, all the Enterprise accounts will be displayed which are been part of the parent reseller account.

    • Upon selecting the account reseller can place an order & amount will be deducted from the default group of the Enterprise account.

    Important Note:

    • This option will be available only for parent reseller accounts.

    Additional Information

    This section is optional. Here, the account user can:

    • Add Reporting Tags

    • Provide Order Remarks

    • Enter Technical Point of Contact (POC) details (if required)

    Additional Email Recipients for Notifications

    • A new option, "Additional Email Recipients," is available for notification purposes.

    • To include additional recipients, enable the "Additional Email Recipients" checkbox and enter the corresponding email IDs.

    • Note:

    Additional email recipients will receive the following notifications:

    • Order Confirmation, Revocation, and Renewal Reminder Notifications (excluding specific verification-related notifications).

    • Order Successful / Tracking Link Email Notifications

    • CSR-Related Email Notifications

    • Certificate Download Email Notifications

    Updating Additional Email Recipients

    • Additional Email Recipients can be edited after the order has been generated via the Orders View Page.

    • For all future notifications, the updated recipients will receive relevant emails accordingly.

    • Click "Next" to proceed.

    Key Store

    To Key Profiles, Go to menu > Keys > Keys store, add Key Store File, Key Store Password

    Reporting Tags

    On this page, you can create and manage reporting tags that help categorize and filter certificates, orders, and other records. Use these tags to generate more specific reports and gain insights into particular aspects of your business. Example: If you're tracking certificates by department, you could create tags like "Finance," "HR," and "IT" to quickly filter and report on certificates that belong to these departments.

    Create a Reporting Tag

    Click on “+” button on the right-side top corner to create a New Tag.

    Enter the Tag Name and Tag Value.

    Click on Save button to complete the process.

    Mass Revocation Preparedness: eMudhra’s Perspective on Building Digital Trust

    Mozilla’s Root Store Policy v3.0 reinforces a crucial aspect of Certificate Authority operations: being prepared for mass certificate revocation. While such events are rare, the scale of potential disruption means that both CAs and relying parties need clear strategies for continuity. At emSign CA, operated by eMudhra, we see this as a chance not only to comply with requirements but to strengthen the trust fabric of the internet.

    Why This Matters

    Revocation events—whether triggered by a systemic vulnerability, mis-issuance, or key compromise—can invalidate thousands of certificates in a short span. If not managed effectively, this may cause service outages, broken user experiences, and diminished confidence in secure communications. Preparedness ensures that organizations remain resilient when digital trust is most at risk.

    Overview

    CERTInext platform provides seamless access to wide range of features designed to streamline certificate management and enhance digital security. Access CERTInext portal

    • Dashboard: Gain real-time insights through comprehensive dashboard, offering key statistics such as account status, pending domain and organization approvals, certificate status, and expiring certificates. The dashboard also provides detailed reports on bot performance, endpoint security, and key management statistics, all displayed through intuitive charts.

    • Certificates: Manage your SSL/TLS certificates, request new ones, and monitor expiration dates to ensure continuous protection.

    Alerts and Notifications

    Certificate Expiry Message

    Administrators can configure a certificate renewal message to be displayed for all certificate orders. Follow these steps:

    • Navigate to Settings > Account Configuration.

    • Enter the desired message under 'Account-wide certificate renewal message'.

    Renew Certificate

    The “Renew Certificate” button will be available 60 days before the certificate expiry.

    • To renew certificate, Navigate to the order, Certificates > Orders > View order page.

    • Click "Renew Certificate" button and the system will navigate to the New Request page to initiate the renewal process.

    Add / Remove SANs for Multi-Domain SSL

    • To initiate Add/remove SANs, Navigate to the order Certificates > Orders > View order page > Add/Remove SANs.

    • The downloaded certificates can have SANs added or removed by clicking the"Add / Remove SANs" button available under Order Quick Action as shown below.

    • Clicking "Add/Remove SANs" will display a modal with all the necessary information as shown below.

    ACME APIs

    User can manage or create new ACME API under this page.

    • To create a new ACME API, user need to click on "Add" button, a modal will be displayed.

    • Enter description, user, select the group for which you wanted to generate the key ID & Mac Key, select the product, add tags (optional), then click on "Generate EAB Credentials" button to proceed further

    Revoke an issued Certificate

    • To revoke an issued certificate, Navigate to the order, Certificates > Orders > View order page.

      • To revoke a downloaded certificate, click the "Revoke Certificate" button under Order Action.

      • On click of "Revoke Certificate" a modal will appears shown below.

    Products

    To create a new custom private product, go to Certificates> Products. By default, both public & private tabs will be displayed.

    • Private: Displays a list of default private PKI products along with private products created by the account user.

    • Public: Displays all the default emSign public products mapped to the account.

    Note: Account users won’t have a provision to add the new public product.

    Creating a New Private PKI Product

    Ordering using Custom Fields

    Purpose of Custom Fields:

    • This form allows you to specify or enter values for each active custom field available in your emSign account.

    • These custom fields will be displayed under the Additional Information section of the order form.

    Administrator-Enforced Fields:

    eMudhra emSign Click Tool

    • This tool is used to download the certificate in a soft Token (or) USB Token.

    • The eMudhra emSign Click Tool can be downloaded in this Page - This tool can be downloaded in Windows 7, Ubuntu, MAC operating systems.

    • Click the Download button provided or copy the link and paste it in the address bar to use the tool and generate the certificate as shown below.

    The tool gets downloaded in the system. Upon clicking the tool will be displayed in a modal.

    Statement (Ledger Statement)

    The Statement page provides a detailed view of your financial transactions within emSign, displaying credits, debits, and outstanding balances. This page helps you monitor your account’s financial health and keep track of all payments to ensure they are current.

    Users can view ledger statements for both main and sub-accounts, with a full display of credit, debit, and current balance. The page also allows-

    Search and Filter

    • Click on the Search button to access the Group Name filter.

    • Use this filter to display data specific to a particular group.

    Invoices

    The Invoices page provides a comprehensive list of all generated invoices for your certificate orders and services. From this page, you can download, review, and pay invoices, making it easy to track your organization's billing and payments.

    CERTInext support monthly generation of invoices for certificate services, tracking usage, and subscription charges over the course of the month. This feature is based on permission provided in emSign backoffice.

    Download Invoice

    Via the Certificates Section

    • Navigate to Certificates > Orders.

    Orders Report

    The Orders Report provides a comprehensive view of all order-related information across your account. To access the Orders Report, navigate to Reports > Orders Report.

    Upon selecting Orders Report, the page will display a detailed list of all orders, including data from your account as well as any associated sub-accounts. This report ensures that all order data is easily accessible for tracking and analysis.

    Filtering and Exporting Order Data

    Users can filter data by selecting the "Order ID" option to refine search results effectively.

    Overall Statistics

    Here we can see the Overall Statistics of the system

    Endpoints

    • Scanned Endpoints - No. of scanned Certificates scanned from Bot

    • Protected Endpoints- Number of Endpoints protected with a certificate

    • Unprotected Endpoints- Number of Endpoints not protected with a certificate

    CSR Templates

    This page is used to create and manage CSR (Certificate Signing Request) templates. Enter the required details like signature algorithms and key sizes and configure the subject DN details to simplify the CSR generation process for your organization.

    Create CSR Templates

    Step 1:

    • To create custom CSR template, unique Template name to be provided.

    • The Signature Algorithm, Key Algorithm, Key Size to be selected from the dropdown list.

    Step 2:

    eMudhra Certificate Utility Tool

    The eMudhra Certificate Utility Tool is designed to simplify certificate-related processes, such as generating CSRs (Certificate Signing Requests), importing, and exporting certificates in various formats.

    CSR Generation

    Download the eMudhra Certificate Utility Tool from this page by clicking the "Download" button or copying the link into your browser's address bar.

    After downloading, open the tool to access the CSR Generator section.

    Enter the required details:

    • Common Name

    EV requests by Authorized Signatory

    To streamline approval processes, the EV Request Approvals feature is accessible within the CERTInext platform under:

    Organizations > EV Request Approvals.

    This feature simplifies the approval workflow by allowing in-platform approvals, complementing email notifications. The Certificate Approver must be an authorized user within their enterprise account to access and approve EV certificate requests.

    • To View the SSL EV Certificate request, Organizations > EV Request Approvals. This helps to simplify approval processes with our new in-platform approval feature, complementing email notifications. To access this feature, Certificate Approver should be an account user within their enterprise account.

    • Certificate approver can use the “Order ID” filter to quickly locate specific EV certificate requests.

    Manage Schedules

    The Manage Schedules section provides a consolidated view of all scheduled, executed, and disabled tasks.

    Scheduled Tasks: All active schedules are displayed in the list.

    Executed Schedules:

    If a certificate schedule has been executed, the corresponding details are displayed in this section.

    Executed schedules cannot be disabled.

    Disabled Schedules:

    If a certificate has not been executed, the schedule can be disabled by the user.

    Create Schedule

    Users can create and execute schedules for managing certificates. Navigate to

    Organization Validation (OV) Process

    Unlike Domain Validated (DV) certificates, OV certificates require the certificate request to undergo organization verification process to confirm the identity and legitimacy of their organization.

    • Validation Process: Validation of the organization's identity, including legal registration and domain ownership.

    • Issuance Time: Longer issuance time compared to DV, but shorter than EV. Typically, issuance in Hours. For exceptional cases, issuance would take 1-5 Business days.

    Process Involved:

    Add Credits

    Add Credits

    emSign CERTInext offers two modes of payment to add credits: Online Payment & Offline Payment.

    To add credits to your account, navigate to Billing & Payments> Add Credits.

    Online Payment

    Upon selecting online Payment, the current account balance is displayed at the top.

    • Enter the Amount to be credited, then click the Pay button

    Audit Logs

    The Audit Logs page provides a detailed activity list, displaying information such as module activity, timestamps, and usernames for all account activities.

    By default, the last 10 audit logs are displayed for quick reference.

    Comprehensive activity tracking ensures accountability and transparency.

    If a UCC product is selected, enter the number of domains. The order value will be displayed based on the selected number of domains.

  • Click "Next" to proceed.

  • Upon acceptance, the Organization Verification Status will update to "Completed."

  • Issuing CA:
  • Subscriber ID:

  • Password:

  • Upload File:

  • Organization ID:
  • Container ID:

  • Certificate Validity:

  • Payment Type: Balance or Profile

  • By default, its Common Connector

  • Designation
  • Certificate Download Delegation:

  • If another individual needs to download the certificate, enable the "Certificate Download Delegation" option.

  • Provide the delegate’s Name and Email ID. A certificate download PIN will be sent to the delegate’s email address.

  • Click "Proceed" to continue.

  • Customer Actions Pending Reminder Notifications

  • Certificate Renewal Reminder Notifications

  • Order Discrepancy Email Notifications

  • Certificate Revocation Email Notifications

  • Reissue Email Notifications

  • Retry CAA Email Notification

  • eMudhra’s Readiness Framework

    Our approach to revocation preparedness rests on three pillars:

    1. Structured Playbooks

      • We maintain documented and periodically tested procedures to manage revocation scenarios at scale.

      • These internal drills allow our teams to validate workflows and identify gaps well before real incidents occur.

    2. Communication First

      • In any high-impact event, we believe clarity reduces panic.

      • Subscribers are engaged through multiple communication channels—from direct outreach to status updates—so they are aware of the issue and guided on the immediate steps to take.

      • This proactive communication is as important as the technical response, because it ensures continuity of business decisions.

    3. Commitment to Trust Continuity

      • Our guiding principle is minimal disruption.

      • By blending manual oversight with automated recovery mechanisms, we aim to keep the replacement of certificates as seamless as possible.

      • We are committed to continual improvement—working with auditors, browser root programs, and our customers to refine practices as the ecosystem evolves.

    Role of Automation & CLM

    To minimize downtime, automation is critical:

    • ACME protocols help organizations re-issue and redeploy certificates quickly and consistently.

    • CertiNext, our Certificate Lifecycle Management platform, provides enterprise-grade visibility and orchestration—helping customers automate discovery, renewal, and replacement across distributed environments.

    • With such automation, the impact of even a large-scale revocation can be reduced from days of manual intervention to streamlined, predictable steps.

    Building Redundancy

    Preparedness also means building for resilience:

    • Subscribers are encouraged to maintain secondary issuance paths or backup certificates.

    • Our systems support staging replacements so that transitions can be executed with minimal interruption.

    • Internally, we run simulation drills that test not only our infrastructure but also our support teams’ ability to assist customers during peak demand.

    Closing Note

    At eMudhra, we see mass revocation preparedness as more than a compliance checkbox. It is about readiness, transparency, and commitment to trust continuity. By aligning with Mozilla’s MRSP v3.0, adopting automation, and fostering open communication with our community, emSign CA remains focused on ensuring that even in rare large-scale revocation scenarios, our customers and their users experience as little disruption as possible.

    All custom fields shown on the order form are configured by the account administrator through the Custom Fields Settings.
  • Only the mandatory fields are required to complete the order.

  • Note:

    • The value entered for the same custom field can vary from order to order based on the specific requirements of each request.

    • Custom Fields are not included as part of the Subject or SAN (Subject Alternative Name) attributes in the certificate.

    Editing Custom Fields

    • Custom Fields can be modified after the order has been generated.

    • Navigate to the Orders View Page to edit the fields, as shown below.

    In Subject DN details, select the desired field to be added to the CSR. If any new field to be added other than the ones displayed administrators can click on "(+)" button to add new custom field.

    Step 3:

    • Subject Alternative Name can be selected by selecting the checkbox and click on Save button.

    Step 4:

    • After CSR template is created, it is listed with status as Active.

    Edit CSR templates

    • Under Actions tab, click on the Edit Template icon, the page will be redirected to Update CSR Template page.

    • Edit the fields and click on Update button. The changes made will be updated successfully.

    Clone CSR templates

    • Under Actions tab, click on the Clone Template icon, the page will be redirected to Clone CSR Template page.

    • Enter the new Unique name and click on Clone button. The template will be cloned successfully.

    Disable CSR templates

    • Under Actions tab, click on the Disable Template icon, confirmation popup is opened.

    • Click on Yes button, the template will be disabled successfully.

    Delete CSR templates

    • Under Actions tab, click on the Delete Template icon, confirmation popup is opened.

    • Click on Yes button, the template will be deleted successfully.

    Domain Control Validation (DCV): Domain Control Validation can be done online and it's an customer friendly automated process.

  • Organization Validation (OV): Organization Vetting process includes,

    1. Organization Identity & Address verification,

    2. Doing Business As / Tradename verification (if 'O' value provided is a Tradename) &

    3. Authenticity of certificate request verification through Organization Authentication Code submission. emSign delivers the code using reliable method of communication (email / telephone). Requester will receive a link to submit the code to prove the authenticity of the certificate request.

  • Certificate Signing Request (CSR): As part of SSL OV process, CSR has to be submitted to emSign.

  • Automate Renewal: Configure cron jobs or systemd timers (e.g., certbot renew) to check and renew certificates automatically.
  • Deploy Certificates: Use CERTInext’s integration with Apache, Nginx, or cloud services like AWS Certificate Manager to deploy certificates.

  • https://acme.emsign.com/v1/directory

    Discover Certificates: Locate and review all certificates across your infrastructure, irrespective of the issuing authority.

  • Orders: Track and manage your certificate orders.

  • Products: Create and manage product categories for streamlined certificate issuance.

  • Organizations: Pre-verify organizations to enable faster certificate issuance without the need for repeated validations.

  • Domains: Pre-verify domains to expedite certificate issuance.

  • Certificate Authorities: Manage trusted CAs and configure policies for certificate issuance.

  • CSR Templates: Create and manage Certificate Signing Request (CSR) templates for consistent application.

  • Configuration Templates: Create and maintain certificate configuration templates for operation efficiency.

  • Bots: Configure and manage automated Bots for certificate discovery and monitoring ensuring visibility across networks.

  • Keys: Manage the entire lifecycle of cryptographic keys, including generation, storage, and profiling.

    • Manage Keys: Store and organize cryptographic keys systematically.

    • Key Profiles: Define and apply key profiles for consistent cryptographic operations.

    • Key Store: Securely store and manage cryptographic keys.

  • APIs: Access and configure API integrations with the platform.

    • REST APIs: Generate API keys for efficient certificate management.

    • ACME APIs: Automate SSL/TLS certificate issuance through ACME protocols.

  • Billing & Payments: Manage your account credits, payments, and invoices.

    • Add Credits: Recharge account credits through online or offline payment modes.

    • Invoices: View, manage and download invoices related to your purchases.

    • Statement: Access detailed financial statements to monitor account activity.

    • Product Price List: Review and manage product pricing to align with business needs.

  • Reports: Access various reports related to orders, certificates, and usage.

    • Orders Report: Generate detailed reports on certificate orders.

    • Overall Statistics: Access a platform wide summary of critical metrics and statistics.

    • Certificates Report: Monitor the status and details of all certificates managed on the platform.

    • Key Store Report: Analyze Key storage data and the status of your key stores.

    • Key Report: Track key usage, rotation status and operational health.

    • Sales Summary: Review sales data to monitor performance.

    • Audit Logs: Maintain audit trails of platform activities to ensure compliance and transparency.

  • Settings: Configure platform settings, user access, and security rules.

    • Account Configuration: Manage account settings, authentication options and account configurations.

    • Custom Fields: Add or modify custom fields to capture additional data for certificates, organizations and so on.

    • IP Restrictions: Enforce IP restriction to enhance security by limiting platform access.

    • Users: Control user roles and permissions across the organization.

    • Groups: Create and manage user groups with roles such as Administrator, Manager/s and Basic User.

    • Manage Schedules: Set up automated task schedules for certificate issuance, renewal and monitoring.

    • Reporting Tags: Create reporting tags to facilitate better filtering and data analysis.

  • CA Connectors: Integrate seamlessly with multiple CA services for managing private or public SSL/TLS certificates.

  • Tools: Access a suite of tools and utilities available to enhance workflows and optimize operations.

  • here

    For downloading the certificate through emSign Click, you will need to ensure that the URLs you provided are trusted and accessible through your network or firewall. The URLs are:

    • https://api-secure.emsign.com/

    • https://api.hub.emsign.com/

    Depending on your network setup (e.g., firewall, security gateway), you will need to add the URLs to the whitelist.

    Note: The above changes need to be done only if the download to be done in Organization’s system if there are firewall/security restrictions.

    For personal PCs no changes are required.

    In this section

    • Procedure for installing Certificate in HSM

    • Procedure for Attested CSR Generation

    Consent Management

    Consent management refers to the process of obtaining, recording, and managing user consent for data collection, processing, and sharing activities. It's especially relevant in the context of privacy regulations like the GDPR (General Data Protection Regulation) in the EU, CCPA (California Consumer Privacy Act) in California, and similar laws in other regions.

    Scan URL: Scanning URLs involves analyzing a website's pages to detect and assess its data collection practices. This helps identify cookies, trackers, and other methods of collecting personal information.

    Create Cookies with Category and Type: When setting up cookies on a website, classify them into categories based on their function.

    Create and Manage Consent Banners: Consent banners are pop-ups or notifications displayed on websites to inform users about data collection practices and ask for their consent. Users can provide options to accept or manage cookie preferences and also have the option to reject cookies or customize their choices. Consent banners can be customizable to suit different regions and laws.

    DSAR (Data Subject Access Request): A Data Subject Access Request (DSAR) is a formal request made by an individual (the "data subject") under privacy laws like the GDPR (General Data Protection Regulation) or CCPA (California Consumer Privacy Act), allowing them to request information about the personal data an organization holds on them. This is part of an individual’s right to transparency and control over their personal data.

    Once configured, this message will appear on all order view pages under
    Certificates > Orders.

    This feature ensures clear communication regarding certificate renewals across the account.

    Additional Certificate Expiry Notifications

    Administrators can configure additional email addresses for certificate renewal and expiry notifications. Follow these steps:

    • Navigate to Settings > Account Configuration.

    • Enable the checkbox for 'Account-wide certificate renewal email addresses'.

    • Enter the recipient email addresses that should receive renewal or expiry notifications for emSign certificate orders created within the account.

    This ensures that renewal notifications reach all relevant stakeholders, maintaining effective communication and timely action.

    Configure Certificate Renewal Email Notifications Frequency

    Administrators can set up customized notification frequencies for certificate renewals and expirations. Follow these steps:

    • Navigate to Settings > Account Configuration.

    • Enable the checkbox for 'Certificate Renewal Notification Frequency'.

    • Select the desired reminder intervals (e.g., 90 days before expiry, etc.) to enhance the customer experience.

    • Administrators can specify reminder dates both before and after expiry. This feature supports notifications for SSL/TLS and other certificate types.

    By configuring this setting, administrators ensure timely notifications for certificate renewals, improving operational efficiency and avoiding service interruptions.

    SSL Technical POC Email Notifications

    Administrators can manage email notifications for technical points of contact (POC). Follow these steps:

    • Navigate to Settings > Account Configuration.

    The option 'Copy Technical Point of Contact in SSL Order Email Notifications' is enabled by default. This ensures that the technical POC receives notifications such as:

    • Order confirmation

    • CSR-related updates

    • Certificate download links after SSL order generation

    The account administrator can uncheck this option if notifications to the technical POC are not required.

    This configuration ensures efficient communication for SSL order updates, tailored to organizational needs.

    Low Balance Alerts

    Administrators can configure low account balance alerts to ensure timely notifications when the account balance reaches a specified threshold.

    Steps to Configure:

    • Navigate to Settings > Account Configuration.

    • Enable or disable the checkbox for 'Send Low Account Balance Alerts' based on your requirements.

    • Upon enabling, two additional fields will appear:

      • Notification Email IDs: Enter the email addresses to receive low balance alerts.

      • Threshold Amount: Specify the threshold amount that will trigger the low balance alert.

    • Once configured, an email will be sent to the specified recipients when the account balance reaches or exceeds the threshold.

    This feature helps maintain account continuity by providing proactive alerts for low credit levels.

    Certificate Renewal Notifications to Group Email Addresses

    Administrators can configure and manage certificate renewal notifications for group email IDs to ensure timely communication.

    Navigate to the Notifications section.

    • Enable the 'Configure certificate renewal email addresses' checkbox to add group email IDs (e.g., Cost Center, Business Unit, Project, etc.).

    • If account-wide certificate renewal email addresses are already configured (via Settings > Account Configuration > Configure Account-wide Certificate Renewal Email Addresses), they will be pre-filled but can be modified for the specific group.

    Note: The entered email addresses will receive renewal and expiry notifications for emSign certificate orders associated with the respective group.

    Edit Certificate renewal email addresses

    • Certificate renewal email addresses can be edited after group creation.

    • On click of "Edit" button, Administrator users can add/remove the certificate renewal information.

    This feature ensures that relevant stakeholders are promptly notified about certificate renewals, facilitating seamless operations.

    • To add (or) remove the SANs, the account user must select a reason from the pre-defined options.

    Add / Remove SANs

    • This allows the account user to add (or) remove the SANs. Please note that no refunds will be issued for removal of SANs.

    For any additional SANs, a “Calculate Price” field will be displayed. Upon clicking this button, "Payment Information" section will appear.

    Clicking the "Request reissue" button will generate a reissuance order ID, All the re-issued certificates can be tracked as shown below.

    This option is applicable only for UCC & Multi-domain products

    What's Next?

    Certificate requester / Organization representative will be notified with

    1. An order confirmation email.

    2. All order related communications.

    3. Required actions specific to the product

    Upon submitting the request, a key ID & Mac Key will be generated by the system as shown below w.r.t to the selected group.
    • Enter the Revocation Remarks and select the Revocation Reason from the dropdown list and click the "Submit" button to complete the revocation process.

    Click the "Create product (+)" button located on the right below screen.

    Enter product details

    • Product Name: Provide a unique name for the product.

    • Validity: Define the product validity period.

    • Select Subordinate CA: Choose from the list of available end-entity private CAs.

    • Certificate Profile: By default, the custom type will be displayed.

    • Certificate Template:

      • Choose from one of the following templates:

        • Client TLS

        • Mutual TLS

        • Server TLS

    Depending on the selected template, a predefined setup profile will appear.

    Configure Certificate Details

    • Subject Attributes: Provide the necessary subject attributes.

    • Subject Alternative Name (SAN) Attributes: Add relevant SAN attributes.

    • CA Extensions: Mark the required CA extensions for the certificate.

    Advanced Settings

    Automatically Approve the Certificates

    • Enabled No administrator intervention is required for order approval as it will be fully automated. Upon placing the order, the system will generate an Order ID automatically.

    • Disabled: Administrator approval is required before the order is processed.

    • Specify Validation Checklist: The validation checklist configured here will appear under New Request > Order Summary & Payment section for administrator review. Additionally, the account user can specify the conditions & presence to tailor the checklist for order approval.

    • Once all product details are filled, click the "Create" button to proceed.

    Important Notes:

    Dynamic vs Fixed fields:

    • Dynamic field restriction: Values for Subject Attributes and Subject Alternative Name (SAN) Attributes can be provided later at the New Request level.

    • Fixed Field restriction: Values must be defined during product creation and will remain consistent across all orders using this product.

    What's Next?

    Once the product is successfully created, it will become available under New Request> Products. Users can select this product to place orders.

    Export to Excel

    • Click on the Excel button at the top-right corner of the page.

    • Based on your selected search criteria, the ledger statement will be downloaded in Excel format.

    Open the View Order page for the specific order.
  • Click on Download Invoice to download a copy with all payment details.

  • Via Billing & Payments Section

    • Navigate to Billing & Payments.

    • Under Action, click on the Download icon next to the desired invoice.

    • The invoice will then be downloaded to your system.

    Download Credit Note

    • To download any credit note, go to Certificates > Orders > View order page.

    • This order action will be displayed when the Order status is cancelled (or) Rejected.

    • On click of "Download Credit Note" a credit note will be downloaded with all the payment information.

    Exporting Data to Excel:

    By clicking the "Excel" option available in the top-right corner of the page, users can export order data in Excel format. The Advanced Search feature further enhances flexibility, allowing users to apply custom fields to generate and export precise results.

    Custom Fields Report

    • If custom fields are enabled for your account, all relevant custom field data and associated field values linked to specific orders will automatically be included in the exported Excel file.

    • This automated process enables enterprises to efficiently utilize data for various purposes, such as inventory management, detailed data analysis, and monitoring key performance indicators (KPIs) related to orders and sales.

    • Additionally, custom order field data serves as a robust audit trail, offering transactional evidence and ensuring compliance with internal policies and operational procedures.

    Keys

    • No. of Keys - Total No. of keys created in an Account

    • No. of Symmetric Keys - Total number of Symmetric Keys created in the Account

    • No. of Asymmetric Keys- Total number of Asymmetric Keys created in the account

    • No. of Keys Used - Total number of keys used for creating Provisioning template

    • No. of Keys Rotated -Total number of Keys Rotated in Manage keys

    Templates/ Profiles

    • CSR Templates - Total number of CSR Templates created in the Account

    • Provisioning Templates - Total number Of Provisioning Templates created in the Account

    • Key Profiles - Total number Of Key Profiles created in the Account

    • Email Templates- Total number of email templates created in the account

    Others

    • No. of CSR's - After Every Certificates Rotate, CSR count get increased

    • No. of Keystore's - After Every Certificates Rotate, Keystores count get increased

    Certificates

    • Discovered - Total number of Certificates displayed by default after bot run

    • Configured - Total number of Certificates configured

    • Not configured - Total number of Certificates which are not configured

    • Initiated - Total No. of Certificates which are initiated in Grid[M21]

    • Issued - Total No. of Certificates which are issued

    • Deployed - Total No. of Certificates deployed in Automatic deployment

    • Revoked - Total No. of Certificates Revoked

    • Rotated - Total No. of Certificates Rotated to issue a certificate

    • Re-keyed- Total No. of Certificates Re-keyed to Reissue a certificate

    • Suspended - Total No. of Certificates which are on hold

    • Vulnerable – If Vulnerability is failed, that count should update.

    Country

  • Algorithm

  • Click the "Generate CSR" button.

    Save the generated CSR locally or copy it for use where required.

    Import & Export Certificate

    The tool includes an Import & Export feature to convert certificates into various formats like .pfx, .jks, or .pem. It also allows exporting private keys as .key files when exporting .pfx certificates.

    Importing Certificates

    Click "Import Certificate" to get started.

    Select the certificate using one of the following options:

    • Option 1: Import only the end-entity certificate (e.g., .cer issued by emSign).

    • Option 2: Import the complete certificate chain (e.g., .zip received from emSign).

    Once the certificate is imported, view details such as:

    • Common Name (e.g., emsign.com)

    • Certificate Serial Number

    • Thumbprint Value

    Exporting Certificates

    Choose the desired export format:

    • Option 1: .pfx

    • Option 2: .pem

    • Option 3: .jks

    If exporting as .pfx, set a PFX password for future use.

    Click "Export" to save the certificate.

    Upon successful export, the following files will be available:

    • .pfx File

    • .key File (Private Key)

    Approving or Rejecting an SSL EV Certificate Request

    Accessing the Request Details:

    Click on the relevant "Order ID" link to open a detailed modal displaying:

    1. Certificate Approver Information

    2. Order Details

    3. Organization Information

    Approval Actions:

    Approve:

    1. Click the "Approve" button to complete the certificate approval.

    2. The status will update to "Yes" to indicate that consent has been granted.

    Reject:

    1. Click the "Reject" button to finalize the rejection process.

    2. The status will update to "No" to indicate that consent has not been granted.

    Settings> Manage Schedules
    and click on the “+” button on the top right corner.
    • Name: Enter a unique name for the schedule.

    • Category: Select the appropriate category from the dropdown menu (e.g., Initiate, Order, Rotate, Renewal, or Recheck).

    • Date: Use the date picker to select the date for which the schedule applies.

    • Time: Choose the desired time from the dropdown menu to execute the schedule.

    • Select and Search Certificate: Choose the certificate that corresponds to the selected category.

    • Save: Click the "Save" button to save the schedule details.

    This feature ensures streamlined certificate management by automating tasks based on defined schedules.

    The system will redirect to the payment gateway. Enter your card details to proceed with the payment.

    To verify the payment status, enter the Payment ID under the "Recheck Payment Status" section and click the Recheck button.

    Offline Payment

    • On selecting offline Payment, the current account balance is displayed at the top.

    • Enter the offline credits payment details and click the "Make Payment" button.

    • Once the "Submit Offline Payment" button is clicked, a thank you message will displayed on the screen. Upon eMudhra finance approval, the amount will be credited into the account.

    Credits Withdrawal

    The user can withdraw the credits in the account anytime by raising a withdraw request and credited to the user bank account upon approval in the emSign Backoffice.

    To Submit Withdraw Credits request, go to Add Credits > Click on Submit Withdraw Credits hyperlink.

    User can enter the desired amount to be withdrawn and submit the request.

    The request is now sent to the emSign backoffice, where the request is approved and processed further.

    Note: To submit withdraw credits request, the bank account details must be provided before raising the request.

    Partner Sign up

    Partner Accounts

    Ideal for: SSL providers, web hosting companies, cloud service providers, and other resellers of digital certificates.

    Partner accounts offer comprehensive access to the CERTInext portal, enabling resellers to efficiently manage their operations and sub-accounts. Key features include:

    • Group Management: Add, manage, edit, and allocate funds to groups.

    • User Management: Add, manage, invite, and approve users and user invitations.

    • Organization & Domain Management: Manage organizations, domain settings, and pre-approve pending orders from sub-accounts.

    • Sub-Account Management: Create and manage sub-accounts, set customized price lists for sub-accounts, and monitor activities.

    • Certificate Management: Issue, renew, and manage public and private certificates; monitor expiring certificates; and generate API keys for REST and ACME integrations.

    • Finance and Billing: Allocate funds, manage account finances, and access audit logs.

    • Product Customization: Develop customized products and create public/private CAs for tailored certificate solutions.

    • Tools & Reports: Access detailed reports, tools, and notifications regarding groups and self-orders for enhanced operational efficiency.

    • Notifications: Receive alerts on pending self-orders and other group-related activities.

    • Profile and Billing Management: Update profile information, manage billing details, and access account settings.

    Navigating to the Sign-Up Page: Open the URL and click on button

    Upon clicking the "Sign Up" link on the home screen, users will be redirected to the "Sign up as a Partner" page.

    Entering User Information:

    The user must provide the following details:

    • Your Name

    • Your Email ID

    • Mobile Number

    • Organization Name

    Accepting Terms and Conditions:

    • Users must accept the terms and conditions by selecting the checkbox.

    • Click the "Sign Up" button to proceed.

    Account Approval Process:

    • After submitting the sign-up form, the partner account will undergo an approval process by emSign.

    Account Confirmation Notification:

    • Upon submission, an account confirmation email will be sent to the user, containing relevant information about the registration and next steps.

    Account Activation Process:

    • Once the reseller account is approved, an account activation email will be sent to the registered email ID.

    Activating the Account:

    • Users must click the activation link in the email to access the "Activate Your Account" page.

    Setting a Password:

    • On the "Activate Your Account" page, users will be prompted to create a password according to the provided instructions.

    Password Generation and Update:

    • After entering the password, click the "Generate Password" button to finalize the process.

    • The password will be updated, and the partner account will be activated and ready for use.

    Procedure for installing Certificate in HSM

    Procedure for installing Certificate in HSM

    • This tool is used to download the certificate in a soft Token (or) USB Token.

    • The eMudhra emSign Click Tool can be downloaded in this Page.

    • This tool can be downloaded in Windows 7, Ubuntu, MAC operating systems.

    • Click the Download button provided or copy the link and paste it in the address bar to use the tool and generate the certificate as shown below.

    • The tool gets downloaded in the system. Upon clicking the tool will be displayed in a modal.

    Step: 1 (Open emSign Click Tool)

    Step: 2 (Please enter "Order ID" and its associated "Download PIN". Click on "Confirm") Note: Once the certificate is ready for download, Download PIN will be shared to the respective certificate requester's Email ID.

    Step: 3 (Certificate Requester will be redirected to "Download" tab as shown below) For an example, Select "Utimaco HSMs" from the dropdown list of Cryptographic Service Provider

    Step: 4 (On click of "Agree & Download", system will prompt to provide "Library Path", "Slot ID" and "Normal User Pin" associated with the selected HSM provider for certificate download.)

    Step: 5 (Login to your HSM service provider. In your HSM provider application, Slot management / Configuration setup should be made as shown below.)

    Step: 6 (Initiate HSM services as shown below.)

    Step: 7 (Once the HSM services are successfully initialized, detailed information (Status, etc.) can be viewed as shown below.)

    Step: 8 (Certificate will be downloaded successfully as shown below.)

    Step: 9 (Certificate installed successfully in HSM )

    Key Profiles

    Key profiles refer to the specifications and attributes associated with cryptographic keys used in SSL/TLS certificates. They help determine how keys are generated, managed, and utilized in various security protocols.

    To create Key Profiles, Navigate to Keys > Key Profiles

    Create a key profile

    To create a new Key profile, click on "+" icon. Screen will navigate to the create key profile screen as shown below.

    Users can create key profiles for HSM or PKCS12

    Create a HSM Key Profile

    To create a Key profile for HSM, enter the following details

    • Profile Name

    • Select Profile Type as HSM from the dropdown

    • HSM Configuration Type

    • HSM configuration by importing file

    Click on Save button to complete the process.

    Create a PCKS12 Key profile

    To create a PKCS12 Key profile, enter the following details

    • Profile Name

    • Profile Type- Select PKCS 12 from the drop down

    • Select Configuration-

      • Select Import to load PKCS 12 configuration from an existing file

    Click Save to generate the Key profile

    Disable a key profile

    To disable a Key Profile, Navigate to Keys > Key Profiles

    All the active Key Profiles will be displayed, and the User can Disable the key Profile from the Action buttons

    A pop-up is displayed asking the User to confirm

    Edit the HSM password in key profiles

    To edit HSM password on an existing Key profile, Navigate to Keys> Manage Keys

    Click on Edit from the action buttons which displays a modal allowing users to edit the password.

    Orders

    Users can view or edit existing requests on the Orders page. By default, the last 10 request/orders are displayed, as shown below.

    By clicking 'Advanced Search,' the account user can further filter requests using criteria such as:

    • Date Range

    • Domain Name

    Domains

    The Domains Management section is designed to provide a centralized platform for managing all domains, monitoring their status, and handling Domain Control Validation (DCV) processes to ensure streamlined and secure domain verification.

    Benefits of Domains Management

    Enhanced Control and Visibility:

    • Enhanced Control and Visibility:

    Organizations

    Organizations Management Overview

    The Organizations Management section serves as the central hub for monitoring, managing, and maintaining information related to all organizations created within the system. It not only lists organizations with their statuses but also provides tools to update information, track key representatives, and manage approval workflows such as Extended Validation (EV) requests.

    This section ensures seamless governance by enabling administrators to keep organization records accurate and updated, making it easier to oversee operations and compliance.

    Features and Functionalities of Organizations Management

    Comprehensive Organization Listing

    Root Store Listings

    A root store is a repository of trusted root certificates used by operating systems, browsers, and other software applications to verify the authenticity of digital certificates. When a Certificate Authority (CA) is included in these root stores, any certificate they issue will be trusted by default on devices and browsers that use those stores. This is a cornerstone of Public Key Infrastructure (PKI), as it ensures that users and organizations can confidently navigate the internet, knowing that their digital connections and documents are backed by verified credentials.

    As a global CA, emSign maintains its presence in multiple widely used root stores, ensuring that digital certificates issued by emSign are recognized and trusted by billions of devices worldwide. Below is an overview of emSign’s current root store inclusions and the significance of each program.

    Major Root Store Programs

    1. Microsoft Trusted Root Program

    Enterprise Sign up

    Enterprise Accounts

    Ideal for: Large organizations and enterprises managing their own certificate infrastructure.

    Enterprise accounts provide many of the same capabilities as reseller accounts, with a few limitations to align with internal enterprise needs. Key features include:

    • Full Portal Access: Manage certificates, users, domains, and organizations directly through the portal.

    • Group and Fund Management: Create, edit, and manage groups, and allocate funds to streamline operations.

    Provisioning Templates

    This page is used to create configuration templates for certificates. These templates define the necessary attributes and settings for certificate generation, such as the CSR template, key pair types, and deployment methods.

    Create provisioning templates

    Step 1:

    • In Certificate Information tab, enter the unique Template Name.

    • Select the Origin of the Certificate configuration from the dropdown menu.

    Extended Validation (EV) Process

    Unlike Domain Validated (DV) & Organization Validated (OV) certificates, EV certificates requires a more extensive validation process than that of Domain Validation and Organization Validation SSL certificates to confirm the identity and legitimacy of the organization that owns and operates the website

    • Validation Process: Rigorous validation process including legal identity, physical presence, operational existence, and domain ownership verification.

    • Issuance Time: Longer issuance time due to the rigorous validation process. Typically, issuance would take 1-5 Business days.

    Process Involved:

    Select the CSR template from the dropdown menu. If CSR template is not created, click here to view on how to create a custom CSR template.
  • By default, the Default Template is set as Yes.

  • Step 2:

    · Select the Key Pair Type. If New is selected, new key is generated.

    · If Key Pair Type is selected as Existing, previously created keys are listed for user to select.

    · If Key Store Password Type is selected as Random, a random system generated password is created which can be viewed later. If Manual is selected, the user can provide any desired password.

    · In CA Type tab, select the CA and CA Connector name and click on Save button.

    Step 3:

    · Select the CA from the dropdown menu.

    · Select the CA Connector Name from the dropdown menu and click on Save button.

    Step 4:

    · After Provisioning template is created, it is listed with status as Active.

    Edit provisioning templates

    · Under Actions tab, click on the Edit Template icon, the page will be redirected to Update Provisioning Template page.

    · Edit the fields and click on Update button. The changes made will be updated successfully.

    Clone provisioning templates

    · Under Actions tab, click on the Clone Template icon, the page will be redirected to Clone Provisioning Template page.

    · Enter the new Unique name and click on Save button. The template will be cloned successfully.

    Disable provisioning templates

    · Under Actions tab, click on the Disable Template icon, confirmation popup is opened.

    · Click on Yes button, the template will be disabled successfully.

    Delete provisioning templates

    · Under Actions tab, click on the Delete Template icon, confirmation popup is opened.

    · Click on Yes button, the template will be deleted successfully.

    Domain Control Validation (DCV): Domain Control Validation can be done online and it's an customer friendly automated process.

  • Extended Organization Validation (OV): Extended Organization Vetting process includes,

    1. Organization Identity & Address verification,

    2. Doing Business As / Tradename verification (if 'O' value provided is a Tradename),

    3. Authenticity of certificate request verification through online email link acceptance by Certificate Requester,

    4. Verified Method of Communication - emSign delivers the code using reliable method of communication (email / telephone). Requester will receive a link to submit the code to prove the authenticity of the certificate request.

    5. Physical existence / Place of Business Verification,

    6. Operational existence,

    7. Contract Signer Verification,

    8. Certificate Approver Verification,

    9. Signer's authority to sign the Subscriber Agreement &

    10. Approver's authority to approve EV certificate request .

  • Online Consent Acceptance by Certificate Requester: As part of SSL EV process, Requester Consent link will be sent to Certificate Requester's email address.

  • Online Subscriber Agreement Acceptance by an authorized Contract Signer: As part of SSL EV process, Subscriber Agreement link will be sent to an authorized Contract Signer's email address.

  • Online EV Request Approval by an authorized Certificate Approver: As part of SSL EV process, EV Request Approval link will be sent to an authorized Certificate Approver's email address.

  • Certificate Signing Request (CSR): As part of SSL EV process, CSR has to be submitted to Certifying Authority (emSign).

  • Organization Type

  • Country (Select from the dropdown menu)

  • https://www.hub.emsign.com
    “Sign Up”
  • Email Protection

  • Select Create to choose

  • Key Algorithm

  • Key Store Type

  • Keystore Password

  • Multifactor Authentication and Single Sign On

    Multifactor Authentication and Single Sign On

    Role-based access control

    The emSign CERTInext platform offers six roles, each designed to address specific responsibilities and access requirements within the system:

    • Administrator

    • Manager

    • Finance Manager

    • Standard User

    • Basic User

    • Discovery User

    Administrator

    The Administrator role provides full access to the platform, enabling comprehensive management of users, groups, organizations, and financial operations. This role is intended for system overseers responsible for administrative and operational tasks.

    Key Access Controls

    Full portal access, including the Dashboard.

    Manage:

    • Certificates (requests, orders, expiring certificates).

    • Organizations, domains, groups, and users.

    • Private and public Certificate Authorities (CAs) and products.

    • Sub-accounts and price lists for sub-accounts.

    Access to:

    • REST and ACME APIs.

    • Financial features.

    • Audit logs and tools.

    • Reports and account settings.

    Create user invitations and assign roles.

    Manager

    The Manager role focuses on overseeing groups, users, and orders while managing sub-accounts and associated group features. This role excludes full administrative and financial permissions.

    Key Access Controls

    Dashboard access (billing alerts, low credit alerts, and self-orders tracking).

    Manage:

    • Organizations and domains.

    • Groups (including credit allocation) and users.

    • Private and public CAs and products.

    • Sub-accounts and price lists for sub-accounts.

    Access to:

    • REST and ACME APIs.

    • Financial features.

    • Audit logs, reports, and tools.

    Finance Manager

    The Finance Manager role is tailored for managing financial operations, such as fund allocation, price lists, and finance-related features, without broader administrative control.

    Key Access Controls

    Dashboard access (billing alerts and self-orders tracking).

    Manage:

    • Groups (credit allocation) and users.

    • Sub-accounts and price lists for sub-accounts.

    • Private and public CAs and products.

    Access to:

    • REST and ACME APIs.

    • Financial features.

    • Audit logs, reports, and tools.

    Standard User

    The Standard User role allows for requesting certificates and accessing group orders. It includes broader access than the Basic User but lacks administrative permissions.

    Key Access Controls

    Dashboard access (billing alerts and self-orders tracking).

    Manage:

    • Private and public CAs.

    Access to:

    • REST and ACME APIs.

    • Reports, tools, and profile settings.

    Basic User

    The Basic User role provides minimal permissions, focusing on personal tasks such as requesting certificates and managing profile information.

    Key Access Controls

    Dashboard access (billing alerts and self-orders tracking).

    Access to:

    • REST and ACME APIs.

    • Reports, tools, and profile settings.

    Discovery User

    The Discovery User role is dedicated to users responsible for certificate discovery operations. This includes tasks such as key management, key store handling, and accessing discovery-related features.

    Sub Account User

    Sub Account User role is dedicated only to the Partners. Partner can create a user role as Sub Account User and assign them to a group.

    Custom Roles

    To create a Custom Role, go to Settings > Users> Custom Roles

    The Custom Roles module offers administrators the ability to create highly customized user roles with detailed permission controls.

    Key Features:

    • Administrators can create user roles instead of using generic roles, they can design roles based on tasks, departments, or job functions.

    • Granular Permission Control: administrators to define permissions at a very granular level. This includes controlling who can access particular features, data, and actions within the CERTInext platform.

    • User Mapping: Administrators can assign users to the roles they create, mapping specific users to the appropriate role with the corresponding permissions.

    Organization Name

  • Product

  • Other available details

  • Approve Sub Account Certificate Request

    Navigate to the Certificates > Orders. Open the order with the status "Order pending for parent approval".

    • Click the "View" button on the orders page to verify all relevant information related to the certificate orders

    • After verifying the details, click the “Approve” button.

    • Upon clicking "Approve", the system will navigate to New Request > Order Summary & Payment Page.

    • Click "Pay now" to complete the payment. The will be deducted from the main user account balance within the default group.

    • Once payment is completed, the system will redirect to the orders page displaying all the necessary information and its associated Order.

    What's Next?

    Upon successful order placement, the certificate requester / Organization representative will receive an Order Confirmation email.

    The email will include a link to the Track Orders page, where users can monitor the certificate verification process.

    Save as Draft Request

    • Upon clicking the "Save" button on the Order Summary & Payment page, the request will appear on, the Orders page with the status "On Hold".

    • If the status is "On Hold", it can either be processed /rejected from Oorders view page as shown below.

    • Rejecting the Request: Click the "Reject" button and enter the reason for rejection in the provided field and click “Reject” to finalize the action.

    Payment:

    • Click the "Proceed to Pay" button to navigate back to the Order Summary & Payment Page. The account user, must click "Pay now" button to submit the request and generate the Order ID.

    • Once the payment is successful, the system redirects to the Orders Page, displaying all relevant order details.

    • The associated Order Actions and Quick Actions will also be available for further processing as shown below.

    Order Status  and Corresponding situations

    Order pending for parent approval & On Hold

    Explained above as part of approve sub account certificate request & On Hold status.

    Order Accepted

    • This status will be displayed once the order is placed by an account user.

    Order in progress

    • This status will be displayed when the order is in progress (i.e., Any of the action completed either from customer (or) eMudhra.

    Order Fulfilled

    • This status will be once the certificate request is approved by eMudhra.

    Order Cancelled

    • This status will be displayed when an account user cancels the certificate request.

    Order Rejected

    • This status will be displayed when customer rejects the certificate request.

    Sharing Order Status

    • Navigate to: Certificates> Orders> View Order page and Click on "Track Order" to open a modal, as shown below.

    Ways to track the order:

    You can track the order status using either of the following options:

    • Open URL: Click "Open URL" to open the track order page in a separate window, displaying the product verification process.

    • Share URL: Click "Share URL" to send the order tracking link to the Certificate Requester/Organization Representative.

    Cancel A Pending Certificate Order

    • Navigate to the Order Page:

    • Go to Certificates > Orders > View Order page.

    Initiate Order Cancellation:

    • Click on the Cancel Order button under the order actions.

    • A confirmation modal will appear as shown below.

    Provide Cancellation Remarks:

    • Enter the reason for cancellation in the Cancellation Remarks field.

    • Click on Cancel Order to confirm.

    What's Next?

    Upon order cancellation, the certificate request will no longer be processed. Account user will receive a refund for the cancelled order. They can go back to the Order View page to download a credit not associated with the cancelled order if they desire.

  • Users gain a single platform to view and manage all domains, improving efficiency and reducing the risk of lapses in domain verification or expiration.

  • Streamlined Verification Process:

    • The ability to adjust DCV methods and track status simplifies the management of compliance requirements and keeps domains secure.

  • Secure Domain Addition:

    • Adding new domains with ownership verification helps maintain the security of the domain portfolio and prevents unauthorized additions.

    • By centralizing these functions, the Domains Management section helps organizations maintain a secure, organized, and fully validated domain portfolio, crucial for digital security and operational efficiency.

  • Manage and View Domain Information

    • Detailed Domain Information:

      • For each domain, users can access detailed information, including domain name, creation date, verification details, and ownership records. This allows users to have complete visibility over each domain’s setup and history.

    • Editing Domain Information:

      • Users can modify or update domain-related details directly from this section, ensuring that the information is always current and accurate. This is particularly useful when domain ownership changes or updates are needed for compliance or business requirements.

    Domain Control Validation (DCV) management

    • Flexible DCV Method Changes:

      • The Domain Control Validation (DCV) method can be altered if a different verification method is preferred or required. Users can select from multiple DCV methods such as Email, DNS, or HTTP, depending on what best suits the domain and organization’s needs.

    • Sending for Approval:

      • Once the DCV method is chosen, users can initiate the approval process. This is essential for completing the domain verification process and is done with a single click, streamlining the workflow.

    • Tracking DCV Status and Expiry Date:

      • For each domain, the DCV status (e.g., Pending, Approved, Rejected) and Expiry Date of the validation are prominently displayed. This allows users to stay informed on when validations need renewal and if any issues arise in the approval process, they can be addressed promptly.

    Adding a New Domain

    • Creating and Verifying New Domains:

    New domains can be added through this feature, where they undergo a verification process to confirm domain ownership. This includes setting up the domain’s information and initiating the DCV process to ensure the domain is validated correctly.

    • Domain Ownership Verification:

      • As part of the new domain creation, verification is conducted to confirm that the domain belongs to the requesting organization. This security step prevents unauthorized domain additions and enhances trust. To Know more about DCV method, click here.

    • DCV Method Overview:

      • To understand the available DCV methods, users can click on the provided link, which explains the options (Email, DNS, or HTTP) and their specific requirements. This resource ensures that users select the most suitable DCV method for their needs.

    Domain List and Status Overview

    • Comprehensive Domain Listing:

      • All domains that have been created are listed here in an organized format, allowing users to view and access each domain quickly. This includes both active and inactive domains.

    • Status Indicators:

      • Each domain displays a status indicator (e.g., Verified, Pending, Expired), providing users with an instant overview of the verification and operational state of each domain. This feature helps in identifying any domains that may need immediate attention for renewal or verification.

    Manage and View Domain Information

    • Detailed Domain Information:

      • For each domain, users can access detailed information, including domain name, creation date, verification details, and ownership records. This allows users to have complete visibility over each domain’s setup and history.

    • Editing Domain Information:

      • Users can modify or update domain-related details directly from this section, ensuring that the information is always current and accurate. This is particularly useful when domain ownership changes or updates are needed for compliance or business requirements.

    Domain Control Validation (DCV) management

    • Flexible DCV Method Changes:

      • The Domain Control Validation (DCV) method can be altered if a different verification method is preferred or required. Users can select from multiple DCV methods such as Email, DNS, or HTTP, depending on what best suits the domain and organization’s needs.

    • Sending for Approval:

      • Once the DCV method is chosen, users can initiate the approval process. This is essential for completing the domain verification process and is done with a single click, streamlining the workflow.

    • Tracking DCV Status and Expiry Date:

      • For each domain, the DCV status (e.g., Pending, Approved, Rejected) and Expiry Date of the validation are prominently displayed. This allows users to stay informed on when validations need renewal and if any issues arise in the approval process, they can be addressed promptly.

    Adding a New Domain

    • Creating and Verifying New Domains:

    New domains can be added through this feature, where they undergo a verification process to confirm domain ownership. This includes setting up the domain’s information and initiating the DCV process to ensure the domain is validated correctly.

    • Domain Ownership Verification:

      • As part of the new domain creation, verification is conducted to confirm that the domain belongs to the requesting organization. This security step prevents unauthorized domain additions and enhances trust. To Know more about DCV method, click here.

    • DCV Method Overview:

      • To understand the available DCV methods, users can click on the provided link, which explains the options (Email, DNS, or HTTP) and their specific requirements. This resource ensures that users select the most suitable DCV method for their needs.

    All organizations created in the system are presented in a consolidated list.

    Each entry displays:

    • Organization Name

    • Unique Identifier (if applicable)

    • Status of the Organization (e.g., Active, Pending, or Suspended)

    • Date of Creation/Last Updated

    This overview allows users to quickly monitor the state of all organizations and take necessary actions.

    Manage Organization Information

    Select any organization from the list to edit or update key information, including:

    • Name, Address, and Legal Information

    • Contact Details

    • Organization Validity or Renewal Dates

    • Status Management: Administrators can activate, deactivate, or suspend organizations based on compliance requirements or internal policies.

    Keeping this information accurate ensures compliance with security and operational protocols.

    Organization Representative Management

    Each organization must designate primary and alternate representatives.

    • These representatives are responsible for interacting with the system and making formal requests (like certificate orders or EV validations).

    The Organization Representative Information section displays:

    • Name, Role, and Contact Information of the representatives

    • Access levels or permissions granted to them

    • Ability to edit or replace representatives when necessary

    Ensuring correct representative information guarantees smooth communication and process flows with the organization.

    Extended Validation (EV) Request Approvals

    Track and manage EV certificate requests for the selected organization.

    • EV certificates are used to establish higher trust levels, especially in public-facing applications.

    Admins can:

    • Approve, Reject, or Request Modifications to EV requests.

    • Track the status of each EV request (e.g., Pending, Approved, Rejected).

    • Ensure audit logs are maintained for each approval or rejection for future reference and compliance.

    This feature helps administrators enforce rigorous security practices for organizations requiring enhanced validation processes.

    Advanced Actions for Administrators:

    Export Organization Data:

    • Export the list of organizations along with their details for reporting or compliance purposes.

    Set Up Alerts and Notifications:

    • Configure alerts to receive notifications on status changes or upcoming renewals.

    • Automate notifications for EV request status updates to stay informed in real time.

    Audit Trail:

    • Access a history of changes and approvals for each organization to ensure accountability and transparency.

    • Log all modifications to representative information and EV requests for compliance auditing.

    OV Prevetting

    This helps enterprises to re-use organization details in the ordering form and quickly get the OV certificates with minimum verification requirements and customer pending actions.

    Navigate to Organizations > Add Organization

    • Enter the required Organization Information

    • Enter the Organization Representative Information

    • Upload the Organization Registration Documents and click on Submit for Validation

    The organization details verification will be pending with validation for OV. For details on OV validation process, click here.

    The Organization details are verified by the eMudhra validation team and approved.

    After the Organization verification, the Organization information can be re-used to order the certificate reverification of the organization details.

    Note: The OV Organization details is also verified while ordering a OV certificate. For details on ordering a OV certificate, please click here. The same organization details can be re-used for the subsequent OV orders.

    EV Prevetting

    Navigate to New Certificate > SSL/TLS Certificates > EV certificate

    For EV Organizations, user must verify the organization by ordering any EV certificate. For details on ordering a EV certificate, click here.

    The EV Organization details are verified by the eMudhra validation team and approved.

    In the Organizations page, the organization details verification will be pending with validation for as EV & OV.

    The same EV Organization details can be re-used for ordering a new EV or OV certificate as a pre-vetted organization.

    Note: Exclusive EV prevetting of organization is not available.

    Scope: Covers Microsoft Windows operating systems (e.g., Windows 10, Windows 11, and their server equivalents) and Microsoft’s products like Internet Explorer and Edge.

  • Importance: Inclusion ensures that emSign certificates are trusted on all supported Windows environments by default, allowing seamless usage in enterprise networks and consumer devices.

  • URL: https://learn.microsoft.com/en-us/security/trusted-root/participants-list (complete list at https://ccadb.my.salesforce-sites.com/microsoft/IncludedCACertificateReportForMSFT)

  • Version/Last Update: Monthly releases; latest deployment notice as of June 26, 2025.

  • Apple Root Certificate Program

    • Scope: Includes macOS, iOS, iPadOS, and Safari.

    • Importance: Being part of Apple’s trust store allows emSign’s certificates to function seamlessly across Apple desktops, laptops, and mobile devices, covering a vast user base in both consumer and business contexts.

    • URL: https://support.apple.com/en-us/103272 (current list at )

    • Version/Last Update: Root Store version 2024051500 (current for iOS 18, iPadOS 18, macOS 15, tvOS 18, visionOS 2, and watchOS 11).

  • Mozilla Root Store

    • Scope: Impacts Mozilla Firefox and derivative browsers or applications using Mozilla’s root store.

    • Importance: Firefox is a popular cross-platform browser, used extensively on Windows, macOS, Linux, and Android. Inclusion here ensures that emSign certificates work smoothly across diverse computing environments.

    • URL: (included certificates report at )

    • Version/Last Update: Mozilla Root Store Policy version 3.0 (effective March 15, 2025).

  • Android Root Store

    • Scope: Governs the vast Android ecosystem—smartphones, tablets, and other devices running Android OS.

    • Importance: With a significant share of the global mobile market, inclusion in the Android root store means that emSign certificates are trusted on devices from a wide array of manufacturers.

    • URL: https://android.googlesource.com/platform/system/ca-certificates/+/master/files/cacerts

    • Version/Last Update: Updated with Android OS releases; current with Android 16 (as of August 2025, includes updates via Google Play since Android 14).

  • Java (Oracle) Root Store

    • Scope: The Java platform and applications that rely on Java’s default keystore (cacerts).

    • Importance: Many enterprise and server-side applications depend on Java’s trust store. Being included here ensures smooth integrations where Java-based applications must validate or use emSign-issued certificates.

    • URL: https://www.oracle.com/java/technologies/javase/carootcertsprogram.html (cacerts file included in JDK distributions)

    • Version/Last Update: Updated with JDK releases; current with JDK 25 (released September 2025).

  • Note: The specific coverage and update cycles differ by platform; some devices or operating systems may require manual updates to trust the latest root CAs.

    For more information on emSign's inclusion in specific root stores, feel free to check ccadb or reach out to our support team.

    Organization & Domain Management: Pre-verify and manage domains and organizations for faster certificate issuance.

  • API Integrations: Access REST and ACME APIs to generate and manage their own keys.

  • Certificate Management: Issue and monitor certificates, with built-in tools to track expiring certificates.

  • Finance & Billing Management: View financial reports, manage account funds, and update billing information.

  • Private CA Management: Create and manage private CAs and develop customized products for internal use.

  • Reports & Tools: Utilize the reporting features and tools available on the platform.

  • Profile and Notifications: Manage profile information and receive alerts related to self-orders and associated group activities.

  • Limitations:

    Enterprise accounts do not have access to sub-account creation or price list management for sub-accounts.

    Navigating to the Sign-Up Page: Open the URL https://www.hub.emsign.com and click on “Sign Up” button

    Upon clicking the "Sign Up" link on the home screen, users are redirected to the "Sign up as an Enterprise" page.

    Entering User Information:

    Users are required to fill in the following details:

    • Your Name

    • Your Email Address

    • Mobile Number

    • Organization Name

    • Country (select from the dropdown menu)

    Accepting Terms and Conditions:

    • Users must accept the terms and conditions by selecting the checkbox.

    • Click the "Sign Up" button to proceed.

    Acknowledgement and Account Activation:

    • Upon clicking the "Sign Up" button, a thank you message will appear on the screen, confirming the sign-up request.

    • An account activation email will be sent to the registered email ID.

    Activating the Account:

    • Users must click the activation link in the email to proceed to the "Activate Your Account" page.

    Setting a Password:

    • On the "Activate Your Account" page, users will be prompted to set a password following the system-provided instructions.

    Password Generation and Update:

    • After entering the password, click the "Generate Password" button to complete the process.

    • The password will be successfully updated, and the account will be ready for use.

    ount by contacting the emSign Hub account manager.

    DV certificates

    Follow these steps to place an order for a DV SSL/TLS certificate through the CERTInext portal. The same process applies for DV Multi-domain (UCC), Wildcard, and Wildcard-UCC products.

    Step-by-Step Certificate Ordering Process

    1. Choose Product & Validity

    • Select the product from the Product Dropdown List: Options include emSign SSL/TLS - DV, DV Wildcard, DV-UCC, or DV Wildcard-UCC.

    • If a UCC product is selected, enter the number of domains to see the order value in real-time.

    • All emSign SSL/TLS certificates are valid for 1 year by default.

    • Click "Next" to proceed.

    1. Certificate Requester Information

    Enter the following details for the certificate requester to ensure all notifications are sent to the correct person:

    • Requester Name

    • Requester Email ID

    • Mobile Number

    • Designation

    1. Upload or Paste Certificate Signing Request (CSR)

    You can provide the CSR in either of the following ways:

    • Upload CSR file.

    • Paste CSR directly into the designated field.

    • Note: The CSR helps auto-populate the Domain Name under the certificate details section. If skipped, the SAN (Subject Alternative Name) field will not be auto filled.

    • You can also skip this step by selecting "Skip CSR

    1. Certificate Details

    • The Domain Name is auto populated based on the uploaded CSR.

    • If no CSR is provided, or if additional domains are needed:

    • Enter the domain name manually.

    • Pre-verified domains associated with the selected group will appear in the dropdown list.

    1. Additional Information (Optional)

    • Reporting Tags: Add tags to map the request for easier tracking and filtering.

    • Click "Add Tag" to provide the Tag Name and Tag Value, then click "Save" to proceed.

    • Order Remarks: Add any relevant remarks for internal tracking.

    1. Order Summary & Payment

    • Review the product information, certificate details, and payment summary.

    • The Payment Group from which funds will be deducted will be indicated.

    • Account Balance: Displays the current balance alongside the total order value.

    • For USD Payments: GST is not applicable.

    1. Post-Order Actions

    Edit Custom Fields:

    • Custom fields associated with the order can be edited after the order is generated.

    Update Additional Email Recipients:

    • Add or modify additional email recipients even after the order is placed to ensure they receive important notifications

    What’s Next?

    • Upon successful order placement, the certificate requester will receive an Order Confirmation Email with a tracking link.

    • Use the tracking link to monitor the certificate verification process step-by-step.

    • Once the certificate is verified and issued, the requester can download and deploy it accordingly.

    Custom Fields

    The emSign CERTInext platform allows you to incorporate custom fields in your certificate order form, streamlining record-keeping and enhancing order management efficiency.

    Key Features

    • Default Setting: The Custom Fields feature is turned off by default. To enable this feature for your account, please contact your account manager.

    • Access for Administrators: Once enabled, the Custom Order Fields menu option becomes available under Settings > Custom Fields for Administrator users.

    • Account-Specific Customization: These custom fields are unique and specific to your account.

    Use Cases

    Enterprises often require additional custom fields to capture specific information relevant to their operations. Below are some common examples:

    • Project Codes: Record internal project codes in the order form to automatically associate them with the order.

    • Cost Centre/Business Unit: Capture cost centre or department names (e.g., Technology) to link orders to specific business units.

    • Internal Notes: Add internal request numbers, comments for order fulfillment, or special handling instructions.

    • Owner/Sponsor Email ID:

    By leveraging custom fields, enterprises can tailor the certificate ordering process to their unique needs, improving operational efficiency and ensuring better record management.

    Adding a custom field

    Follow the steps below to add a new custom field to your emSign account:

    Access the Add Custom Field Option: Click on the "Add Custom Field (+)" option. The 'Add Custom Field' pop-up window will appear, as shown below.

    Enter Field Details:

    • Field/Label Name: Provide a name for the custom field.

    • Field Description: Add a description to display as help text for the custom field (optional).

    • Input Type: Select the input type from the drop-down menu. The subsequent required fields will depend on the selected input type.

    Input Type Configurations:

    • Text Box:

      • Max. Length: Specify the maximum allowed characters for the text field.

      • Field Specification: Choose from Alphabets, Integers, or Special Characters.

      • Field Presence: Mark the field as Optional or Mandatory.

    Click on "Add Field" to save and add the custom field to your account.

    View Custom Field

    Click on the 'View' hyperlink in the grid to open the Custom Field Details page. On the Custom Field View page, Account Administrators can:

    • Edit: Modify the custom field details as needed.

    • Deactivate: Disable the custom field. Once deactivated, the field will no longer appear in the order forms.

    Intranet SSL Certificate

    An Intranet SSL certificate functions similarly to SSL certificates issued by public authorities but is specifically designed for private networks or internal sites. It secures data exchanges within private environments by encrypting the communication between client devices and server over HTTPS. This encryption ensures that even if unauthorized parties attempt to intercept the data, they cannot decipher it, safeguarding sensitive information and passwords exchanged within the internal network.

    Key Features of Intranet SSL Certificates

    Technical Specifications & Installation:

    • Intranet SSL certificates share the same technical specifications and installation procedures as public SSL certificates. However, their usage differs.

    Compliance with CA/B Forum Regulations:

    Domain Validation (DV) Process

    emSign SSL DV Validation Process is simple & fully automated.

    • Validation Process: Validation of domain ownership to prove control over the domain.

    • Issuance Time: Shorter issuance time. Issuance in minutes.

    Process Involved:

    EV Certificates

    Follow these steps to place an order for an EV SSL/TLS certificate. The same process applies to EV Multi-domain (UCC) products.

    Step-by-Step Certificate Ordering Process

    1. Choose Product & Validity

    IGTF Certificates

    Follow these steps to order an IGTF certificate using the external DNS type option through the emSign CERTInext

    Step-by-Step Certificate Ordering Process

    1. Choose Product & Validity

    • Navigate to the Private PKI Product section.

    According to the CA/Browser Forum regulations, public CAs cannot issue SSL certificates for internal server names, localhost, or reserved IP addresses. As a result, private servers must acquire SSL certificates from Private CAs.

    emSign Intranet SSL:

    • Non-Public Root Certificates: emSign provides Intranet SSL certificates via private root certificates.

    • Fast Issuance & Competitive Pricing: Enjoy a faster process and cost-effective pricing compared to traditional offerings.

    Benefits of Intranet SSL Certificates

    • Secure Internal Server Names and IPs:

    Intranet SSL certificates enable encryption for internal server names, localhost, and reserved IP addresses.

    • Support for Multiple Configurations:

      • Single Domain

      • Wildcard Certificates

      • Multiple Domains (UCC)

    • Includes Organization Information:

      • Each certificate contains the Organization Name (O) to ensure verified identity.

    • Fully Automated Process & Instant Approval:

      • Enjoy quick and automated issuance for fast implementation.

    • Fast Issuance:

      • Certificates are typically issued within minutes of submission.

    • Extended Validity:

      • Certificates can be issued with a maximum validity of up to 5 years.

    • No Self-Signed Certificates:

      • All certificates are issued from trusted private CAs to avoid self-signed certificate risks.

    • Improved Performance & No Browser Warnings:

      • Seamless user experience with no browser security warnings.

    • Automatic Renewal Reminders & Early Renewal Options:

      • Stay protected with automatic renewal notifications and the ability to renew certificates early to prevent service disruptions.

      • Intranet SSL certificates are ideal for securing internal systems, protecting sensitive data, and maintaining compliance with industry standards. With emSign’s fast issuance process and competitive pricing, you can ensure your internal network remains secure and operational without compromise.

    Ordering an Intranet SSL Certificate

    Step-by-Step Ordering Proces

    1. Choose Product & Validity

    • Navigate to Certificates > New Request.

    • From the Product Dropdown List, select a Private PKI product that suits your needs.

    • The certificate validity period will be displayed based on the selected product configuration.

    • Click "Next" to proceed.

    1. Certificate Requester Information

    • Enter the following details for the certificate requester:

    • Name

    • Email ID

    • Mobile Number

    • Designation

    • These details will ensure that the requester receives all relevant order notifications.

    • Click "Next" to continue.

    1. Certificate Information

    • Internal DNS Type:

    • Enter the domain name (mandatory). This can include internal domains, IP addresses, or internal server names.

    • Note: Domain Control Validation (DCV) is not required for internal domains.

    • Optionally, provide additional details such as:

      • Additional Domain Names

      • Organization Name & Unit

      • Country, State/Province

      • Click "Next" to proceed.

    1. Certificate Signing Request (CSR)

    • CSR submission is mandatory for Private PKI Intranet SSL certificates.

    • You can provide the CSR in either of the following ways:

      • Upload CSR

      • Paste CSR

    • Click "Next" to proceed.

    1. Additional Information (Optional)

    • Reporting Tags:

      • Click "Add Tag" to map tags to the order request for easy filtering.

      • Provide the Tag Name and Tag Value, and click "Save" to continue.

    • Order Remarks:

      • Add any relevant remarks as part of the order request.

    • KYC Documents (if applicable):

      • Upload any required KYC documents to complete the request.

    • Click "Next" to proceed.

    1. Order Summary & Payment

      • The Order Summary section provides an overview of:

      • Product Information

      • Certificate Details

      • Payment Summary (including the deduction group for the payment).

      • Payment Information:

      • Displays the current account balance, order value, and grand total.

      • For USD payments: GST is not applicable.

      • For INR payments: GST will be applied.

      • Click "Pay Now" to finalize the payment.

      • After payment, the user will be redirected to the Orders View Page, where all order-related details will be displayed.

    What's Next?

    • After the order is successfully placed, the certificate will be available for download.

    • Navigate to the Orders View Page and use the "Download Certificate" option to retrieve the certificate.

    Select IGTF product from the Product Dropdown List.

  • Click "Next" to proceed.

  • 2. Certificate Requester Information

    • Provide the following details:

      • Requester Name

      • Email ID

      • Mobile Number

      • Designation

    • These details will ensure the requester receives all relevant order notifications.

    • Click "Next" to continue.

    1. Certificate Information

    • Domain Name: Enter the domain name (mandatory).

    • www Variant: By default, the checkbox "Automatically secure 'www' variant of websites" will be selected. You can uncheck it if not required.

    • Additional Details: Optionally, enter:

      • Additional Domain Names

      • Organization Name

      • Organization Unit

      • Country

      • State/Province

    • Click "Next" to proceed.

    Important Notes on DNS Type

    Internal DNS Type:

    • If Internal is selected, an order confirmation email will not be sent.

    • The user can download the certificate immediately from the "Download Certificate" option on the Orders View Page.

    External DNS Type:

    • If External is selected, an order confirmation email with a tracking link will be sent to the requester.

    • The requester must complete all pending actions before downloading the certificate.

    1. Certificate Signing Request (CSR)

    • CSR submission is mandatory for private PKI products.

    • You can provide the CSR using one of the following methods:

      • Upload CSR

      • Paste CSR

    • Click "Next" to continue.

    1. Additional Information (Optional)

    Reporting Tags:

    • Add reporting tags by clicking "Add Tag".

    • Enter the Tag Name and Tag Value and click "Save".

    KYC Documents:

    • If required, enable the KYC Documents checkbox.

    • Upload the relevant documents and provide a brief description.

    • Click "Add Document" to upload multiple documents. Enterprise Administrators will review the KYC documents as part of the approval process.

    Order Remarks:

    • Add any relevant remarks to the order request.

    1. Order Summary & Payment

    This section provides an overview of:

    • Product Information

    • Certificate Details

    • Administrator Validation Checklist (if applicable)

    • Payment Summary (including the deduction group from which payment will be made)

    Administrator Validation Checklist:

    • This checklist will appear if configured as mandatory or optional during the product creation process.

    • It will only be displayed if administrator approval is required.

    Payment Information:

    • Displays the account balance, order value, and grand total.

    • For USD payments: GST is not applicable.

    • For INR payments: GST will be applied.

    • Click "Pay Now" to finalize the payment.

    • After payment, the user will be redirected to the Orders View Page, where all order-related details will be available.

    Important Note

    • If administrator approval is required, the order status will be displayed as "Order Pending for Approval."

    What’s Next?

    • Upon successful order placement, the Certificate Requester will receive an Order Confirmation Email with a link to the Track Order Page.

    • The requester can use the tracking link to monitor the certificate verification process and download the certificate once it is ready.

    https://support.apple.com/en-us/121672
    https://www.mozilla.org/en-US/about/governance/policies/security-group/certs/policy/
    https://ccadb-public.secure.force.com/mozilla/IncludedCACertificateReport
    Include project owner/sponsor email IDs to serve as points of contact for future queries.
  • Escalation POC: Record escalation points of contact for streamlined issue resolution during escalations.

  • Purchase Order Number: Add PO numbers to facilitate invoicing and payment processing.

  • Server IP Address: Capture server IP addresses to generate server-wise SSL usage reports when required.

  • Provider Name: Record the SSL provider’s name (e.g., eMudhra) for reference.

  • SSL Hosting Service Provider Name: Include the hosting service provider’s name for additional insights.

  • Drop-down:

    • Field Values List: Provide a pre-defined list of values.

    • Field Presence: Mark the field as Optional or Mandatory.

  • Date Picker:

    • Field Presence: Mark the field as Optional or Mandatory.

  • Checkbox:

    • Field Values List: Provide a pre-defined list of options.

    • Field Presence: Mark the field as Optional or Mandatory.

  • Email:

    • Max. Length: Specify the maximum allowed characters.

    • Field Presence: Mark the field as Optional or Mandatory.

  • If another person should have authority to download the certificate, enable the relevant checkbox and provide their Contact Name and Email ID.

  • Click "Next" to proceed.

  • " and submitting the CSR later using the
    Order Quick Actions
    feature.

    For sub-domains, the system allows reuse of the validation of pre-verified base domains, ensuring quick issuance without requiring repetitive DCV (Domain Control Validation).

  • Note: If the domain used is restricted by the administrator, the system will display a message:

  • "One or more domain names provided in this order are not allowed due to specific domain restrictions. Please contact your account administrator."

  • To add additional domains, select the DV UCC or DV Wildcard UCC product.

  • Newly validated domains will be mapped to the Default Organization to avoid repetitive DCV in future orders.

  • Click "Next" to proceed.

  • Technical Point of Contact: If another individual should manage the technical aspects, enable the checkbox and provide their Name, Email ID, Mobile Number, and Designation.
  • Custom Fields: If any custom fields have been set by the administrator, they will appear here. Custom fields are not included as part of the certificate’s Subject/SAN attributes.

  • Additional Email Recipients: Enable the checkbox to add recipients who will receive order confirmation, revocation, and renewal notifications (excluding verification-related notifications).

  • Auto-Renew Certificates: Enable auto-renewal to automatically renew certificates based on the configured criteria. If disabled, manual renewal will be required before the certificate expires.

  • Auto-renewal settings can also be edited later from the Orders View page after the order is placed.

  • Click "Next" to proceed.

  • For INR Payments: GST will be applied.

  • Click "Pay Now" to complete the payment. Upon payment, the amount will be deducted from the selected group, and the system will redirect you to the Orders Page.

  • Domain Control Validation (DCV): Domain Control Validation can be done online and it's an customer friendly automated process.
  • Certificate Signing Request (CSR): As part of SSL DV process, CSR has to be submitted to emSign.

  • Domain Control Validation(DCV)

    DNS TXT Record

    • Log in to your DNS provider and create a new TXT record with the provided host and value. To complete your domain verification, verify your DNS TXT record.

    Step-by-Step Guide

    Step 1: Log in to your DNS provider's site

    1. Access your DNS provider's website and log in with your credentials.

    2. Find the section where you can manage DNS settings for your domain. This is usually under "DNS Management," "Domain Management," or similar.

    Step 2: Create a new TXT record

    1. Locate the option to add a new TXT record. This might be under "Add Record," "Create Record," or similar.

    Step 3: Copy the ‘Value’ from emSign system

    1. Open the emSign order tracking link.

    2. Select DCV Method as ‘DNS TXT Record’.

    3. Copy the ‘Value'.

    Step 4: Paste the copied Value into a new TXT record in the TXT Value field

    1. In your DNS provider's interface, paste the copied value into the TXT Value field.

    Step 5: Host field: Base Domain (e.g., example.com)

    1. Enter the base domain for the Host field. For example, if your domain is example.com, enter example.com. If the TXT record is for a subdomain, enter the subdomain (e.g., sub.example.com).

    NOTE: Leave this field blank or enter ‘@’ to signify that the TXT record is for the root of the domain.

    Step 6: Select a Time-to-Live (TTL) value

    1. Choose a TTL value. A common default is 3600 seconds (1 hour).

    Step 7: Save the TXT record

    1. Save the changes. The exact button might say "Save," "Add Record," or similar.

    Step 8: Go to the emSign Platform & click ‘Verify Now’

    1. Open the emSign order tracking link.

    2. Click the ‘Verify Now’ button to complete the verification process.

    Constructed Email

    • Confirming the Organization's control over the FQDN by sending an random value via email which will be valid for 24 hours.

    • Subscribers can resend the domain verification link from the track order page if the link expires.

    Email to DNS CAA Contact

    • Login to your DNS provider. Create DNS CAA Record and provide your domain's email address as part of 'contactemail' property tag.

    • NOTE: The entire parameter value must be a valid email address as defined in RFC 6532, with no additional padding or structure, or it cannot be used.

    • Save the DNS CAA Record.

    Email to DNS TXT Contact

    • Login to your DNS provider. Create the DNS TXT Record and provide your domain's email address on the following subdomain of your domain.

    • NOTE: The entire parameter value must be a valid email address as defined in RFC 6532, with no additional padding or structure, or it cannot be used.

    HTTP/HTTPS File-based

    • File-based (HTTP / HTTPs URL) DCV method can only be used to prove the domain ownership over fully qualified domain names (FQDNs), exactly as named. In case you wish to have it work for both www and without www, we recommend you to use alternate DCV methods.

    CAA Verification

    What is CAA?

    CAA is a control to restrict which CAs can issue certificates for a particular domain name for issuing the certificate. By configuring the DNS CAA record, domain owners can specify which Certification Authorities are authorized to issue certificates to that domain name. You can use CAA to reduce your exposure to vulnerabilities in certificate authority validation systems and to enforce certificate procurement policies.

    To use CAA, you publish a set of CAA records in your domain's DNS that list the CAs that you authorize to issue certificates. Before issuing a certificate, the CA checks your CAA records and blocks the request if they are not listed.

    What is a CAA record?

    A Certification Authority Authorization (CAA) record is a standard that lets you specify which certificate authorities (CAs) are allowed to issue certificates for your domain. The purpose of the CAA record is to allow domain owners to authorize which certificate authorities are allowed to issue a certificate for a domain.

    Before issuing a certificate, the CA checks your CAA records and blocks the request if they are not listed. If no CAA record is present, any CA is allowed to issue a certificate for the domain.

    1. CAA records can set policy for the entire domain, or for specific HostNames.

    2. CAA records are also inherited by sub-domains.

    3. CAA records can regulate the issuance of single-name certificates, wildcard certificates, or both.

    From the Product Dropdown List, select any emSign SSL/TLS EV or EV UCC product.

  • If a UCC product is selected, enter the number of domains to view the order value in real-time.

  • Multi-year validity (up to 3 years) is available for all emSign SSL/TLS products.

  • Click "Next" to proceed.

    1. Organization Details

    • New Organization:

    If a new organization needs to be created, provide the following details:

    • Organization Name

    • Organization Unit

    • Street Address 1 & 2

    • Country, State/Province, Locality, and Postal Code

    • Click "Next" to proceed.

    • Pre-Verified Organization:

    • To place an order with a pre-verified organization, click "Click Here" to open the list of EV-validated organizations.

    • Select the desired organization, and all relevant details will be auto-filled.

    1. Organization Representative Information

    • Refer to emSign SSL/TLS OV Certificate Order.

    • If a pre-verified organization is selected, the organization representative's details will be auto-filled.

    • For manual input, follow the OV certificate ordering flow by entering the representative’s name, email ID, mobile number, and other details.

    • Click "Next" to proceed.

    1. Certificate Signing Request (CSR)

    Refer to the DV certificate ordering process for CSR submission. Users can:

    • Upload CSR

    • Paste CSR

    • Skip CSR and submit it later through Order Quick Actions.

    • CSR auto-populates the Domain Name.

    Certificate Details

    • The Domain Name will be auto-filled based on the CSR.

    • Alternatively, users can manually enter the following:

      • Domain Name

      • Business Category

      • Company Registration Number

    • For pre-verified organizations, the list of pre-verified domains will appear in the Domain Name dropdown.

    • Use the Single Sub-domain option to reuse pre-verified base domains for quick issuance without repetitive DCV (Domain Control Validation).

    • Important Note:

    • To add additional domains, select the EV UCC product.

    • Click "Next" to proceed.

    1. Authorized Signatory Information

    This section requires details of the Contract Signer and Certificate Approver.

    • Options for entering details:

      • New Entry

      • Existing Entry

    • Same as Organization Representative (for Contract Signer)

    • Same as Contract Signer (for Certificate Approver)

    • For pre-verified organizations, these details will be auto filled.

    If not available, enter the following manually:

    • Name

    • Email ID

    • Telephone Number

    • Designation

    • Employee ID

    1. Additional Information (Optional)

    Refer to the OV certificate ordering flow for adding additional information, including:

    • Reporting Tags: Add tags for easier tracking and filtering.

    • Order Remarks: Add relevant remarks for internal use.

    • Technical Point of Contact: Assign another person to manage the technical aspects.

    • KYC Documents: Enable the checkbox to upload KYC documents, and click "Add Document" for multiple uploads.

    • Custom Fields: If configured, custom fields will appear here. These are not part of the certificate’s SAN or Subject attributes.

    • Additional Email Recipients: Add recipients who will receive order-related notifications.

    • Auto-Renew Certificates: Enable auto-renewal to automatically renew certificates before expiration. This can be edited later in the Orders View page.

    • Click "Next" to proceed.

    1. Order Summary & Payment

    • Review the product details, certificate information, and payment summary.

    • The Payment Group from which the amount will be deducted will be displayed.

    • Account Balance:

    • USD Payments: GST is not applicable.

    • INR Payments: GST will be applied.

    • Click "Pay Now" to complete the payment. After payment, the system will redirect you to the Orders Page.

    What’s Next?

    • After the order is successfully placed, the Organization Representative will receive an Order Confirmation Email.

    • The email will contain a tracking link to monitor the certificate verification process.

    • Once the certificate is issued, the representative can download and deploy it.

    OV Certificates

    Step-by-Step Certificate Ordering Process

    1. Choose Product & Validity

    • From the Product Dropdown List, select any SSL/TLS product: OV, OV Wildcard, OV UCC, or OV Wildcard-UCC.

    • If a UCC product is selected, enter the number of domains to see the order value upfront.

    • The default validity period for all SSL/TLS certificates is 1 year.

    • Click "Next" to proceed.

    1. Organization Details

    • Permission Levels:

      • Specific Access: Users can select organizations only from a pre-verified list no option to create new organizations.

      • All Access: Users can either select pre-vetted organizations or enter new organization details directly.

    • Click "Select" to pre-fill the organization information in the form.

    • Click "Next" to continue.

    • Important Note:

    If the user has an organization reuse token, it can be provided by enabling the I have an organization reuse token checkbox.

    When the reuse token option is enabled, no organization consent email will be sent to the representative.

    1. Organization Representative Information

    • If a pre-vetted organization is selected, the organization representative's details will be pre-filled automatically.

    • For a new organization, choose between "New" or "Existing" user:

      • New: Enter the representative’s Name, Email ID, Mobile Number, and Designation.

    If the certificate download authority needs to be assigned to another individual, enable the Certificate Download Delegation checkbox and provide their Contact Name and Email ID.

    • Click "Next" to proceed.

    1. Certificate Signing Request (CSR)

    • The process for submitting the CSR is identical to the DV SSL/TLS certificate order. Users can:

    Upload CSR or

    Paste CSR into the designated field.

    • Skipping CSR:

      • If the CSR is skipped, the SAN (Subject Alternative Name) field will not be auto-filled.

      • Users can submit the CSR later using the Order Quick Actions feature.

    1. Certificate Details

    • If a CSR is provided, the Domain Name will be auto-populated.

    • To add a domain manually, enter it in the Domain Name field.

    • Pre-verified Domains: If the order is associated with a pre-verified organization, the corresponding domains will appear in the Domain Name dropdown list.

    • Use the Single Sub-domain

    1. Additional Information (Optional)

    This section allows users to provide additional order-related details:

    • Reporting Tags:

      • Add reporting tags by clicking "Add Tag". Enter the Tag Name and Tag Value and click "Save".

    • Order Remarks:

      • Include any remarks for internal tracking.

    If custom fields are active for the account, they will appear here. These fields are configured by the account administrator and are not included in the certificate’s Subject/SAN attributes.

    • Additional Email Recipients:

    Use this option to add email recipients who will receive Order Confirmation, Revocation, and Renewal Notifications, excluding verification-related alerts.

    • Auto-Renew Certificates Until Coverage:

      • Enable auto-renewal to ensure certificates are renewed automatically based on the configured criteria.

      • If disabled, manual renewal will be required before the certificate expires. This setting can be edited later from the Orders View page.

    • Click "

    1. Order Summary & Payment

    • Review the Product Information, Certificate Details, and Payment Summary.

    • The Payment Group from which the order amount will be deducted will be displayed.

    • Account Balance:

    • For USD Payments: No GST will be applied.

    What’s Next?

    • Upon successful order placement, the Organization Representative will receive an Order Confirmation Email.

    • This email will contain a tracking link to monitor the progress of the certificate verification process.

    • Once the certificate is issued, the representative can download and deploy the certificate.

    emSign CERTInext Bot

    The emSign CERTInext Bot is a comprehensive software solution for managing digital certificates across an organization's infrastructure. It automates the process of scanning, monitoring, and renewing certificates.

    The emSign Bot is available for the following operating systems:

    • Windows

    • Ubuntu

    How the emSign CERTInext Bot works

    The emSign Bot is deployed on your server to scan and gather certificate data.

    To download the emSign Bot executable file, navigate to Integrations > Tools > emSign CERTInext Bot.

    To select a pre-verified organization, click "Click Here". The pre-verified organizations will be displayed in a popup.

    Existing: Select the representative from the list of existing users.

  • Certificate Download Delegation:

  • option to reuse validations of pre-verified base domains, avoiding repetitive DCV (Domain Control Validation).
  • To add additional domains, select the OV UCC or OV Wildcard UCC product.

  • Click "Next" to proceed.

  • Technical Point of Contact:

    • Enable the Technical Point of Contact checkbox and provide the individual’s Name, Email ID, Mobile Number, and Designation.

  • KYC Documents:

    • If required, enable the KYC Documents checkbox and upload the relevant documents. Use the "Add Document" button to upload multiple documents.

  • Custom Fields:

  • Next
    " to proceed.

    For INR Payments: GST will be applied.

  • Click "Pay Now" to complete the payment. Upon payment, the amount will be deducted from the selected group, and the system will redirect you to the Orders Page.

  • The emSign Bot needs to run as Administrator. Once installed, the bot is launched and the interface will appear on your system as shown below.

    Need to set up templates and profiles for generating keys and provisioning certs, if you want to use the Bot for provisioning.

    Setting up a New emSign CERTInext Bot

    Navigate to Certificates > Bots to begin the setup.

    Account Administrator Restrictions: By default, the account administrator can create only one emSign Bot. To create additional bots, the administrator must contact the account manager.

    Who can create bots?

    • Both Resellers and Enterprise users can create emSign bots.

    • Filtering Bots: Use the search option or advanced search to filter and locate specific bots

    • Adding a new emSign bot: Click the plus (+) icon in the top-right corner to open the New emSign Bot modal.

    Configuring the New Bot:

    • Provide the Bot Name and select the Group.

    • Click the “Generate Bot Token” button to complete the setup.

    Activating the Bot:

    • Once created, the bot status will display “Activation Pending”

    • To activate the bot, click the "Settings" button in the action column. This will navigate to the emSign Bot View page, where you need to complete the following:

      • emSign Bot Information

      • Configure Scan targets

      • Set up scan schedule

      • Additional Information

    emSign Bot Information

    • All relevant details, including the

      • Bot’s name

      • Group

      • Bot token

      • And status, will be pre-filled based on the emSign Bot’s configuration.

    Account administrators have the option to modify the bot’s name, as shown below.

    Steps to Activate the Bot

    Step 1:

    Enter the Account ID (10-digit Account Number of your CERTInext account).

    The Account ID/Account Number is a unique number generated during creation of your CERTInext account. This can be found on your CERTInext account dashboard or in My Profile page.

    Step 2:

    Enter the Bot Token (Unique ID generated upon creation of a bot.

    For e.g; f8368fea-d5da-4502-a39b-43e6752f3b5e)

    Step 3:

    Click on “Activate Bot” button. The bot starts to run and scan for the predefined targets.

    Other emSign CERTInext Bot capabilities

    The CERTInext Bot Utility provides multiple configuration options for communication, security, and deployment automation. Below is a breakdown of each setting with an explanation of what it does and when/how to use it while configuring the bot.

    1. Communicate via Connector Bot:

    • This feature allows the CERTInext Bot to communicate with another instance of the bot running on a different system or network.

    • Useful for distributed environments where multiple bots handle different tasks and need to coordinate.

    • The Connector Bot serves as a key facilitator in certificate discovery and transfer. It operates on a dedicated server, scanning for certificates and securely pushing them to the requestor upon completion of the scan.

    • To establish communication, the Connector Bot shares its IP address and port details with the requestor. This allows the requestor bot to activate and receive the discovered certificates efficiently. The Connector Bot ensures a seamless and automated process, reducing manual intervention and enhancing security.

    • Once the scan is complete, the Connector Bot automatically transfers the identified certificates to the requestor. This setup ensures that the requestor receives up-to-date certificates with minimal effort, improving operational efficiency and compliance with security policies.

    • By acting as a bridge between certificate discovery and delivery, the Connector Bot streamlines the process while maintaining secure communication.

    When to Use:

    • When you have multiple CERTInext Bot instances and want them to exchange information or commands.

    • Ideal for large enterprise setups where SSL/TLS certificate discovery, deployment, or monitoring is divided among multiple locations.

    How to Configure:

    • Enable the checkbox “Communicate via Connector Bot.”

    • Enter the Connector Bot IP – This is the IP address of the bot you want to communicate with.

      • Connector Bot IP: This is the IP address of the secondary CERTInext Bot that the current bot will communicate with. It acts as the target endpoint for the connection between bot instances.

    • Enter the Connector Bot Port – The port on which the Connector Bot is listening for requests.

      • Connector Bot Port: Defines the port number through which communication between two CERTInext Bots occurs.

    • Save the settings and ensure the remote bot is correctly configured to accept connections.

    1. Custom URL:

      • Allows you to define a specific URL endpoint where the bot connects, instead of using the default server settings.

      • Useful for custom integrations with private networks or third-party tools.

    When to Use:

    • If your organization hosts a private CERTInext API instance and does not use the default service URL.

    • If you need to connect to an enterprise-specific SSL/TLS management server.

    How to Configure:

    • Enable the “Custom URL” checkbox.

    • Enter the complete URL

    • Ensure the endpoint is reachable from your network.

    1. Provide Proxy Details:

    • Enables proxy server support for bot communication.

    • Required when the network restricts direct internet access.

    When to Use:

    • If your organization requires all internet traffic to go through a proxy server.

    • If you're behind a firewall that blocks direct outgoing connections.

    How to Configure:

    • Enable “Provide Proxy Details”.

    • Enter:

      • Proxy IP (IP address of the proxy server)

        • The IP address of the proxy server that CERTInext Bot will use for outgoing requests.

      • Proxy Port (Port number for proxy communication).

        • The port number used by the proxy server for handling traffic.

      • Proxy Username (Only if authentication is required).

        • A username credential required for proxy authentication.

      • Proxy Password (Only if authentication is required).

        • The password associated with the proxy username for authentication.

    1. Listener Port:

      • The port number on which the bot listens for incoming connections.

    When to Use:

    • If the bot is expected to receive commands or data from external sources.

    How to Configure:

    • Enable "Listener Port".

    • Enter a valid port number (e.g., 5000, 8443, or 9090).

    • Ensure the firewall allows incoming traffic on this port.

    Final Steps:

    Once all settings are configured:

    1. Click "Activate Bot" to apply changes.

    2. Verify the bot is connected and communicating properly.

    3. If issues arise, check logs and firewall rules.

    Reporting tags

    • The account user can add the reporting tags by clicking the "Add tag" option to map them to the bot for easy filtering.

    • Provide the Tag name & Tag value, Remarks and click on "Save" button to proceed.

    Upon creation, the emSign bot status will change to "Active" & all relevant actions will be displayed in the grid as shown below.

    Grid Actions

    • Run Scan: Initiates a scan based on the configured scan targets when this button is clicked.

    • Suspend Bot: Suspends the bot, changing its status to "Suspended."

    • Deactivate Bot: Deactivates the bot, setting its status to "Inactive." The bot will no longer be used.

    • View: Navigates to the My emSign Bots view page, where the Regenerate Bot Token and Edit buttons are available

    • Edit: If the account administrator needs to modify the emSign Bot information, click the "Edit" button

    • Regenerate Bot Token: To generate a new bot token, click the "Regenerate Bot Token" button.

    User and Group Management

    Users

    • By default, last 10 users be viewed as shown below.

    • The list of users can be filtered & searched by Name. Click the "Search" button to apply the filter.

    Create User to your account

    To create a new user for your account:

    Click the "New User (+)" option to navigate to the Add User creation screen.

    Fill in the following details

    • Name

    • Email

    • Mobile Number

    • Designation

    • Employee ID

    Group Access Options:

    • If the group access checkbox is selected, the administrator can restrict the user to specific groups.

    • If unchecked, the user will have default access to all groups.

    Role Assignment:

    • Use this option to assign a role to the user. The permissions available to the user will vary based on the assigned role.

    • Click the "Save" button to finalize the process.

    An account activation email will be sent to the provided email address, including a link to activate the user account.

    Post-Creation Management

    Edit User Information: Once the user is created, administrators can edit the user details or adjust group access.

    User Activation

    The new user will receive an account activation email containing the account name and an activation link.

    Upon activation, the user can access the account with permissions based on the assigned role.

    Deactivate User

    The Administrator role will have the privilege to deactivate any user permanently. If the Administrator wants to activate the user again, he can contact the emSign support for reactivation.

    Group Management

    Groups can represent cost centres, business units, projects, or similar organizational units. Administrators can manage and customize groups to streamline access and certificate management.

    Adding and Managing Groups

    Default Group

    • A default group is pre-configured in the group menu upon account activation.

    • By default, account users cannot add multiple groups. To add multiple groups, the account administrator must request assistance from an eMudhra Account Manager.

    Filtering Groups

    • Use the Group Name filter to search and filter the list of groups, as shown below.

    Configuring a New Group

    • Enter the Group Name.

    • Provide a Short Description.

    • Upload a Logo (if required).

    Use the access configuration to control group visibility:

    • Checked: Restrict access to specific users.

    • Unchecked: Grant group access to all users by default.

    Specify the certificate request settings for Organizations and Domains associated with the group.

    This feature allows administrators to tailor group configurations to meet organizational requirements effectively.

    Organizations

    Administrators can configure certificate request permissions for groups using the "All" or "Specific" options for Organizations.

    • All- If this option is selected, the group will have access to all organizations within the account.

    • Specific- If this option is selected, the administrator can restrict the group’s access to specific organizations available in the account.

    Domains

    Administrators can configure certificate request permissions for groups using the "All" or "Specific" options for Organizations.

    • All- If this option is selected, the group will have access to all domains within the account.

    • Specific- If this option is selected, the administrator can restrict the group’s access to specific domains available in the account.

    Finance

    Administrators can define the payment mode for certificate requests using the Finance option. This ensures that payment settings are aligned with organizational policies and requirements.

    Deduct from Account Balance

    If this option is selected at the new request level, the amount for any certificate request placed using the group will be deducted directly from the group's balance.

    If Auto Approval of certificate is checked, the system automatically approves and deducts the certificate amount from the main account balance without needing manual approval of certificates.

    Allocate Credits to the Group

    Check the "Allocate Credits to this Group from Account Balance" option.

    Enter the following details:

    • Amount: Specify the amount to be allocated.

    • Supporting Document: Attach relevant documentation (if required).

    • Remarks: Add any remarks for reference.

    Upon allocation, the specified amount will be debited from the account balance and credited to the group.

    This feature enables efficient fund management and ensures that group-level balances are appropriately maintained.

    Enforce Spend Limit

    Administrators can set spending thresholds for groups to manage and control expenses:

    Enable Spend Limit:

    • Check the "Enforce Spend Limit" option to activate spending restrictions for a group.

    • A threshold amount field will appear.

    Set Threshold Amount:

    • Enter the desired threshold amount for the group.

    • This ensures that spending does not exceed the allocated limit, providing better financial oversight.

    This feature helps in maintaining budgetary control and ensuring accountability at the group level.

    Deduct from Group Balance

    Enable this option to allow deductions directly from the group's balance for any certificate requests made using the group.

    When this option is selected, any charges for new requests will automatically be debited from the group's allocated balance.

    Allocate Credits to the Group

    To allocate funds to a group, follow these steps:

    • Select the "Allocate Credits to this Group from Account Balance" checkbox.

    • Enter the following details:

    Amount: Specify the amount to allocate.

    Supporting Document: Attach relevant documentation if required.

    Remarks: Add any notes or comments related to the fund allocation.

    • Upon saving, the specified amount will be debited from the account balance and credited to the group.

    This functionality allows precise control over group-level finances and ensures efficient resource management.

    Upon clicking on "Save" button a group will be created in the account as shown below.

    Managing Group Information

    Once a group is created in the account, administrators can view, edit, and manage its details.

    View Group Information

    Click on the Group ID to navigate to the Group View page, as shown below. This page displays:

    • Group details such as name, description, creator, and associated information.

    • Financial details, including the "Deduct from Account Balance" option.

    Credits Management

    Allocation/Deallocation History: A grid is available to display all credit and debit transactions, including transaction IDs and the amounts.

    Allocate/Deallocate Credits: Use the "Edit" button or click on the Group ID to update credit allocations. This option is available only when the finance configuration for certificates is set to "Deduct from Group Balance". Administrators can manage group credits using the following options:

    Allocate/Deallocate Credits to Group

    Select this option to credit/debit an amount into the group's balance.

    The credited amount will be deducted/added from/to the account balance.

    User Access

    A list of users with access to the group is displayed, including their roles, employee IDs, and account status.

    Edit Group Information

    Click on the "Edit" button to:

    • Update group details.

    • Manage credit allocations.

    • Adjust user permissions.

    Important Note:

    In sub-partner or enterprise accounts, there is no provision to add multiple groups. All group-related operations and configurations are limited to the default group structure provided within the account.

    Discover Certificates

    Discover Certificates is designed to discover and monitor all your SSL/TLS certificates, regardless of the issuing Certificate Authority (CA). It features the unique emSign Bot, capable of operating within isolated networks and protected environments to scan and gather certificate details. Scans are conducted according to predefined settings, and the results are automatically displayed on the portal interface.

    Enterprise users can view the discovered certificates along with the servers where they are deployed. The Hub interface allows users to track emSign Bot scans, providing details on the last completed scan and the next scheduled scan. Users can also initiate manual, ad-hoc scans directly from the interface. The emSign platform simplifies certificate management, whether the organization handles a few certificates or thousands.

    Key Features

    • Discovery Dashboard: Provides a comprehensive overview of certificates issued via emSign and those detected by emSign Bot scans.

    • Certificate Results: Displays the total number of scanned certificates from various emSign bots.

    • My emSign Bots: Lists all emSign bots associated with the account for easy monitoring and management.

    • Download emSign Bot: Access and download available emSign bots directly from the platform.

    Monitor Certificate Results

    The Certificate Results feature allows users to view all certificates discovered by emSign Bots. To access this page, navigate to Certificates > Discover Certificates. Upon clicking Discover Certificates, the results page will display a list of certificates, showing their Common Name (CN) or Subject Alternative Names (SANs).

    Certificates Discovered via Bot

    All certificates identified through emSign Bots are displayed on this screen. Users can apply filters to refine the list using Common Name (CN) or SAN.

    By clicking Advanced Search, users can filter the certificate results based on:

    • Date Range

    • Location (Server/Port)

    • Issuer CA

    • Certificate Type

    Certificate Details

    Clicking on a CN/SAN value navigates to the Certificate Results View page, which provides the following information:

    • Certificate Info & Validity

    • Authority Information Access (AIA) details

    • Issuer CA information

    • Additional Information

    Quick Actions

    Account users can utilize certificate quick actions from this view, enabling fast and efficient management of discovered certificates.

    Download Discovered Certificate

    Navigate to Discover Certificates.

    Click on the relevant Domain hyperlink to open the Certificate Results page.

    Click the “Download Certificate" button.

    A download dialog will appear, allowing you to proceed with the download as shown below.

    The certificate will be downloaded successfully.

    How to scan for vulnerabilities

    • After the discovery scan is complete, for all the certificates listed, in the table under Actions column Scan Vulnerabilities icon is present

    • Click on Scan Vulnerabilities icon, vulnerability result popup is displayed with the Certificate status.

    • Based on the status of the certificate further actions can be decided.

    Download Discovered Certificate

    Go to Discover Certificates.

    • Click on the relevant Domain hyperlink to open the Certificate Results page.

    • Click the "Download Certificate" button.

    • A download dialog will appear, allowing you to proceed with the download as shown below.

    • The certificate will be downloaded successfully.

    Configure Scan Targets

    Setting up scan targets involves specifying the locations, systems, or assets that automated bots will scan to identify and assess digital certificates. This ensures that certificates across your infrastructure are valid, up-to-date, and correctly configured. The scan targets define which servers, applications, or networks will be monitored.

    Scan targets can be configured through the following methods:

    • SSL: Monitor SSL/TLS certificates for expiration, configuration, and compliance.

    • HSM (Hardware Security Module): Scan and verify certificates stored within HSMs.

    • LDAP (Lightweight Directory Access Protocol): Monitor certificates in LDAP-based directories for validity and usage.

    • Certificate Store: Scan certificates stored within system or application certificate stores.

    SSL/TLS

    To scan certificates from the server, the account administrator must provide one of the following:

    • FQDN (Fully Qualified Domain Name)

    • IP Address or IP Address Range

    • TCP Port

    Users can define a port range for scanning when performing SSL/TLS certificate scans on web servers.

    For ex: 1-899.

    To add multiple scan targets, click the "(+)" button, as shown below.

    Import Scan Targets from Existing emSign Bots

    • To import scan targets from an existing emSign Bot, the administrator can click on the "Import Settings" option.

    • Upon selecting "Import Settings", a modal will appear, as shown below.

    • The administrator can choose a bot name from the available list and click the "Import" button to proceed.

    Setup up Scan Schedule

    Configure the scan schedule using the following options:

    • On Demand: Selecting this option allows the administrator to run scans at any time, without time restrictions.

    • Daily: If this option is selected, the administrator must specify the scan date, time, and time zone. Once configured, the system will automatically scan the certificates from the server daily at the scheduled time.

    • Weekly: When this option is selected, the administrator provides the scan day, time, and time zone. The system will automatically perform the scan every week at the specified time.

    HSM (Hardware Security Module)

    To scan certificates via an HSM (Hardware Security Module):

    • Upload or paste the HSM configuration.

    • Enter the HSM password.

    • Select the Certificates and Keys checkboxes as needed.

    • Click Start Action to initiate the scan.

    To add multiple scan targets, administrators can click the "(+)" button, as shown below.

    The account administrator can set up a Scan schedule as per their preference.

    LDAP (Lightweight Directory Access Protocol)

    To scan certificates via LDAP (Lightweight Directory Access Protocol):

    • Provide the LDAP URL and Container Name.

    • Enter the Admin DN (Distinguished Name) and Password.

    • Click Start Action to begin the scan.

    To add multiple scan targets, administrators can click the "(+)" button, as shown below.

    The account administrator can set up a Scan schedule as per their preference.

    Certificate Store

    When scanning certificates via the Certificate Store, the IP address of the system is automatically fetched, and all certificates installed on the system are scanned.

    The account administrator can set up a Scan schedule as per their preference.

    Cloud Providers (AWS)

    Discovery through AWS/Cloud Providers include

    Select the scan target as Cloud Providers

    • Enter the Access Key

    • Enter the Secret Key

    • Select the Region

    And click on Save button.

    Run the bot and all the certificates are scanned and Displayed under Discovered From as Cloud Providers in Discover Certificates page.

    The account administrator can set up a Scan schedule as per their preference.

    File System

    When scanning certificates via the File System, the system’s IP address is automatically fetched, and all available certificates are scanned.

    JKS Discovery

    Discovery of JKS include scanning the java key stores for SSL/TLS certificates and public key infrastructure (PKI) certificates used for secure communications, authentication, and encryption in Java applications.

    By entering the file system path, the certificates are scanned and discovered for renewal and provisioning.

    Note: Only certificates that are downloaded or extracted on the system will be detected during the scan.

    The account administrator can set up a Scan schedule as per their preference.

    SSH

    To scan certificates via SSH:

    • Provide the IP address, Username and Password.

    • Click Start Action to initiate the scan.

    To add multiple scan targets, administrators can click the "(+)" button, as shown below.

    The account administrator can set up a Scan schedule as per their preference.

    F5-BIG-IP

    To scan certificates via F5-BIG-IP:

    • Provide the IP address, Port number, Username and Password.

    • Click Start Action to initiate the scan.

    To add multiple scan targets, administrators can click the "(+)" button, as shown below.

    The account administrator can set up a Scan schedule as per their preference.

    Cloudflare

    To scan certificates via Cloudflare using their API:

    • Enter Cloudflare Email ID (Email associated with your Cloudflare account)

    • Enter Cloudflare Authkey (API Key)

    • Select Cloudflare Zone ID (Zone ID for the domain you’re working with)

    To add multiple scan targets, administrators can click the "(+)" button.

    The account administrator can set up a Scan schedule as per their preference.

    Certificate Discovery

    Discover Certificates serves as a comprehensive tool for identifying, managing, and securing digital certificates across your infrastructure. It enables users to initiate a discovery scan, and upon completion, review the list of discovered certificates. The scan results provide key details, including the issuer, expiration dates, and usage contexts.

    How to view certificates 

    To view the discovered certificate details, click on the CN/SAN hyperlink.

    How to order certificates 

    Option 1: Once the certificate is initiated or configured, selecting the Order checkbox, will successfully issue the certificate

    Option 2: Rotate

    Once the certificate is initiated or configured, click on Rotate button, the certificate will be rotated and issued successfully.

    How to download certificates 

    Option 1: Downloading the Certificate

    After the certificate is issued, follow these steps to download it:

    Click the Download icon under Actions tab.

    • A download popup will appear, allowing you to select the desired format to download.

    • Choose the format and click the Download button.

    • The certificate will be downloaded successfully.

    Option 2: Viewing and Downloading via CN/SAN Hyperlink

    • Click on the CN/SAN hyperlink to open, View Discover Certificate page.

    • In the Quick Actions section on the top-right corner, click Download Certificate

    • On the top right corner of the page, under Quick Actions click on Download Certificate, the certificate will be downloaded successfully.

    • Format to download popup is not displayed.

    How to Rekey certificate

    • Select the certificate with status Issued or Deployed, click on Rekey button.

    • Enter the remarks and click Rekey.

    How to Revoke/Suspend certificate

    • Select the certificate, click on Revoke/Suspend button.

    • Select the Revoke Mode, enter the remarks and click on Revoke/Suspend button.

    Supported Devices and Platforms

    eMudhra CLM supports a wide range of devices and platforms for automated certificate provisioning, ensuring compatibility with modern IT infrastructures. Below is a detailed list of supported categories, devices, and platforms, along with their use cases.

    Web Servers

    Web servers host websites and require TLS certificates to enable secure HTTPS connections, protecting data in transit.

    Expiration Date (e.g., certificates expiring within a specified period)

  • Cloud Providers: Identify and monitor certificates deployed across cloud environments.

  • File System: Monitor certificates stored in file directories for configuration and expiration.

  • SSH: Scan SSH keys and certificates to ensure secure access configurations.

  • Monthly: For this option, the administrator sets the scan date, time, and time zone. The system will conduct the scan on the specified date and time each month.
  • Stop if scan run time exceeds: Enabling this option ensures that the scan will automatically stop if it exceeds the specified time, particularly if the bot encounters issues while scanning certificates from the server.

  • Advanced Settings: Administrators can enable this option to access additional settings, such as multi-thread configuration and detailed scan options for enhanced control.

  • Apache

    Yes

    2.2.X, 2.4.X

    Supports automated deployment via ACME or custom scripts. Compatible with mod_ssl for TLS configuration.

    Nginx

    Yes

    0.8.X - 1.26.X

    Integrates with ACME for automated certificate issuance and renewal. Supports HTTP/2 and modern TLS protocols.

    Microsoft IIS

    Yes

    5.0, 5.1, 6.0, 7.0, 8.0, 8.5, 10.0

    Integrates with Windows Certificate Store for seamless certificate management. Supports SCEP and EST protocols.

    Jetty

    Yes

    Java-based server with support for automated certificate deployment via Java KeyStore integration.

    Use Case: Automating TLS certificate deployment on Apache or Nginx ensures websites maintain secure connections without manual intervention, ideal for high-traffic environments.

    Application Servers

    Application servers host business-critical applications, often requiring certificates for secure communication and authentication.

    Device/Platform

    Supported

    Version

    Notes

    Tomcat

    Yes

    9.X, 10.X

    Supports Java KeyStore for certificate storage and automated updates via eMudhra CLM.

    JBoss

    Yes

    Compatible with automated provisioning using Java KeyStore or PKCS12 files.

    WebSphere

    Yes

    12.2.1.X (12c), 14.1.1 (14c)

    Integrates with IBM’s key management tools for certificate automation.

    Use Case: Application servers hosting internal APIs or customer-facing services benefit from automated certificate renewals to ensure uninterrupted secure communication.

    Cloud Services

    Cloud platforms require certificates for secure access to resources, APIs, and services.

    Device/Platform

    Supported

    Version

    Notes

    Azure Key Vault

    Yes

    Integrates with eMudhra CLM for automated certificate import and renewal in Azure environments.

    AWS Key Manager

    Yes

    Supports automated certificate deployment to AWS resources via AWS SDK or CLI.

    AWS Certificate Manager

    Yes

    Enables seamless integration for managing public and private certificates in AWS.

    Use Case: Cloud services like AWS Certificate Manager automate certificate provisioning for load balancers and APIs, ensuring secure scalability in cloud-native environments.

    Load Balancers

    Load balancers distribute traffic across servers and require TLS certificates for secure connections.

    Device/Platform

    Supported

    Version

    Notes

    F5 BIG-IP

    Yes

    12.X-16.X

    Supports automated certificate deployment via iControl REST API or ACME.

    HAProxy

    Yes

    Integrates with ACME for automated certificate management in high-availability setups.

    Use Case: Load balancers in enterprise networks use automated certificate provisioning to maintain secure traffic routing without manual updates.

    Content Delivery Networks (CDNs)

    CDNs deliver content globally and require certificates to ensure data integrity and performance.

    Device/Platform

    Supported

    Version

    Notes

    Akamai

    Yes

    Not Applicable

    Supports automated certificate deployment via Akamai’s EdgeGrid API or ACME.

    Use Case: CDNs like Akamai use automated certificate provisioning to secure content delivery across global edge servers, ensuring low latency and high security.

    Hardware Security Modules (HSMs)

    HSMs securely manage and store cryptographic keys and certificates.

    Device/Platform

    Supported

    Version

    Notes

    All HSMs

    Yes

    Compatible with major HSM vendors (e.g., Thales, Entrust, Utimaco) via PKCS11 or proprietary APIs.

    Use Case: HSMs in financial or healthcare environments benefit from automated certificate provisioning to securely manage keys for compliance with regulations like PCI-DSS or HIPAA.

    Repositories

    Repositories store and manage digital certificates and keys centrally.

    Repository

    Supported

    Version

    Notes

    Active Directory

    Yes

    Windows Server 2012 R2

    Windows Server 2016

    Windows Server 2019

    Windows Server 2022

    Integrates with eMudhra CLM for automated certificate enrollment and management in Windows environments.

    OpenLDAP

    Yes

    Supports automated certificate storage and retrieval in open-source LDAP deployments.

    Use Case: Centralized repositories like Active Directory streamline certificate management for large-scale enterprise networks.

    Certificate Stores

    Certificate stores securely manage certificates within operating systems or applications.

    Certificate Store

    Supported

    Version

    Notes

    Windows Certificate Store

    Yes

    Supports automated certificate import and renewal via SCEP, EST, or CMP protocols.

    Use Case: Windows Certificate Store automation ensures seamless certificate updates for Windows-based applications and services.

    Supported Automated Certificate Management Protocols

    eMudhra CLM leverages industry-standard protocols to automate certificate enrollment, issuance, and renewal. Each protocol is designed to address specific use cases and security requirements.

    Protocol

    Supported

    Version

    Description

    SCEP (Simple Certificate Enrollment Protocol)

    Yes

    Simplifies certificate enrollment for devices and applications, ideal for mobile and IoT environments.

    CMP (Certificate Management Protocol)

    Yes

    Provides a comprehensive framework for managing the entire certificate lifecycle, including issuance, renewal, and revocation.

    EST (Enrollment over Secure Transport)

    Yes

    Enhances security for certificate enrollment using HTTPS, suitable for modern web-based environments.

    Use Case: ACME is commonly used with Let’s Encrypt or eMudhra’s CA to automate certificate renewals for public-facing websites, while CMP is ideal for complex enterprise PKI environments.

    Device/Platform

    Supported

    Version

    Notes

    WebLogic

    Yes

    Supports Oracle’s key management and automated certificate lifecycle management.

    Imperva WAF (On – Prem)

    Yes

    X6530, X4530

    Certificate deployment for Imperva Hardware-based Web Application Firewalls

    Imperva (Cloud WAF)

    Yes

    Not Applicable

    Supports automated certificate updates for Imperva’s cloud security solutions.

    ACME (Automatic Certificate Management Environment)

    Yes

    Automates issuance and renewal of SSL/TLS certificates, widely used for web servers and cloud services.

    Multi-factor & Trusted login

    Existing account users can create additional accounts by selecting either "Enterprise Account Sign-Up" or "Partner Account Sign-Up" from the login page of the CERTInext Portal.

    1. Navigating to the Account Creation Page:

    • Upon clicking Enterprise Account Sign-Up or Partner Account Sign-Up, the user will be redirected to the respective account creation page, as described earlier.

    1. Submitting Required Information:

    • Provide all the necessary details on the account creation form.

    • Click the "Sign Up" button to submit the request.

    1. Account Activation Process:

    • An account activation email will be sent to the registered email ID.

    • Open the email and click the "Activate Account" button to continue.

    1. Account Authentication:

    • Clicking the "Activate Account" button will redirect the user to the Account Authentication page.

    • The password for the existing account will be auto-filled on this page.

    • Click "Authenticate" to proceed.

    1. Successful Authentication:

    • A confirmation message, "Account Authenticated Successfully", will be displayed upon successful authentication.

    1. Logging into the Portal:

    • After authentication, the user can log in by entering their email ID and password.

    • Click the "Sign In" button to proceed to the Choose Your Account to Sign In page.

    1. Choosing an Account:

    • A list of all Partner and Enterprise accounts associated with the user will be displayed.

    • Click the "Proceed" button next to the desired account to continue.

    1. Account Expiration Notification:

    • If any Reseller or Enterprise account has expired, the status will be clearly displayed on the account selection page.

    User and Group Management

    Users

    • By default, last 10 users be viewed as shown below.

    • The list of users can be filtered & searched by Name. Click the "Search" button to apply the filter.

    Create User to your account

    To create a new user for your account:

    • Click the "New User (+)" option to navigate to the Add User creation screen.

    Fill in the following details:

    • Name

    • Email

    • Mobile Number

    • Designation

    Group Access Options:

    • If the group access checkbox is selected, the administrator can restrict the user to specific groups.

    • If unchecked, the user will have default access to all groups.

    Role Assignment:

    • Use this option to assign a role to the user. The permissions available to the user will vary based on the assigned role.

    • Click the "Save" button to finalize the process.

    An account activation email will be sent to the provided email address, including a link to activate the user account.

    Post-Creation Management

    Edit User Information: Once the user is created, administrators can edit the user details or adjust group access.

    User Activation

    The new user will receive an account activation email containing the account name and an activation link.

    Upon activation, the user can access the account with permissions based on the assigned role.

    Group Management

    Groups can represent cost centres, business units, projects, or similar organizational units. Administrators can manage and customize groups to streamline access and certificate management.

    Adding and Managing Groups

    Default Group

    • A default group is pre-configured in the group menu upon account activation.

    • By default, account users cannot add multiple groups. To add multiple groups, the account administrator must request assistance from an eMudhra Account Manager.

    Filtering Groups

    • Use the Group Name filter to search and filter the list of groups, as shown below.

    Configuring a New Group

    • Enter the Group Name.

    • Provide a Short Description.

    Upload a Logo (if required).

    Use the access configuration to control group visibility:

    • Checked: Restrict access to specific users.

    • Unchecked: Grant group access to all users by default.

    Specify the certificate request settings for Organizations and Domains associated with the group.

    This feature allows administrators to tailor group configurations to meet organizational requirements effectively.

    Organizations

    Administrators can configure certificate request permissions for groups using the "All" or "Specific" options for Organizations.

    • All- If this option is selected, the group will have access to all organizations within the account.

    • Specific- If this option is selected, the administrator can restrict the group’s access to specific organizations available in the account.

    Domains

    Administrators can configure certificate request permissions for groups using the "All" or "Specific" options for Organizations.

    • All- If this option is selected, the group will have access to all domains within the account.

    • All- If this option is selected, the group will have access to all domains within the account.

    • Specific- If this option is selected, the administrator can restrict the group’s access to specific domains available in the account.

    Finance

    Administrators can define the payment mode for certificate requests using the Finance option. This ensures that payment settings are aligned with organizational policies and requirements.

    Deduct from Account Balance

    If this option is selected at the new request level, the amount for any certificate request placed using the group will be deducted directly from the group's balance.

    Allocate Credits to the Group

    Check the "Allocate Credits to this Group from Account Balance" option.

    Enter the following details:

    • Amount: Specify the amount to be allocated.

    • Supporting Document: Attach relevant documentation (if required).

    • Remarks: Add any remarks for reference.

    Upon allocation, the specified amount will be debited from the account balance and credited to the group.

    This feature enables efficient fund management and ensures that group-level balances are appropriately maintained.

    Enforce Spend Limit

    Administrators can set spending thresholds for groups to manage and control expenses:

    Enable Spend Limit:

    • Check the "Enforce Spend Limit" option to activate spending restrictions for a group.

    • A threshold amount field will appear.

    Set Threshold Amount:

    • Enter the desired threshold amount for the group.

    • This ensures that spending does not exceed the allocated limit, providing better financial oversight.

    This feature helps in maintaining budgetary control and ensuring accountability at the group level.

    Deduct from Group Balance

    Enable this option to allow deductions directly from the group's balance for any certificate requests made using the group.

    When this option is selected, any charges for new requests will automatically be debited from the group's allocated balance.

    Allocate Credits to the Group

    To allocate funds to a group, follow these steps:

    • Select the "Allocate Credits to this Group from Account Balance" checkbox.

    • Enter the following details:

    Amount: Specify the amount to allocate.

    Supporting Document: Attach relevant documentation if required.

    Remarks: Add any notes or comments related to the fund allocation.

    • Upon saving, the specified amount will be debited from the account balance and credited to the group.

    This functionality allows precise control over group-level finances and ensures efficient resource management.

    Upon clicking on "Save" button a group will be created in the account as shown below.

    Managing Group Information

    Once a group is created in the account, administrators can view, edit, and manage its details.

    View Group Information

    Click on the Group ID to navigate to the Group View page, as shown below. This page displays:

    • Group details such as name, description, creator, and associated information.

    • Financial details, including the "Deduct from Account Balance" option.

    Credits Management

    Allocation/Deallocation History: A grid is available to display all credit and debit transactions, including transaction IDs and the amounts.

    Allocate/Deallocate Credits: Use the "Edit" button or click on the Group ID to update credit allocations. This option is available only when the finance configuration for certificates is set to "Deduct from Group Balance". Administrators can manage group credits using the following options:

    Allocate/Deallocate Credits to Group

    Select this option to credit/debit an amount into the group's balance.

    The credited amount will be deducted/added from/to the account balance.

    User Access

    A list of users with access to the group is displayed, including their roles, employee IDs, and account status.

    Edit Group Information

    Click on the "Edit" button to:

    • Update group details.

    • Manage credit allocations.

    • Adjust user permissions.

    Important Note:

    In sub-reseller or enterprise accounts, there is no provision to add multiple groups. All group-related operations and configurations are limited to the default group structure provided within the account.

    Multifactor Authentication and Single Sign On

    Role-based access control

    The emSign CERTInext platform offers six roles, each designed to address specific responsibilities and access requirements within the system:

    • Administrator

    • Manager

    • Finance Manager

    • Standard User

    Administrator

    The Administrator role provides full access to the platform, enabling comprehensive management of users, groups, organizations, and financial operations. This role is intended for system overseers responsible for administrative and operational tasks.

    Key Access Controls

    Full portal access, including the Dashboard.

    Manage:

    • Certificates (requests, orders, expiring certificates).

    • Organizations, domains, groups, and users.

    • Private and public Certificate Authorities (CAs) and products.

    • Sub-accounts and price lists for sub-accounts.

    Access to:

    • REST and ACME APIs.

    • Financial features.

    • Audit logs and tools.

    • Reports and account settings.

    Create user invitations and assign roles.

    Manager

    The Manager role focuses on overseeing groups, users, and orders while managing sub-accounts and associated group features. This role excludes full administrative and financial permissions.

    Key Access Controls

    Dashboard access (billing alerts, low credit alerts, and self-orders tracking).

    Manage:

    • Organizations and domains.

    • Groups (including credit allocation) and users.

    • Private and public CAs and products.

    • Sub-accounts and price lists for sub-accounts.

    Access to:

    • REST and ACME APIs.

    • Financial features.

    • Audit logs, reports, and tools.

    Finance Manager

    The Finance Manager role is tailored for managing financial operations, such as fund allocation, price lists, and finance-related features, without broader administrative control.

    Key Access Controls

    Dashboard access (billing alerts and self-orders tracking).

    Manage:

    • Groups (credit allocation) and users.

    • Sub-accounts and price lists for sub-accounts.

    • Private and public CAs and products.

    Access to:

    • REST and ACME APIs.

    • Financial features.

    • Audit logs, reports, and tools.

    Standard User

    The Standard User role allows for requesting certificates and accessing group orders. It includes broader access than the Basic User but lacks administrative permissions.

    Key Access Controls

    Dashboard access (billing alerts and self-orders tracking).

    Manage:

    • Private and public CAs.

    Access to:

    • REST and ACME APIs.

    • Reports, tools, and profile settings.

    Basic User

    The Basic User role provides minimal permissions, focusing on personal tasks such as requesting certificates and managing profile information.

    Key Access Controls

    Dashboard access (billing alerts and self-orders tracking).

    Access to:

    • REST and ACME APIs.

    • Reports, tools, and profile settings.

    Discovery User

    The Discovery User role is dedicated to users responsible for certificate discovery operations. This includes tasks such as key management, key store handling, and accessing discovery-related features.

    Enforce 2FA

    To enhance account security, the platform offers the option to enable Two-Factor Authentication (2FA) via T-OTP (Time-Based One-Time Password).

    Enabling 2FA

    • Check the box for "Enforce 2FA via T-OTP authentication mode" in the Account Configuration settings.

    • Note that enabling 2FA is optional and can be configured by the administrator based on company policy.

    What Happens After Enabling

    Once enabled, users will need to configure T-OTP during their first login by:

    • Scanning the provided barcode[M21] .

    • Entering the generated OTP.

    T-OTP authentication will then apply to all users associated with the account.

    This feature ensures an added layer of security for platform access.

    IP Restrictions

    The IP Restrictions feature enables administrators to restrict access to business data by specifying a range of authorized IP addresses. This ensures secure and controlled access to sensitive information.

    Configure IP Restrictions

    Select a User: Choose the user for whom the restriction will apply. Alternatively, you can apply the restriction to all users.

    Enter Allowed IP Range:

    • Specify the Allowed IP Start Address.

    • Specify the Allowed IP End Address.

    Add Description (Optional): Provide a description for the IP restriction for easy identification.

    This feature enhances security by ensuring that only authorized IP addresses can access your business data.

    A created IP Restriction Rule can be disabled at any time by the administrator, providing flexibility to adjust access controls as needed.

    Adding Credits to your account

    Adding Credits

    A message to Add Credits will be displayed when the account balance falls below the threshold set by the account administrator.

    • Clicking the "Add Credits" hyperlink redirects to Billing & Payments > Add Credits.

    • Follow the prompts to add funds and ensure your account balance is sufficient for future transactions.

    These features ensure smooth account operations by keeping billing information updated and maintaining adequate account credits.

    Billing and Payments

    Billing & Payments

    Add Credits

    emSign CERTInext offers two modes of payment to add credits: Online Payment & Offline Payment.

    To add credits to your account, navigate to Billing & Payments > Add Credits.

    Online Payment

    Upon selecting online Payment, the current account balance is displayed at the top.

    • Enter the Amount to be credited, then click the Pay button

    The system will redirect to the payment gateway. Enter your card details to proceed with the payment

    To verify the payment status, enter the Payment ID under the "Recheck Payment Status" section and click the Recheck button.

    Offline Payment

    • On selecting offline Payment, the current account balance is displayed at the top.

    • Enter the offline credits payment details and click the "Make Payment" button.

    • Once the "Submit Offline Payment" button is clicked, a thank you message will displayed on the screen. Upon eMudhra finance approval, the amount will be credited into the account.

    Invoices

    The Invoices page provides a comprehensive list of all generated invoices for your certificate orders and services. From this page, you can download, review, and pay invoices, making it easy to track your organization's billing and payments.

    Download Invoice

    Via the Certificates Section

    • Navigate to Certificates > Orders.

    • Open the View Order page for the specific order.

    • Click on Download Invoice to download a copy with all payment details.

    Via Billing & Payments Section

    • Navigate to Billing & Payments.

    • Under Action, click on the Download icon next to the desired invoice.

    • The invoice will then be downloaded to your system.

    Download Credit Note

    • To download any credit note, go to Certificates > Orders > View order page.

    • This order action will be displayed when the Order status is cancelled (or) Rejected.

    • On click of "Download Credit Note" a credit note will be downloaded with all the payment information.

    Employee ID
    Basic User
  • Discovery User