Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
emSign is a brand, a business unit of eMudhra for providing certificate services under eMudhra's own root certificates. eMudhra is a leading Certifying Authority (CA) that specializes in providing digital certificate solutions to secure online communications and transactions. With a strong reputation for trustworthiness, reliability, and security, eMudhra has become a trusted name in the field of digital certificates.
emSign is a brand and a business unit of eMudhra, providing certificate services under eMudhra's own root certificates. eMudhra, a leading Certifying Authority (CA), specializes in delivering digital certificate solutions to secure online communications and transactions. Renowned for its trustworthiness, reliability, and security, eMudhra has established itself as a trusted name in the field of digital certificates.
As a first CA from India to get globally accredited, emSign holds a unique position among a select few companies worldwide. emSign plays a critical role in fostering trust in the digital landscape by issuing digital certificates that act as electronic credentials, verifying the identity of entities engaged in online communications, such as websites, email servers, and software applications. emSign certificates are used globally by businesses, governments, and organizations to secure their online presence, protect sensitive information, and authenticate identities.
emSign offers a comprehensive range of digital certificate solutions to address diverse security needs. These include SSL/TLS certificates for securing websites with robust encryption, code signing certificates for authenticating software applications, document signing certificates for securing digital documents, and email certificates for encrypting email communication. Additionally, emSign provides managed PKI solutions for organizations requiring extensive certificate management within their complex environments. Our certificates are widely adopted with thousands of companies worldwide relying on them.
Beyond its technical expertise, emSign is recognised for its exceptional customer support. The company offers 24/7 customer assistance through various channels, including email and phone, helping customers with everything from certificate issuance to installation and beyond. emSign also provides a user-friendly certificate management platform, enabling customers to easily manage and monitor their certificates.
emSign is a Certifying Authority that has built a strong reputation for trust, reliability, and security in the digital world. Through its rigorous validation process, innovative solutions, robust security measures, and outstanding customer support, emSign plays a pivotal role in securing online communications and transactions, helping businesses and organizations establish trust in the digital realm.
Domain Validation - Single Domain: Safeguard your website with our Domain Validation (DV) SSL certificate, delivering a secure and encrypted browsing experience for your visitors.
Domain Validation - Single Wildcard Domain: Wildcard certificates eliminate the need to purchase separate SSL products for each subdomain. With a single wildcard certificate, you can secure unlimited subdomains saving both time and costs.
emSign is a global digital certificate provider and a business unit of eMudhra, a publicly listed, globally accredited Certifying Authority (CA) with over 16 years of expertise in operating CAs in large markets. emSign is headquartered in Salt Lake City, Utah and Bangalore, India
With offices in 10 countries and clients across 30+ nations, eMudhra delivers cutting-edge digital trust solutions to secure online communications and transactions.
Key Highlights:
Comprehensive Digital Certificate Offerings:
SSL/TLS Certificates: Secure websites with robust encryption.
Domain Validation - Multi-Domain Wildcard: Multi-Domain Wildcard certificates extend the flexibility of SAN SSL certificates by allowing the use of wildcard domains. This powerful combination enables organizations to secure multiple primary and subdomains under a single SSL installation, reducing complexity and cost.
Organization Validation - Single Domain: Establish trust with an Organization Validation (OV) SSL Certificate which verifies the authenticity of your organization and providing secure browsing experience for your visitors.
Organization Validation - Single Wildcard Domain: Wildcard certificates for OV domains simplify certificate management by securing unlimited subdomains with a single certificate, reducing the need for multiple installations and minimizing operational overhead.
Organization Validation - Multi-Domain: OV Multi-Domain SSL Certificates offer the same versatility as SAN SSL certificates but with the added assurance of organization-level validation. They are also called Subject Alternative Name Certificates (SAN SSL) or Unified Communication Certificates (UCC SSL). These certificates streamline the process of securing multiple domains with a single installation, ensuring both trust and efficiency.
Organization Validation - Multi-Domain Wildcard: Multi-Domain Wildcard certificates combine the power of multi-domain management with wildcard functionality, providing seamless protection for both primary and subdomains. With a single OV Multi-Domain Wildcard certificate, organizations can secure their entire domain structure while optimizing costs.
Extended Validation - Single Domain: For the highest level of trust, our Extended Validation (EV) SSL Certificate highlights your website authenticity by displaying the organization’s name in the browser address bar, reinforcing credibility and building customer confidence.
Extended Validation - Multi-Domain: EV Multi-Domain SSL Certificates offer robust security and validation for organizations managing multiple domains. These are also called Subject Alternative Name Certificates (SAN SSL) or Unified Communication Certificates (UCC SSL). These certificates simplify management and reduce costs while providing the assurance of the highest.
Code Signing Certificates: Authenticate and protect software.
Document Signing Certificates: Secure digital documents with legal electronic signatures.
Email Certificates: Encrypt and authenticate communications.
Managed PKI Solutions: Simplify certificate management for complex environments.
Proprietary Expertise:
Innovator in Identity Management, PKI, and eSignature workflows.
Solutions deployed in Fortune 500 companies, leading banks, and eGovernment programs worldwide.
Global Reach and Trust:
Certificates trusted by thousands of businesses, governments, and organizations globally.
Extensive experience in enabling secure communications, safeguarding sensitive data, and verifying digital identities.
Exceptional Customer Support:
24/7 assistance through multiple channels.
Intuitive certificate management platform for seamless monitoring and control.
eMudhra’s leadership in digital security, supported by its innovative technology and unmatched reliability, empowers businesses and governments to establish trust in the digital landscape.
User can login to the CERTInext portal with Digital Certificate.
To add the certificate, navigate to My Profile > Add Certificate.
Add Certificate
Digital Certificate can be added in two ways, Upload from system or Read from Store.
Upload: User can upload only certificates of the format .cer.
Note: Files other than .cer extension cannot be uploaded and used for authentication and login.
Read from Store: The security certificates installed in the browser are listed and user can select and add the certificate.
Change Certificate
Users can change the certificate for login with a different one with same steps as above.
Reseller/Enterprise/Retail users can create new request under New Request. Account users can create a new request, manage requests and track expiring certificates which are going to expiry in a specific time range.
Effective key management is crucial for maintaining data security and compliance in today's digital landscape. CERTInext offers robust key management solutions tailored to various organizational needs.
To enhance account security, the platform offers the option to enable Two-Factor Authentication (2FA) via T-OTP (Time-Based One-Time Password).
Enabling 2FA
Check the box for "Enforce 2FA via T-OTP authentication mode" in the Account Configuration settings.
Note that enabling 2FA is optional and can be configured by the administrator based on company policy.
What Happens After Enabling
Once enabled, users will need to configure T-OTP during their first login by:
Scanning the provided barcode .
Entering the generated OTP.
T-OTP authentication will then apply to all users associated with the account.
This feature ensures an added layer of security for platform access.
IP Restrictions
The IP Restrictions feature enables administrators to restrict access to business data by specifying a range of authorized IP addresses. This ensures secure and controlled access to sensitive information.
Configure IP Restrictions
Select a User: Choose the user for whom the restriction will apply. Alternatively, you can apply the restriction to all users.
Enter Allowed IP Range:
Specify the Allowed IP Start Address.
Specify the Allowed IP End Address.
Add Description (Optional): Provide a description for the IP restriction for easy identification.
This feature enhances security by ensuring that only authorized IP addresses can access your business data.
A created IP Restriction Rule can be disabled at any time by the administrator, providing flexibility to adjust access controls as needed.
Trust is the backbone of every secure digital interaction—whether you’re making an online purchase, signing a contract electronically, or sending confidential data. In the context of Public Key Infrastructure (PKI), “trust” refers to the confidence placed in a Certificate Authority (CA) to accurately verify identities and issue digital certificates that prove the legitimacy of websites, applications, documents, and other online entities. This confidence is shared across browsers, operating systems, and software applications worldwide, ensuring that any certificate issued by a reputable CA is recognised as trustworthy.
As a global CA, emSign’s primary responsibility is to maintain and strengthen this trust through stringent validation processes, robust security practices, and ongoing compliance with industry standards such as the CA/Browser Forum Baseline Requirements and WebTrust/ETSI audits. When emSign issues a digital certificate, the recipient gains the advantage of a verifiable chain of trust that links the certificate back to emSign’s root certificate embedded in trusted root stores. These root stores are curated by browsers, operating systems, and device manufacturers, ensuring that any certificate stemming from emSign is automatically accepted by end users’ systems around the globe.
In an interconnected world, security underpins the trust and reliability of digital communications. Ensuring that your data, transactions, and interactions remain confidential and tamper-proof is pivotal to conducting business online. For Certificate Authorities (CAs), this means following strict protocols and safeguarding the entire certificate issuance process so that end users and organizations can operate in an environment free from the risks of fraud, impersonation, and cyberattacks.
emSign’s primary focus is to enable secure digital experiences by issuing high-assurance certificates. These certificates verify the identities of individuals, organizations, and even machines, ensuring that each entity is who it claims to be. eMudhra is committed to maintaining the highest standards of security and compliance to meet the evolving needs of our clients. We are compliant with industry-leading frameworks, which include:
WebTrust for CAs (Certificate Authorities):
The audit checks if the CA's operations meet the standards set forth in its Certificate Policy and Certification Practice Statement. This is crucial for ensuring the security of digital certificates, which are used for encrypting communications and verifying identities online.
Ideal for: Customers using the online platform for personal or business certificate needs.
Any customer placing orders in emSign.com is considered as Retail customer.
Retail accounts provide similar functionality to enterprise accounts, giving users access to the following:
Portal Access: Manage certificates, domains, and organizations through a user-friendly interface.
API Integration: Utilize REST and ACME APIs for key management.
Applicable only for SSL OV & EV Certificate orders
To download any Interim DV Certificate, navigate to the order: Go to Certificates > Orders > View order
Click on the of "Download Interim DV" which displays a a modal with all the necessary information.
In the modal, click on "Download interim DV" button to download the certificate.
CERTInext is a unified platform that is part of emSign’s offerings for seamless digital certificate management, catering to enterprises, resellers, and individuals. It simplifies certificate lifecycle management with features like issuance, renewal, discovery, and monitoring. Key highlights include:
Certificate Management: Real-time insights, automated lifecycle handling, and pre-validation for instant issuance.
Automation & Integration: Supports ACME automation, REST APIs, and Bots for efficient large-scale operations.
Enterprise Features: Private PKI, role-based access, detailed reporting, and departmental management.
Reseller / Enterprise Sign up & Sign in flow
In this section
Enterprise Sign up
Reseller Sign up
Multi-account Association
The Product Price List Report provides a summary view of product prices, helping users easily access and review pricing information.
Navigate to Billing & Payments > Product Price List.
Click on the Product Price List to open the page where all product prices will be displayed.
Account users can also
Filter by Product: Use the Product filter to view prices for specific products.
To download the certificate, Navigate to the order, Certificates > Orders > View order page.
Click the "Download Certificate" button and the, certificate will be downloaded.
The Sales Summary Report provides an overview of product pricing information in a summarized format.
To view the Product Sales Summary, navigate to Reports > Sales Summary. The Product Sales Summary page will then be displayed, as illustrated below.
Users can filter the Sales Summary by selecting the "Product" option, enabling a focused view of the desired product's pricing and sales details.
By clicking the "Excel" button located in the top-right corner of the page, the Product Sales Summary Report will be downloaded in Excel format, based on the selected search criteria.
Account users can generate an API access key to use it for authentication purpose while making API calls.
RESTful services designed for scale, flexibility & ease of integration. emSign Interface-less APIs enables access to key functionalities offered on emSign product that can be consumed by your application. Our API's are built on REST and therefore interoperable with any existing web application framework that supports REST based API calls.
emSign's ACME service is meticulously crafted to simplify the automation of SSL/TLS processes, mitigating the complexity and effort associated with managing numerous certificates within an enterprise. With organizations juggling a multitude of certificates, each demanding significant time and effort, ACME proves invaluable by completely automating the essential procedures needed to oversee SSL/TLS certificates across all endpoints in your organization.
In this section
REST APIs
To replace the CSR, navigate to Certificates > Orders > View order
Clicking the "Replace CSR" button will open a modal window, allowing you to upload the new CSR as shown below.
After the CSR is updated, click the "Update" button to apply the changes.
To Submit the CSR, navigate to Certificates > Orders > View order page.
Clicking the "Submit CSR" button will open a modal window, allowing you to upload the CSR, as illustrated below
After uploading the new CSR, click the “Update” button to finalize the submission.
Upon successfully running the bot, all certificates discovered by the bot will be displayed in the system for review and further action
Users can also View or Download certificates from the action buttons.
All keys created through the Key Store or Manage Key functions are displayed on the Key Report page for tracking and management purposes.
How emSign Earns and Maintains Your Trust?
Rigorous Validation: We follow proven validation procedures to confirm the identity of individuals and organizations before issuing certificates, reducing the risk of fraud and impersonation.
Global Compliance: Our accreditation in multiple jurisdictions ensures that emSign certificates meet the highest international standards, making them globally accepted and recognized.
Secure Infrastructure: We employ advanced cryptographic measures and maintain secure data centers to protect certificate issuance processes and private keys.
Continuous Monitoring: Ongoing audits and certificate transparency practices help detect unauthorized or misissued certificates early, safeguarding both certificate owners and end users.
Transparent Revocation: If a certificate is compromised or invalid, we swiftly revoke it and update revocation lists to prevent misuse.
Together, these measures strengthen the digital ecosystem and foster an environment where individuals, businesses, and governments can confidently conduct secure online transactions. At emSign, we’re committed to upholding the highest standards of trust-so you can operate in a safe, authenticated digital space every single day.
ISO 9001 (Quality Management System):
ISO 9001 is a globally recognized standard for managing quality in organizations. This helps organizations demonstrate their commitment to delivering high-quality products and services.
CMMI Maturity Level 5 (Continuous Improvement):
This refers to a high level of organizational maturity where processes are continually improved based on data-driven insights. At Level 5, organizations use a quantitative approach to understand business performance and the variation in processes. This enables them to make informed decisions that lead to continuous enhancements in their operations.
SOC 2 Type II Compliant:
SOC 2 Type II is an audit report that evaluates an organization's internal controls related to the AICPA Trust Service Criteria. These criteria cover five key areas: security, availability, processing integrity, confidentiality, and privacy of data. is important for service providers that handle sensitive data to demonstrate they maintain strong security and privacy practices.
GDPR Compliant (General Data Protection Regulation):
GDPR compliance refers to an organization's adherence to the General Data Protection Regulation, a legal framework designed to protect personal data of individuals in the EU. Organizations must meet specific obligations regarding how they collect, store, and process personal data, ensuring data privacy and security.
Group and User Management: Create groups and manage users within their account.
Billing and Finance Management: Manage billing details, access invoices, and view financial reports.
Private CA and Product Management: Create private CAs and develop customized products for internal use.
Reports and Tools: Generate reports and access platform tools for improved management.
Notifications: Receive alerts regarding expiring certificates and pending orders.
Security & Customization: MFA, Microsoft 365 SSO, IP restrictions, customizable profiles, and proactive alerts.
User-Friendly Interface: Centralized dashboards, intuitive workflows, and multi-language support.
CERTInext is a trusted solution for managing both public and private trust certificates, ensuring security and efficiency for organizations globally.
Alerts and Notifications
ACME APIs

This report offers a convenient way to review and download up-to-date pricing information for various products.













Group Selection:
If multiple groups are configured by an organization, the same is available under New Certificate > New Request > For with a drop down containing the list of groups. The account user will have the option to select the desired group from this list.
Payment Deduction:
Upon placing the order, the amount will be deducted from the selected group.
Templates are predefined structures or configurations used for simplifying processes such as generating certificates, configuring servers, or automating SSL/TLS settings.
The Automated Certificate Management Environment (ACME) protocol enables automated issuance, renewal, and revocation of SSL/TLS certificates, streamlining certificate lifecycle management. eMudhra’s CERTInext platform supports ACME clients to integrate with web servers, cloud services, and load balancers, ensuring secure and efficient certificate management. This article explores how to use ACME clients with CERTInext, drawing on industry-standard practices and recent advancements in automation.
ACME clients simplify certificate management by automating interactions with Certificate Authorities (CAs) like eMudhra. Benefits include:
Automation: Eliminates manual certificate tasks, reducing errors.
Scalability: Supports high-volume certificate deployments across diverse environments.
Compliance: Ensures certificates meet CA/Browser Forum (CABF) requirements.
Efficiency: Minimizes downtime with seamless renewals, critical for high-traffic systems.
CERTInext is compatible with popular ACME clients, including:
Certbot: Widely used for web servers like Apache and Nginx, offering simple setup and renewal automation.
acme.sh: A lightweight, shell-based client ideal for Linux environments and custom integrations.
Win-ACME: Designed for Windows IIS, integrating with the Windows Certificate Store.
Caddy: A web server with built-in ACME support for automatic HTTPS.
Install the Client: Install your chosen ACME client (e.g., sudo apt install certbot for Certbot on Ubuntu).
Configure CERTInext: Register with eMudhra’s ACME server via the CERTInext dashboard, obtaining an External Account Binding (EAB) key if required.
Issue Certificates: Run a command like certbot certonly --standalone -d example.com or acme.sh --issue -d example.com --webroot /var/www/html to request a certificate, specifying CERTInext’s ACME endpoint (e.g., ).
Secure EAB Keys: Store EAB keys securely to prevent unauthorized access.
Monitor Renewals: Use CERTInext’s dashboard to track certificate status and renewal failures.
Test Configurations: Validate ACME workflows in a staging environment to avoid disruptions.
Leverage HTTP-01 or DNS-01: Choose HTTP-01 for web servers or DNS-01 for wildcard certificates, depending on your needs.
ACME clients, combined with CERTInext, enable automated, secure, and scalable certificate management. By integrating clients like Certbot or acme.sh, organizations can streamline SSL/TLS operations.
emSign SSL Subscription plan allows you to pay for a single price for up to three years of SSL/TLS certificate coverage for DV & OV products. With a Multi-year Plan, you select the SSL/TLS certificate, desired coverage period, and certificate validity. Until the subscription plan expires, you reissue your certificate at no additional cost either through manual or Auto approval based on your selected configuration.
Certificates > New Request.
To order a subscription plan, navigate to:
Choose Product & Validity
Choose Your SSL/TLS Product
Select either DV or OV product from the subscription plan.
Fill in the Required Details:
For OV certificates: Provide Organization Details (e.g., Organization Name, Unit, Country).
For both DV and OV certificates: Enter the Certificate Requestor or Organization Representative Information (e.g., Name, Email ID, Mobile Number, etc.).
Upload, Attach, or Skip the CSR:
You can either upload, paste, or skip the Certificate Signing Request (CSR).
Skipping CSR: You can submit it later using Order Quick Actions.
Provide Certificate Information:
Enter the SAN Name and any additional information required.
Additional Information (Optional):
Add Reporting Tags, Order Remarks, Technical POC details, Custom Fields, and Auto-renewal options.
Proceed to Payment:
Complete the payment process for your selected SSL/TLS DV or OV product.
Choose Product & Validity
To order a subscription plan, navigate to: Certificates > New Request.
From the Products Dropdown List, select the emSign DV /OV product.
In the "Subscription For" field, choose the coverage duration:
1 Year, 2 Years, or 3 Years.
Auto-Renew Certificates Until Coverage:
Enable the "Auto-renew certificates until coverage" checkbox to configure automatic renewal.
If enabled, emSign will automatically renew the certificate based on the selected criteria.
A successful reissuance notification email will be sent upon renewal.
If disabled, manual reissuance will be required before the certificate expires.
You can modify the auto-renewal settings later from the Orders View page after the order ID is generated.
Managing Orders and Subscription
View Orders and Subscription Details:
Once the order is placed, the Orders View page will display the SSL subscription details.
You can also modify the auto-renewal configuration from this section.
Certificate Management:
After downloading the certificate, the account user can:
Reissue the certificate as needed.
Add or Remove SANs based on changing requirements.
To initiate Reissue Certificate Navigate to the order by, Certificates > Orders > View order page > Reissue Certificate.
The downloaded certificates can be Reissued by selecting the "Reissue Certificate" button is available in order quick action as shown below.
Upon clicking "Reissue Certificate" a modal will appear with all the necessary information as shown below.
To Reissue the certificate, the account user must provide a reason from the pre-defined options.
Certificate Signing Request (CSR)
User can either upload the CSR file or paste the CSR or can choose to Skip the CSR as shown below.
Upon clicking on the "Request reissue" button, the system will generate a re-issuance order ID. All re-issued certificates can be tracked as shown below.
What's Next?
Certificate requester / Organization representative will be notified with-
1. An order confirmation email
2. All the order related communications
3. Required actions specific to the product
Attested CSR can be generated using HSM via emSign Click Tool.
Step 1: Open emSign Click Tool.
Step 2: Click "Tools" from the menu. Step 3: Click "Generate CSR for HSM".
Step 4: Please follow the help section to generate your CSR.
Step 5: Proceed to enter the mandatory details and click "Generate CSR". Note: emSign Click Tool supports the below HSM Providers.
ncipher HSMs
Safenet Luna HSMs
Utimaco HSMs
Step 6: Please click Copy CSR / Save CSR to save the CSR in your computer.
Step 7: Private Key stored successfully in the HSM.
Step 8: Submit the CSR to emSign via Portal / API accordingly.
User can view the key details along with the status of the keys generated. Navigate to Keys > Manage Keys
View Key History
In the Manage Keys table, under Actions, click on the View History icon.
A popup appears displaying key details such as Alias Name, Key Type, Signature Algorithm, Created By, and Key Algorithm.
Click the Download Key icon under Actions to download the key to your system.
Rotate a Key
Click the Rotate Key icon.
The key will be rotated, and its Alias Name will update accordingly.
Delete a Key
Select the Delete Key icon under Actions.
Confirm deletion in the popup to remove the key.
Create a New Key
Navigate to Keys> Manage Key and click on the “+” icon on the top right corner
Select either Symmetric or Asymmetric Key type from the drop down
Enter further information regarding the key to be created.
Once done, click on “Create Key Pairs” button to finish the process. The new pair gets created.
User can manage or create new REST API under this page.
To create a new REST API, user need to click on "Add" button, a modal will be displayed.
Enter description & select the user for which you wanted to generate the access key, then click on "Generate Access Key" button to proceed further.
Upon submitting the request an access key will be generated by the system as shown below.
If a reseller wants to place an order on behalf of the customer, it can be done in two ways
1. Organizations pre-verified and mapped under the reseller
Access the Pre-Verified List:
In the Organization Details section, click the "Click here" button.
A list of pre-verified organizations will be displayed.
Select the appropriate organization from the list to proceed with the certificate request.
2. Organizations not mapped to the reseller
Search for External Organizations:
If the reseller wishes to use an organization mapped to another account, click the "Search External Organization" link.
This will prompt the user to enter the representative’s email ID.
Select External Organizations:
After entering the representative’s email ID, a list of available organizations will be displayed.
Select the desired organization and proceed with the certificate request.
Switching Organization Views
If the user wants to switch back to the default organization view, click the "Switch to default view" link.
What’s Next?
Consent Email for External Organization:
Once the order is placed, a consent email will be sent to the external organization’s representative email ID.
The external representative must accept the organization reuse request.
Verification Status Update:
CA connectors (Certification Authority connectors) are software or middleware components that allow systems, applications, or services to integrate with Certification Authorities (CAs) for the management and automation of digital certificates within an organization's IT infrastructure.
CERTInext has provision to create the following CA connectors:
emCA
Microsoft PKI
DigiCert
To create emCA credential, required fields are:
Name:
Base URL:
By default, its Common Connector
Username:
Fill in all the details and click on ‘Create’ button.
To create Microsoft PKI credential, the required fields are:
Name:
Base URL:
By default, its Common Connector
CA Setup Type: Select the type as Standalone CA or Enterprise CA
Fill in all the details and click on ‘Create’ button.
To create DigiCert credential, the required fields are
Name:
DigiCert API Base URL:
DigiCert API Key:
Server Platform ID:
Fill in all the details and click on ‘Proceed’ button.
emSign S/MIME Mailbox Validated certificates provide "reasonable assurance" to both senders and recipients that the individual identified in the certificate has control over the associated email address.
Below are the steps to order an S/MIME - Simple - Mailbox Validated - Strict certificate.
Choose Your S/MIME Product and Validity
Navigate to Certificates > New Request.
From the Product Dropdown List, select S/MIME - Simple.
Choose the validity period and click "Next" to proceed.
Certificate Requester Information
Enter the following details:
Name
Email ID
Mobile Number
Certificate Information
Enter the Email ID for which the certificate will be issued.
Alternatively, select "Same as Requester Email ID" to auto-fill the requester’s email ID.
Click "Next" to proceed.
Certificate Signing Request (CSR)
Refer to the SSL/TLS DV Certificate Ordering Flow for CSR submission options. Users can:
Upload or Paste the CSR.
Skip CSR and submit it later using the Order Quick Actions feature.
Additional Information (Optional)
Provide any Reporting Tags, Order Remarks, or KYC Documents if applicable.
Custom fields may also appear here if configured by the account administrator.
Order Summary & Payment
Review the order details and product information.
Proceed with the payment for the S/MIME certificate.
For detailed payment instructions, refer to the SSL/TLS DV Certificate Ordering Flow.
What’s Next?
After successfully placing the order, the certificate requester will receive an Order Confirmation Email.
The email will contain a tracking link to monitor the progress of the certificate verification and issuance process.
When a certificate is rotated, a new certificate is issued, and a corresponding new key is generated. This newly generated key is then listed on the Key Store Report page for easy reference and tracking.
Order Placement: Upon clicking the "Submit" button on the order Summary & Payment page, the request will appear on the Orders page, with the status "Order Pending for Approval".
Administrator Action: Once the order is listed, the administrator can either approve or reject the request from the Orders page, as shown below.
Rejecting an Order:
Upon clicking the "Reject" button, the reason for rejection must be entered in the rejection field.
Click on “Reject” to finalize the rejection.
Approving an Order:
Upon clicking the "Approve" button, the system navigates to New Request > Order Summary & Payment Page
The account user must click "Pay now" to submit the request and generate the Order ID.
Order Completion: Once the payment is successful, the system redirects to the orders page with all the necessary information and associated Order actions as shown below.
Administrator approval is required only when the order is placed by a Standard User or Basic User places an order.
If the reseller wants to place an order on behalf of the Enterprise account an option is available at the new request level.
If the reseller checks that check box, all the Enterprise accounts will be displayed which are been part of the parent reseller account.
Upon selecting the account reseller can place an order & amount will be deducted from the default group of the Enterprise account.
Important Note:
This option will be available only for parent reseller accounts.
Additional Information
This section is optional. Here, the account user can:
Add Reporting Tags
Provide Order Remarks
Enter Technical Point of Contact (POC) details (if required)
Additional Email Recipients for Notifications
A new option, "Additional Email Recipients," is available for notification purposes.
To include additional recipients, enable the "Additional Email Recipients" checkbox and enter the corresponding email IDs.
Note:
Additional email recipients will receive the following notifications:
Order Confirmation, Revocation, and Renewal Reminder Notifications (excluding specific verification-related notifications).
Order Successful / Tracking Link Email Notifications
CSR-Related Email Notifications
Certificate Download Email Notifications
Updating Additional Email Recipients
Additional Email Recipients can be edited after the order has been generated via the Orders View Page.
For all future notifications, the updated recipients will receive relevant emails accordingly.
Click "Next" to proceed.
To Key Profiles, Go to menu > Keys > Keys store, add Key Store File, Key Store Password
On this page, you can create and manage reporting tags that help categorize and filter certificates, orders, and other records. Use these tags to generate more specific reports and gain insights into particular aspects of your business. Example: If you're tracking certificates by department, you could create tags like "Finance," "HR," and "IT" to quickly filter and report on certificates that belong to these departments.
Create a Reporting Tag
Click on “+” button on the right-side top corner to create a New Tag.
Enter the Tag Name and Tag Value.
Click on Save button to complete the process.
Mozilla’s Root Store Policy v3.0 reinforces a crucial aspect of Certificate Authority operations: being prepared for mass certificate revocation. While such events are rare, the scale of potential disruption means that both CAs and relying parties need clear strategies for continuity. At emSign CA, operated by eMudhra, we see this as a chance not only to comply with requirements but to strengthen the trust fabric of the internet.
Revocation events—whether triggered by a systemic vulnerability, mis-issuance, or key compromise—can invalidate thousands of certificates in a short span. If not managed effectively, this may cause service outages, broken user experiences, and diminished confidence in secure communications. Preparedness ensures that organizations remain resilient when digital trust is most at risk.
CERTInext platform provides seamless access to wide range of features designed to streamline certificate management and enhance digital security. Access CERTInext portal
Dashboard: Gain real-time insights through comprehensive dashboard, offering key statistics such as account status, pending domain and organization approvals, certificate status, and expiring certificates. The dashboard also provides detailed reports on bot performance, endpoint security, and key management statistics, all displayed through intuitive charts.
Certificates: Manage your SSL/TLS certificates, request new ones, and monitor expiration dates to ensure continuous protection.
Certificate Expiry Message
Administrators can configure a certificate renewal message to be displayed for all certificate orders. Follow these steps:
Navigate to Settings > Account Configuration.
Enter the desired message under 'Account-wide certificate renewal message'.
The “Renew Certificate” button will be available 60 days before the certificate expiry.
To renew certificate, Navigate to the order, Certificates > Orders > View order page.
Click "Renew Certificate" button and the system will navigate to the New Request page to initiate the renewal process.
To initiate Add/remove SANs, Navigate to the order Certificates > Orders > View order page > Add/Remove SANs.
The downloaded certificates can have SANs added or removed by clicking the"Add / Remove SANs" button available under Order Quick Action as shown below.
Clicking "Add/Remove SANs" will display a modal with all the necessary information as shown below.
User can manage or create new ACME API under this page.
To create a new ACME API, user need to click on "Add" button, a modal will be displayed.
Enter description, user, select the group for which you wanted to generate the key ID & Mac Key, select the product, add tags (optional), then click on "Generate EAB Credentials" button to proceed further
To revoke an issued certificate, Navigate to the order, Certificates > Orders > View order page.
To revoke a downloaded certificate, click the "Revoke Certificate" button under Order Action.
On click of "Revoke Certificate" a modal will appears shown below.
To create a new custom private product, go to Certificates> Products. By default, both public & private tabs will be displayed.
Private: Displays a list of default private PKI products along with private products created by the account user.
Public: Displays all the default emSign public products mapped to the account.
Note: Account users won’t have a provision to add the new public product.
Creating a New Private PKI Product
Purpose of Custom Fields:
This form allows you to specify or enter values for each active custom field available in your emSign account.
These custom fields will be displayed under the Additional Information section of the order form.
Administrator-Enforced Fields:
This tool is used to download the certificate in a soft Token (or) USB Token.
The eMudhra emSign Click Tool can be downloaded in this Page - This tool can be downloaded in Windows 7, Ubuntu, MAC operating systems.
Click the Download button provided or copy the link and paste it in the address bar to use the tool and generate the certificate as shown below.
The tool gets downloaded in the system. Upon clicking the tool will be displayed in a modal.
The Statement page provides a detailed view of your financial transactions within emSign, displaying credits, debits, and outstanding balances. This page helps you monitor your account’s financial health and keep track of all payments to ensure they are current.
Users can view ledger statements for both main and sub-accounts, with a full display of credit, debit, and current balance. The page also allows-
Search and Filter
Click on the Search button to access the Group Name filter.
Use this filter to display data specific to a particular group.
The Invoices page provides a comprehensive list of all generated invoices for your certificate orders and services. From this page, you can download, review, and pay invoices, making it easy to track your organization's billing and payments.
CERTInext support monthly generation of invoices for certificate services, tracking usage, and subscription charges over the course of the month. This feature is based on permission provided in emSign backoffice.
Download Invoice
Via the Certificates Section
Navigate to Certificates > Orders.
The Orders Report provides a comprehensive view of all order-related information across your account. To access the Orders Report, navigate to Reports > Orders Report.
Upon selecting Orders Report, the page will display a detailed list of all orders, including data from your account as well as any associated sub-accounts. This report ensures that all order data is easily accessible for tracking and analysis.
Users can filter data by selecting the "Order ID" option to refine search results effectively.
Here we can see the Overall Statistics of the system
Endpoints
Scanned Endpoints - No. of scanned Certificates scanned from Bot
Protected Endpoints- Number of Endpoints protected with a certificate
Unprotected Endpoints- Number of Endpoints not protected with a certificate
This page is used to create and manage CSR (Certificate Signing Request) templates. Enter the required details like signature algorithms and key sizes and configure the subject DN details to simplify the CSR generation process for your organization.
Create CSR Templates
Step 1:
To create custom CSR template, unique Template name to be provided.
The Signature Algorithm, Key Algorithm, Key Size to be selected from the dropdown list.
Step 2:
The eMudhra Certificate Utility Tool is designed to simplify certificate-related processes, such as generating CSRs (Certificate Signing Requests), importing, and exporting certificates in various formats.
CSR Generation
Download the eMudhra Certificate Utility Tool from this page by clicking the "Download" button or copying the link into your browser's address bar.
After downloading, open the tool to access the CSR Generator section.
Enter the required details:
Common Name
To streamline approval processes, the EV Request Approvals feature is accessible within the CERTInext platform under:
Organizations > EV Request Approvals.
This feature simplifies the approval workflow by allowing in-platform approvals, complementing email notifications. The Certificate Approver must be an authorized user within their enterprise account to access and approve EV certificate requests.
To View the SSL EV Certificate request, Organizations > EV Request Approvals. This helps to simplify approval processes with our new in-platform approval feature, complementing email notifications. To access this feature, Certificate Approver should be an account user within their enterprise account.
Certificate approver can use the “Order ID” filter to quickly locate specific EV certificate requests.
The Manage Schedules section provides a consolidated view of all scheduled, executed, and disabled tasks.
Scheduled Tasks: All active schedules are displayed in the list.
Executed Schedules:
If a certificate schedule has been executed, the corresponding details are displayed in this section.
Executed schedules cannot be disabled.
Disabled Schedules:
If a certificate has not been executed, the schedule can be disabled by the user.
Create Schedule
Users can create and execute schedules for managing certificates. Navigate to
Unlike Domain Validated (DV) certificates, OV certificates require the certificate request to undergo organization verification process to confirm the identity and legitimacy of their organization.
Validation Process: Validation of the organization's identity, including legal registration and domain ownership.
Issuance Time: Longer issuance time compared to DV, but shorter than EV. Typically, issuance in Hours. For exceptional cases, issuance would take 1-5 Business days.
Process Involved:
Add Credits
emSign CERTInext offers two modes of payment to add credits: Online Payment & Offline Payment.
To add credits to your account, navigate to Billing & Payments> Add Credits.
Online Payment
Upon selecting online Payment, the current account balance is displayed at the top.
Enter the Amount to be credited, then click the Pay button
The Audit Logs page provides a detailed activity list, displaying information such as module activity, timestamps, and usernames for all account activities.
By default, the last 10 audit logs are displayed for quick reference.
Comprehensive activity tracking ensures accountability and transparency.
If a UCC product is selected, enter the number of domains. The order value will be displayed based on the selected number of domains.
Click "Next" to proceed.
Upon acceptance, the Organization Verification Status will update to "Completed."
Subscriber ID:
Password:
Upload File:
Container ID:
Certificate Validity:
Payment Type: Balance or Profile
By default, its Common Connector
Certificate Download Delegation:
If another individual needs to download the certificate, enable the "Certificate Download Delegation" option.
Provide the delegate’s Name and Email ID. A certificate download PIN will be sent to the delegate’s email address.
Click "Proceed" to continue.
Customer Actions Pending Reminder Notifications
Certificate Renewal Reminder Notifications
Order Discrepancy Email Notifications
Certificate Revocation Email Notifications
Reissue Email Notifications
Retry CAA Email Notification
Our approach to revocation preparedness rests on three pillars:
Structured Playbooks
We maintain documented and periodically tested procedures to manage revocation scenarios at scale.
These internal drills allow our teams to validate workflows and identify gaps well before real incidents occur.
Communication First
In any high-impact event, we believe clarity reduces panic.
Subscribers are engaged through multiple communication channels—from direct outreach to status updates—so they are aware of the issue and guided on the immediate steps to take.
This proactive communication is as important as the technical response, because it ensures continuity of business decisions.
Commitment to Trust Continuity
Our guiding principle is minimal disruption.
By blending manual oversight with automated recovery mechanisms, we aim to keep the replacement of certificates as seamless as possible.
We are committed to continual improvement—working with auditors, browser root programs, and our customers to refine practices as the ecosystem evolves.
To minimize downtime, automation is critical:
ACME protocols help organizations re-issue and redeploy certificates quickly and consistently.
CertiNext, our Certificate Lifecycle Management platform, provides enterprise-grade visibility and orchestration—helping customers automate discovery, renewal, and replacement across distributed environments.
With such automation, the impact of even a large-scale revocation can be reduced from days of manual intervention to streamlined, predictable steps.
Preparedness also means building for resilience:
Subscribers are encouraged to maintain secondary issuance paths or backup certificates.
Our systems support staging replacements so that transitions can be executed with minimal interruption.
Internally, we run simulation drills that test not only our infrastructure but also our support teams’ ability to assist customers during peak demand.
At eMudhra, we see mass revocation preparedness as more than a compliance checkbox. It is about readiness, transparency, and commitment to trust continuity. By aligning with Mozilla’s MRSP v3.0, adopting automation, and fostering open communication with our community, emSign CA remains focused on ensuring that even in rare large-scale revocation scenarios, our customers and their users experience as little disruption as possible.
Only the mandatory fields are required to complete the order.
Note:
The value entered for the same custom field can vary from order to order based on the specific requirements of each request.
Custom Fields are not included as part of the Subject or SAN (Subject Alternative Name) attributes in the certificate.
Editing Custom Fields
Custom Fields can be modified after the order has been generated.
Navigate to the Orders View Page to edit the fields, as shown below.
In Subject DN details, select the desired field to be added to the CSR. If any new field to be added other than the ones displayed administrators can click on "(+)" button to add new custom field.
Step 3:
Subject Alternative Name can be selected by selecting the checkbox and click on Save button.
Step 4:
After CSR template is created, it is listed with status as Active.
Under Actions tab, click on the Edit Template icon, the page will be redirected to Update CSR Template page.
Edit the fields and click on Update button. The changes made will be updated successfully.
Clone CSR templates
Under Actions tab, click on the Clone Template icon, the page will be redirected to Clone CSR Template page.
Enter the new Unique name and click on Clone button. The template will be cloned successfully.
Disable CSR templates
Under Actions tab, click on the Disable Template icon, confirmation popup is opened.
Click on Yes button, the template will be disabled successfully.
Under Actions tab, click on the Delete Template icon, confirmation popup is opened.
Click on Yes button, the template will be deleted successfully.
Domain Control Validation (DCV): Domain Control Validation can be done online and it's an customer friendly automated process.
Organization Validation (OV): Organization Vetting process includes,
Organization Identity & Address verification,
Doing Business As / Tradename verification (if 'O' value provided is a Tradename) &
Authenticity of certificate request verification through Organization Authentication Code submission. emSign delivers the code using reliable method of communication (email / telephone). Requester will receive a link to submit the code to prove the authenticity of the certificate request.
Certificate Signing Request (CSR): As part of SSL OV process, CSR has to be submitted to emSign.
Deploy Certificates: Use CERTInext’s integration with Apache, Nginx, or cloud services like AWS Certificate Manager to deploy certificates.
Discover Certificates: Locate and review all certificates across your infrastructure, irrespective of the issuing authority.
Orders: Track and manage your certificate orders.
Products: Create and manage product categories for streamlined certificate issuance.
Organizations: Pre-verify organizations to enable faster certificate issuance without the need for repeated validations.
Domains: Pre-verify domains to expedite certificate issuance.
Certificate Authorities: Manage trusted CAs and configure policies for certificate issuance.
CSR Templates: Create and manage Certificate Signing Request (CSR) templates for consistent application.
Configuration Templates: Create and maintain certificate configuration templates for operation efficiency.
Bots: Configure and manage automated Bots for certificate discovery and monitoring ensuring visibility across networks.
Keys: Manage the entire lifecycle of cryptographic keys, including generation, storage, and profiling.
Manage Keys: Store and organize cryptographic keys systematically.
Key Profiles: Define and apply key profiles for consistent cryptographic operations.
Key Store: Securely store and manage cryptographic keys.
APIs: Access and configure API integrations with the platform.
REST APIs: Generate API keys for efficient certificate management.
ACME APIs: Automate SSL/TLS certificate issuance through ACME protocols.
Billing & Payments: Manage your account credits, payments, and invoices.
Add Credits: Recharge account credits through online or offline payment modes.
Invoices: View, manage and download invoices related to your purchases.
Statement: Access detailed financial statements to monitor account activity.
Product Price List: Review and manage product pricing to align with business needs.
Reports: Access various reports related to orders, certificates, and usage.
Orders Report: Generate detailed reports on certificate orders.
Overall Statistics: Access a platform wide summary of critical metrics and statistics.
Certificates Report: Monitor the status and details of all certificates managed on the platform.
Key Store Report: Analyze Key storage data and the status of your key stores.
Key Report: Track key usage, rotation status and operational health.
Sales Summary: Review sales data to monitor performance.
Audit Logs: Maintain audit trails of platform activities to ensure compliance and transparency.
Settings: Configure platform settings, user access, and security rules.
Account Configuration: Manage account settings, authentication options and account configurations.
Custom Fields: Add or modify custom fields to capture additional data for certificates, organizations and so on.
IP Restrictions: Enforce IP restriction to enhance security by limiting platform access.
Users: Control user roles and permissions across the organization.
Groups: Create and manage user groups with roles such as Administrator, Manager/s and Basic User.
Manage Schedules: Set up automated task schedules for certificate issuance, renewal and monitoring.
Reporting Tags: Create reporting tags to facilitate better filtering and data analysis.
CA Connectors: Integrate seamlessly with multiple CA services for managing private or public SSL/TLS certificates.
Tools: Access a suite of tools and utilities available to enhance workflows and optimize operations.

For downloading the certificate through emSign Click, you will need to ensure that the URLs you provided are trusted and accessible through your network or firewall. The URLs are:
Depending on your network setup (e.g., firewall, security gateway), you will need to add the URLs to the whitelist.
Note: The above changes need to be done only if the download to be done in Organization’s system if there are firewall/security restrictions.
For personal PCs no changes are required.
In this section
Procedure for installing Certificate in HSM
Procedure for Attested CSR Generation































Consent management refers to the process of obtaining, recording, and managing user consent for data collection, processing, and sharing activities. It's especially relevant in the context of privacy regulations like the GDPR (General Data Protection Regulation) in the EU, CCPA (California Consumer Privacy Act) in California, and similar laws in other regions.
Scan URL: Scanning URLs involves analyzing a website's pages to detect and assess its data collection practices. This helps identify cookies, trackers, and other methods of collecting personal information.
Create Cookies with Category and Type: When setting up cookies on a website, classify them into categories based on their function.
Create and Manage Consent Banners: Consent banners are pop-ups or notifications displayed on websites to inform users about data collection practices and ask for their consent. Users can provide options to accept or manage cookie preferences and also have the option to reject cookies or customize their choices. Consent banners can be customizable to suit different regions and laws.
DSAR (Data Subject Access Request): A Data Subject Access Request (DSAR) is a formal request made by an individual (the "data subject") under privacy laws like the GDPR (General Data Protection Regulation) or CCPA (California Consumer Privacy Act), allowing them to request information about the personal data an organization holds on them. This is part of an individual’s right to transparency and control over their personal data.
This feature ensures clear communication regarding certificate renewals across the account.
Additional Certificate Expiry Notifications
Administrators can configure additional email addresses for certificate renewal and expiry notifications. Follow these steps:
Navigate to Settings > Account Configuration.
Enable the checkbox for 'Account-wide certificate renewal email addresses'.
Enter the recipient email addresses that should receive renewal or expiry notifications for emSign certificate orders created within the account.
This ensures that renewal notifications reach all relevant stakeholders, maintaining effective communication and timely action.
Configure Certificate Renewal Email Notifications Frequency
Administrators can set up customized notification frequencies for certificate renewals and expirations. Follow these steps:
Navigate to Settings > Account Configuration.
Enable the checkbox for 'Certificate Renewal Notification Frequency'.
Select the desired reminder intervals (e.g., 90 days before expiry, etc.) to enhance the customer experience.
Administrators can specify reminder dates both before and after expiry. This feature supports notifications for SSL/TLS and other certificate types.
By configuring this setting, administrators ensure timely notifications for certificate renewals, improving operational efficiency and avoiding service interruptions.
SSL Technical POC Email Notifications
Administrators can manage email notifications for technical points of contact (POC). Follow these steps:
Navigate to Settings > Account Configuration.
The option 'Copy Technical Point of Contact in SSL Order Email Notifications' is enabled by default. This ensures that the technical POC receives notifications such as:
Order confirmation
CSR-related updates
Certificate download links after SSL order generation
The account administrator can uncheck this option if notifications to the technical POC are not required.
This configuration ensures efficient communication for SSL order updates, tailored to organizational needs.
Low Balance Alerts
Administrators can configure low account balance alerts to ensure timely notifications when the account balance reaches a specified threshold.
Steps to Configure:
Navigate to Settings > Account Configuration.
Enable or disable the checkbox for 'Send Low Account Balance Alerts' based on your requirements.
Upon enabling, two additional fields will appear:
Notification Email IDs: Enter the email addresses to receive low balance alerts.
Threshold Amount: Specify the threshold amount that will trigger the low balance alert.
Once configured, an email will be sent to the specified recipients when the account balance reaches or exceeds the threshold.
This feature helps maintain account continuity by providing proactive alerts for low credit levels.
Certificate Renewal Notifications to Group Email Addresses
Administrators can configure and manage certificate renewal notifications for group email IDs to ensure timely communication.
Navigate to the Notifications section.
Enable the 'Configure certificate renewal email addresses' checkbox to add group email IDs (e.g., Cost Center, Business Unit, Project, etc.).
If account-wide certificate renewal email addresses are already configured (via Settings > Account Configuration > Configure Account-wide Certificate Renewal Email Addresses), they will be pre-filled but can be modified for the specific group.
Note: The entered email addresses will receive renewal and expiry notifications for emSign certificate orders associated with the respective group.
Edit Certificate renewal email addresses
Certificate renewal email addresses can be edited after group creation.
On click of "Edit" button, Administrator users can add/remove the certificate renewal information.
This feature ensures that relevant stakeholders are promptly notified about certificate renewals, facilitating seamless operations.
To add (or) remove the SANs, the account user must select a reason from the pre-defined options.
Add / Remove SANs
This allows the account user to add (or) remove the SANs. Please note that no refunds will be issued for removal of SANs.
For any additional SANs, a “Calculate Price” field will be displayed. Upon clicking this button, "Payment Information" section will appear.
Clicking the "Request reissue" button will generate a reissuance order ID, All the re-issued certificates can be tracked as shown below.
This option is applicable only for UCC & Multi-domain products
What's Next?
Certificate requester / Organization representative will be notified with
1. An order confirmation email.
2. All order related communications.
3. Required actions specific to the product


Enter the Revocation Remarks and select the Revocation Reason from the dropdown list and click the "Submit" button to complete the revocation process.

Enter product details
Product Name: Provide a unique name for the product.
Validity: Define the product validity period.
Select Subordinate CA: Choose from the list of available end-entity private CAs.
Certificate Profile: By default, the custom type will be displayed.
Certificate Template:
Choose from one of the following templates:
Client TLS
Mutual TLS
Server TLS
Depending on the selected template, a predefined setup profile will appear.
Configure Certificate Details
Subject Attributes: Provide the necessary subject attributes.
Subject Alternative Name (SAN) Attributes: Add relevant SAN attributes.
CA Extensions: Mark the required CA extensions for the certificate.
Automatically Approve the Certificates
Enabled No administrator intervention is required for order approval as it will be fully automated. Upon placing the order, the system will generate an Order ID automatically.
Disabled: Administrator approval is required before the order is processed.
Specify Validation Checklist: The validation checklist configured here will appear under New Request > Order Summary & Payment section for administrator review. Additionally, the account user can specify the conditions & presence to tailor the checklist for order approval.
Once all product details are filled, click the "Create" button to proceed.
Important Notes:
Dynamic vs Fixed fields:
Dynamic field restriction: Values for Subject Attributes and Subject Alternative Name (SAN) Attributes can be provided later at the New Request level.
Fixed Field restriction: Values must be defined during product creation and will remain consistent across all orders using this product.
What's Next?
Once the product is successfully created, it will become available under New Request> Products. Users can select this product to place orders.

Export to Excel
Click on the Excel button at the top-right corner of the page.
Based on your selected search criteria, the ledger statement will be downloaded in Excel format.

Click on Download Invoice to download a copy with all payment details.
Via Billing & Payments Section
Navigate to Billing & Payments.
Under Action, click on the Download icon next to the desired invoice.
The invoice will then be downloaded to your system.
Download Credit Note
To download any credit note, go to Certificates > Orders > View order page.
This order action will be displayed when the Order status is cancelled (or) Rejected.
On click of "Download Credit Note" a credit note will be downloaded with all the payment information.

Exporting Data to Excel:
By clicking the "Excel" option available in the top-right corner of the page, users can export order data in Excel format. The Advanced Search feature further enhances flexibility, allowing users to apply custom fields to generate and export precise results.
If custom fields are enabled for your account, all relevant custom field data and associated field values linked to specific orders will automatically be included in the exported Excel file.
This automated process enables enterprises to efficiently utilize data for various purposes, such as inventory management, detailed data analysis, and monitoring key performance indicators (KPIs) related to orders and sales.
Additionally, custom order field data serves as a robust audit trail, offering transactional evidence and ensuring compliance with internal policies and operational procedures.


Keys
No. of Keys - Total No. of keys created in an Account
No. of Symmetric Keys - Total number of Symmetric Keys created in the Account
No. of Asymmetric Keys- Total number of Asymmetric Keys created in the account
No. of Keys Used - Total number of keys used for creating Provisioning template
No. of Keys Rotated -Total number of Keys Rotated in Manage keys
Templates/ Profiles
CSR Templates - Total number of CSR Templates created in the Account
Provisioning Templates - Total number Of Provisioning Templates created in the Account
Key Profiles - Total number Of Key Profiles created in the Account
Email Templates- Total number of email templates created in the account
Others
No. of CSR's - After Every Certificates Rotate, CSR count get increased
No. of Keystore's - After Every Certificates Rotate, Keystores count get increased
Certificates
Discovered - Total number of Certificates displayed by default after bot run
Configured - Total number of Certificates configured
Not configured - Total number of Certificates which are not configured
Initiated - Total No. of Certificates which are initiated in Grid[M21]
Issued - Total No. of Certificates which are issued
Deployed - Total No. of Certificates deployed in Automatic deployment
Revoked - Total No. of Certificates Revoked
Rotated - Total No. of Certificates Rotated to issue a certificate
Re-keyed- Total No. of Certificates Re-keyed to Reissue a certificate
Suspended - Total No. of Certificates which are on hold
Vulnerable – If Vulnerability is failed, that count should update.
Country
Algorithm
Click the "Generate CSR" button.
Save the generated CSR locally or copy it for use where required.
Import & Export Certificate
The tool includes an Import & Export feature to convert certificates into various formats like .pfx, .jks, or .pem. It also allows exporting private keys as .key files when exporting .pfx certificates.
Importing Certificates
Click "Import Certificate" to get started.
Select the certificate using one of the following options:
Option 1: Import only the end-entity certificate (e.g., .cer issued by emSign).
Option 2: Import the complete certificate chain (e.g., .zip received from emSign).
Once the certificate is imported, view details such as:
Common Name (e.g., emsign.com)
Certificate Serial Number
Thumbprint Value
Exporting Certificates
Choose the desired export format:
Option 1: .pfx
Option 2: .pem
Option 3: .jks
If exporting as .pfx, set a PFX password for future use.
Click "Export" to save the certificate.
Upon successful export, the following files will be available:
.pfx File
.key File (Private Key)


Approving or Rejecting an SSL EV Certificate Request
Accessing the Request Details:
Click on the relevant "Order ID" link to open a detailed modal displaying:
Certificate Approver Information
Order Details
Organization Information
Approval Actions:
Approve:
Click the "Approve" button to complete the certificate approval.
The status will update to "Yes" to indicate that consent has been granted.
Reject:
Click the "Reject" button to finalize the rejection process.
The status will update to "No" to indicate that consent has not been granted.
Name: Enter a unique name for the schedule.
Category: Select the appropriate category from the dropdown menu (e.g., Initiate, Order, Rotate, Renewal, or Recheck).
Date: Use the date picker to select the date for which the schedule applies.
Time: Choose the desired time from the dropdown menu to execute the schedule.
Select and Search Certificate: Choose the certificate that corresponds to the selected category.
Save: Click the "Save" button to save the schedule details.
This feature ensures streamlined certificate management by automating tasks based on defined schedules.


The system will redirect to the payment gateway. Enter your card details to proceed with the payment.
To verify the payment status, enter the Payment ID under the "Recheck Payment Status" section and click the Recheck button.
Offline Payment
On selecting offline Payment, the current account balance is displayed at the top.
Enter the offline credits payment details and click the "Make Payment" button.
Once the "Submit Offline Payment" button is clicked, a thank you message will displayed on the screen. Upon eMudhra finance approval, the amount will be credited into the account.
Credits Withdrawal
The user can withdraw the credits in the account anytime by raising a withdraw request and credited to the user bank account upon approval in the emSign Backoffice.
To Submit Withdraw Credits request, go to Add Credits > Click on Submit Withdraw Credits hyperlink.
User can enter the desired amount to be withdrawn and submit the request.
The request is now sent to the emSign backoffice, where the request is approved and processed further.
Note: To submit withdraw credits request, the bank account details must be provided before raising the request.


Partner Accounts
Ideal for: SSL providers, web hosting companies, cloud service providers, and other resellers of digital certificates.
Partner accounts offer comprehensive access to the CERTInext portal, enabling resellers to efficiently manage their operations and sub-accounts. Key features include:
Group Management: Add, manage, edit, and allocate funds to groups.
User Management: Add, manage, invite, and approve users and user invitations.
Organization & Domain Management: Manage organizations, domain settings, and pre-approve pending orders from sub-accounts.
Sub-Account Management: Create and manage sub-accounts, set customized price lists for sub-accounts, and monitor activities.
Certificate Management: Issue, renew, and manage public and private certificates; monitor expiring certificates; and generate API keys for REST and ACME integrations.
Finance and Billing: Allocate funds, manage account finances, and access audit logs.
Product Customization: Develop customized products and create public/private CAs for tailored certificate solutions.
Tools & Reports: Access detailed reports, tools, and notifications regarding groups and self-orders for enhanced operational efficiency.
Notifications: Receive alerts on pending self-orders and other group-related activities.
Profile and Billing Management: Update profile information, manage billing details, and access account settings.
Navigating to the Sign-Up Page: Open the URL and click on button
Upon clicking the "Sign Up" link on the home screen, users will be redirected to the "Sign up as a Partner" page.
Entering User Information:
The user must provide the following details:
Your Name
Your Email ID
Mobile Number
Organization Name
Accepting Terms and Conditions:
Users must accept the terms and conditions by selecting the checkbox.
Click the "Sign Up" button to proceed.
Account Approval Process:
After submitting the sign-up form, the partner account will undergo an approval process by emSign.
Account Confirmation Notification:
Upon submission, an account confirmation email will be sent to the user, containing relevant information about the registration and next steps.
Account Activation Process:
Once the reseller account is approved, an account activation email will be sent to the registered email ID.
Activating the Account:
Users must click the activation link in the email to access the "Activate Your Account" page.
Setting a Password:
On the "Activate Your Account" page, users will be prompted to create a password according to the provided instructions.
Password Generation and Update:
After entering the password, click the "Generate Password" button to finalize the process.
The password will be updated, and the partner account will be activated and ready for use.
Procedure for installing Certificate in HSM
This tool is used to download the certificate in a soft Token (or) USB Token.
The eMudhra emSign Click Tool can be downloaded in this Page.
This tool can be downloaded in Windows 7, Ubuntu, MAC operating systems.
Click the Download button provided or copy the link and paste it in the address bar to use the tool and generate the certificate as shown below.
The tool gets downloaded in the system. Upon clicking the tool will be displayed in a modal.
Step: 1 (Open emSign Click Tool)
Step: 2 (Please enter "Order ID" and its associated "Download PIN". Click on "Confirm") Note: Once the certificate is ready for download, Download PIN will be shared to the respective certificate requester's Email ID.
Step: 3 (Certificate Requester will be redirected to "Download" tab as shown below) For an example, Select "Utimaco HSMs" from the dropdown list of Cryptographic Service Provider
Step: 4 (On click of "Agree & Download", system will prompt to provide "Library Path", "Slot ID" and "Normal User Pin" associated with the selected HSM provider for certificate download.)
Step: 5 (Login to your HSM service provider. In your HSM provider application, Slot management / Configuration setup should be made as shown below.)
Step: 6 (Initiate HSM services as shown below.)
Step: 7 (Once the HSM services are successfully initialized, detailed information (Status, etc.) can be viewed as shown below.)
Step: 8 (Certificate will be downloaded successfully as shown below.)
Step: 9 (Certificate installed successfully in HSM )
Key profiles refer to the specifications and attributes associated with cryptographic keys used in SSL/TLS certificates. They help determine how keys are generated, managed, and utilized in various security protocols.
To create Key Profiles, Navigate to Keys > Key Profiles
To create a new Key profile, click on "+" icon. Screen will navigate to the create key profile screen as shown below.
Create a HSM Key Profile
To create a Key profile for HSM, enter the following details
Profile Name
Select Profile Type as HSM from the dropdown
HSM Configuration Type
HSM configuration by importing file
Click on Save button to complete the process.
Create a PCKS12 Key profile
To create a PKCS12 Key profile, enter the following details
Profile Name
Profile Type- Select PKCS 12 from the drop down
Select Configuration-
Select Import to load PKCS 12 configuration from an existing file
Click Save to generate the Key profile
Disable a key profile
To disable a Key Profile, Navigate to Keys > Key Profiles
All the active Key Profiles will be displayed, and the User can Disable the key Profile from the Action buttons
A pop-up is displayed asking the User to confirm
To edit HSM password on an existing Key profile, Navigate to Keys> Manage Keys
Click on Edit from the action buttons which displays a modal allowing users to edit the password.
Users can view or edit existing requests on the Orders page. By default, the last 10 request/orders are displayed, as shown below.
By clicking 'Advanced Search,' the account user can further filter requests using criteria such as:
Date Range
Domain Name
The Domains Management section is designed to provide a centralized platform for managing all domains, monitoring their status, and handling Domain Control Validation (DCV) processes to ensure streamlined and secure domain verification.
Enhanced Control and Visibility:
Enhanced Control and Visibility:
The Organizations Management section serves as the central hub for monitoring, managing, and maintaining information related to all organizations created within the system. It not only lists organizations with their statuses but also provides tools to update information, track key representatives, and manage approval workflows such as Extended Validation (EV) requests.
This section ensures seamless governance by enabling administrators to keep organization records accurate and updated, making it easier to oversee operations and compliance.
Features and Functionalities of Organizations Management
Comprehensive Organization Listing
A root store is a repository of trusted root certificates used by operating systems, browsers, and other software applications to verify the authenticity of digital certificates. When a Certificate Authority (CA) is included in these root stores, any certificate they issue will be trusted by default on devices and browsers that use those stores. This is a cornerstone of Public Key Infrastructure (PKI), as it ensures that users and organizations can confidently navigate the internet, knowing that their digital connections and documents are backed by verified credentials.
As a global CA, emSign maintains its presence in multiple widely used root stores, ensuring that digital certificates issued by emSign are recognized and trusted by billions of devices worldwide. Below is an overview of emSign’s current root store inclusions and the significance of each program.
Major Root Store Programs
Microsoft Trusted Root Program
Enterprise Accounts
Ideal for: Large organizations and enterprises managing their own certificate infrastructure.
Enterprise accounts provide many of the same capabilities as reseller accounts, with a few limitations to align with internal enterprise needs. Key features include:
Full Portal Access: Manage certificates, users, domains, and organizations directly through the portal.
Group and Fund Management: Create, edit, and manage groups, and allocate funds to streamline operations.
This page is used to create configuration templates for certificates. These templates define the necessary attributes and settings for certificate generation, such as the CSR template, key pair types, and deployment methods.
Create provisioning templates
Step 1:
In Certificate Information tab, enter the unique Template Name.
Select the Origin of the Certificate configuration from the dropdown menu.
Unlike Domain Validated (DV) & Organization Validated (OV) certificates, EV certificates requires a more extensive validation process than that of Domain Validation and Organization Validation SSL certificates to confirm the identity and legitimacy of the organization that owns and operates the website
Validation Process: Rigorous validation process including legal identity, physical presence, operational existence, and domain ownership verification.
Issuance Time: Longer issuance time due to the rigorous validation process. Typically, issuance would take 1-5 Business days.
Process Involved:
By default, the Default Template is set as Yes.
Step 2:
· Select the Key Pair Type. If New is selected, new key is generated.
· If Key Pair Type is selected as Existing, previously created keys are listed for user to select.
· If Key Store Password Type is selected as Random, a random system generated password is created which can be viewed later. If Manual is selected, the user can provide any desired password.
· In CA Type tab, select the CA and CA Connector name and click on Save button.
Step 3:
· Select the CA from the dropdown menu.
· Select the CA Connector Name from the dropdown menu and click on Save button.
Step 4:
· After Provisioning template is created, it is listed with status as Active.
· Under Actions tab, click on the Edit Template icon, the page will be redirected to Update Provisioning Template page.
· Edit the fields and click on Update button. The changes made will be updated successfully.
Clone provisioning templates
· Under Actions tab, click on the Clone Template icon, the page will be redirected to Clone Provisioning Template page.
· Enter the new Unique name and click on Save button. The template will be cloned successfully.
· Under Actions tab, click on the Disable Template icon, confirmation popup is opened.
· Click on Yes button, the template will be disabled successfully.
· Under Actions tab, click on the Delete Template icon, confirmation popup is opened.
· Click on Yes button, the template will be deleted successfully.
Domain Control Validation (DCV): Domain Control Validation can be done online and it's an customer friendly automated process.
Extended Organization Validation (OV): Extended Organization Vetting process includes,
Organization Identity & Address verification,
Doing Business As / Tradename verification (if 'O' value provided is a Tradename),
Authenticity of certificate request verification through online email link acceptance by Certificate Requester,
Verified Method of Communication - emSign delivers the code using reliable method of communication (email / telephone). Requester will receive a link to submit the code to prove the authenticity of the certificate request.
Physical existence / Place of Business Verification,
Operational existence,
Contract Signer Verification,
Certificate Approver Verification,
Signer's authority to sign the Subscriber Agreement &
Approver's authority to approve EV certificate request .
Online Consent Acceptance by Certificate Requester: As part of SSL EV process, Requester Consent link will be sent to Certificate Requester's email address.
Online Subscriber Agreement Acceptance by an authorized Contract Signer: As part of SSL EV process, Subscriber Agreement link will be sent to an authorized Contract Signer's email address.
Online EV Request Approval by an authorized Certificate Approver: As part of SSL EV process, EV Request Approval link will be sent to an authorized Certificate Approver's email address.
Certificate Signing Request (CSR): As part of SSL EV process, CSR has to be submitted to Certifying Authority (emSign).
Organization Type
Country (Select from the dropdown menu)






















Email Protection




















Select Create to choose
Key Algorithm
Key Store Type
Keystore Password






Role-based access control
The emSign CERTInext platform offers six roles, each designed to address specific responsibilities and access requirements within the system:
Administrator
Manager
Finance Manager
Standard User
Basic User
Discovery User
Administrator
The Administrator role provides full access to the platform, enabling comprehensive management of users, groups, organizations, and financial operations. This role is intended for system overseers responsible for administrative and operational tasks.
Key Access Controls
Full portal access, including the Dashboard.
Manage:
Certificates (requests, orders, expiring certificates).
Organizations, domains, groups, and users.
Private and public Certificate Authorities (CAs) and products.
Sub-accounts and price lists for sub-accounts.
Access to:
REST and ACME APIs.
Financial features.
Audit logs and tools.
Reports and account settings.
Create user invitations and assign roles.
Manager
The Manager role focuses on overseeing groups, users, and orders while managing sub-accounts and associated group features. This role excludes full administrative and financial permissions.
Key Access Controls
Dashboard access (billing alerts, low credit alerts, and self-orders tracking).
Manage:
Organizations and domains.
Groups (including credit allocation) and users.
Private and public CAs and products.
Sub-accounts and price lists for sub-accounts.
Access to:
REST and ACME APIs.
Financial features.
Audit logs, reports, and tools.
Finance Manager
The Finance Manager role is tailored for managing financial operations, such as fund allocation, price lists, and finance-related features, without broader administrative control.
Key Access Controls
Dashboard access (billing alerts and self-orders tracking).
Manage:
Groups (credit allocation) and users.
Sub-accounts and price lists for sub-accounts.
Private and public CAs and products.
Access to:
REST and ACME APIs.
Financial features.
Audit logs, reports, and tools.
Standard User
The Standard User role allows for requesting certificates and accessing group orders. It includes broader access than the Basic User but lacks administrative permissions.
Key Access Controls
Dashboard access (billing alerts and self-orders tracking).
Manage:
Private and public CAs.
Access to:
REST and ACME APIs.
Reports, tools, and profile settings.
Basic User
The Basic User role provides minimal permissions, focusing on personal tasks such as requesting certificates and managing profile information.
Key Access Controls
Dashboard access (billing alerts and self-orders tracking).
Access to:
REST and ACME APIs.
Reports, tools, and profile settings.
Discovery User
The Discovery User role is dedicated to users responsible for certificate discovery operations. This includes tasks such as key management, key store handling, and accessing discovery-related features.
Sub Account User
Sub Account User role is dedicated only to the Partners. Partner can create a user role as Sub Account User and assign them to a group.
Custom Roles
To create a Custom Role, go to Settings > Users> Custom Roles
The Custom Roles module offers administrators the ability to create highly customized user roles with detailed permission controls.
Key Features:
Administrators can create user roles instead of using generic roles, they can design roles based on tasks, departments, or job functions.
Granular Permission Control: administrators to define permissions at a very granular level. This includes controlling who can access particular features, data, and actions within the CERTInext platform.
User Mapping: Administrators can assign users to the roles they create, mapping specific users to the appropriate role with the corresponding permissions.
Organization Name
Product
Other available details
Approve Sub Account Certificate Request
Navigate to the Certificates > Orders. Open the order with the status "Order pending for parent approval".
Click the "View" button on the orders page to verify all relevant information related to the certificate orders
After verifying the details, click the “Approve” button.
Upon clicking "Approve", the system will navigate to New Request > Order Summary & Payment Page.
Click "Pay now" to complete the payment. The will be deducted from the main user account balance within the default group.
Once payment is completed, the system will redirect to the orders page displaying all the necessary information and its associated Order.
What's Next?
Upon successful order placement, the certificate requester / Organization representative will receive an Order Confirmation email.
The email will include a link to the Track Orders page, where users can monitor the certificate verification process.
Save as Draft Request
Upon clicking the "Save" button on the Order Summary & Payment page, the request will appear on, the Orders page with the status "On Hold".
If the status is "On Hold", it can either be processed /rejected from Oorders view page as shown below.
Rejecting the Request: Click the "Reject" button and enter the reason for rejection in the provided field and click “Reject” to finalize the action.
Payment:
Click the "Proceed to Pay" button to navigate back to the Order Summary & Payment Page. The account user, must click "Pay now" button to submit the request and generate the Order ID.
Once the payment is successful, the system redirects to the Orders Page, displaying all relevant order details.
The associated Order Actions and Quick Actions will also be available for further processing as shown below.
Order Status and Corresponding situations
Order pending for parent approval & On Hold
Explained above as part of approve sub account certificate request & On Hold status.
Order Accepted
This status will be displayed once the order is placed by an account user.
Order in progress
This status will be displayed when the order is in progress (i.e., Any of the action completed either from customer (or) eMudhra.
Order Fulfilled
This status will be once the certificate request is approved by eMudhra.
Order Cancelled
This status will be displayed when an account user cancels the certificate request.
Order Rejected
This status will be displayed when customer rejects the certificate request.
Sharing Order Status
Navigate to: Certificates> Orders> View Order page and Click on "Track Order" to open a modal, as shown below.
Ways to track the order:
You can track the order status using either of the following options:
Open URL: Click "Open URL" to open the track order page in a separate window, displaying the product verification process.
Share URL: Click "Share URL" to send the order tracking link to the Certificate Requester/Organization Representative.
Cancel A Pending Certificate Order
Navigate to the Order Page:
Go to Certificates > Orders > View Order page.
Initiate Order Cancellation:
Click on the Cancel Order button under the order actions.
A confirmation modal will appear as shown below.
Provide Cancellation Remarks:
Enter the reason for cancellation in the Cancellation Remarks field.
Click on Cancel Order to confirm.
What's Next?
Upon order cancellation, the certificate request will no longer be processed. Account user will receive a refund for the cancelled order. They can go back to the Order View page to download a credit not associated with the cancelled order if they desire.


Users gain a single platform to view and manage all domains, improving efficiency and reducing the risk of lapses in domain verification or expiration.
Streamlined Verification Process:
The ability to adjust DCV methods and track status simplifies the management of compliance requirements and keeps domains secure.
Secure Domain Addition:
Adding new domains with ownership verification helps maintain the security of the domain portfolio and prevents unauthorized additions.
By centralizing these functions, the Domains Management section helps organizations maintain a secure, organized, and fully validated domain portfolio, crucial for digital security and operational efficiency.
Manage and View Domain Information
Detailed Domain Information:
For each domain, users can access detailed information, including domain name, creation date, verification details, and ownership records. This allows users to have complete visibility over each domain’s setup and history.
Editing Domain Information:
Users can modify or update domain-related details directly from this section, ensuring that the information is always current and accurate. This is particularly useful when domain ownership changes or updates are needed for compliance or business requirements.
Domain Control Validation (DCV) management
Flexible DCV Method Changes:
The Domain Control Validation (DCV) method can be altered if a different verification method is preferred or required. Users can select from multiple DCV methods such as Email, DNS, or HTTP, depending on what best suits the domain and organization’s needs.
Sending for Approval:
Once the DCV method is chosen, users can initiate the approval process. This is essential for completing the domain verification process and is done with a single click, streamlining the workflow.
Tracking DCV Status and Expiry Date:
For each domain, the DCV status (e.g., Pending, Approved, Rejected) and Expiry Date of the validation are prominently displayed. This allows users to stay informed on when validations need renewal and if any issues arise in the approval process, they can be addressed promptly.
Adding a New Domain
Creating and Verifying New Domains:
New domains can be added through this feature, where they undergo a verification process to confirm domain ownership. This includes setting up the domain’s information and initiating the DCV process to ensure the domain is validated correctly.
Domain Ownership Verification:
As part of the new domain creation, verification is conducted to confirm that the domain belongs to the requesting organization. This security step prevents unauthorized domain additions and enhances trust. To Know more about DCV method, click here.
DCV Method Overview:
To understand the available DCV methods, users can click on the provided link, which explains the options (Email, DNS, or HTTP) and their specific requirements. This resource ensures that users select the most suitable DCV method for their needs.
Domain List and Status Overview
Comprehensive Domain Listing:
All domains that have been created are listed here in an organized format, allowing users to view and access each domain quickly. This includes both active and inactive domains.
Status Indicators:
Each domain displays a status indicator (e.g., Verified, Pending, Expired), providing users with an instant overview of the verification and operational state of each domain. This feature helps in identifying any domains that may need immediate attention for renewal or verification.
Manage and View Domain Information
Detailed Domain Information:
For each domain, users can access detailed information, including domain name, creation date, verification details, and ownership records. This allows users to have complete visibility over each domain’s setup and history.
Editing Domain Information:
Users can modify or update domain-related details directly from this section, ensuring that the information is always current and accurate. This is particularly useful when domain ownership changes or updates are needed for compliance or business requirements.
Flexible DCV Method Changes:
The Domain Control Validation (DCV) method can be altered if a different verification method is preferred or required. Users can select from multiple DCV methods such as Email, DNS, or HTTP, depending on what best suits the domain and organization’s needs.
Sending for Approval:
Once the DCV method is chosen, users can initiate the approval process. This is essential for completing the domain verification process and is done with a single click, streamlining the workflow.
Tracking DCV Status and Expiry Date:
For each domain, the DCV status (e.g., Pending, Approved, Rejected) and Expiry Date of the validation are prominently displayed. This allows users to stay informed on when validations need renewal and if any issues arise in the approval process, they can be addressed promptly.
New domains can be added through this feature, where they undergo a verification process to confirm domain ownership. This includes setting up the domain’s information and initiating the DCV process to ensure the domain is validated correctly.
Domain Ownership Verification:
As part of the new domain creation, verification is conducted to confirm that the domain belongs to the requesting organization. This security step prevents unauthorized domain additions and enhances trust. To Know more about DCV method, click here.
DCV Method Overview:
To understand the available DCV methods, users can click on the provided link, which explains the options (Email, DNS, or HTTP) and their specific requirements. This resource ensures that users select the most suitable DCV method for their needs.
Each entry displays:
Organization Name
Unique Identifier (if applicable)
Status of the Organization (e.g., Active, Pending, or Suspended)
Date of Creation/Last Updated
This overview allows users to quickly monitor the state of all organizations and take necessary actions.
Manage Organization Information
Select any organization from the list to edit or update key information, including:
Name, Address, and Legal Information
Contact Details
Organization Validity or Renewal Dates
Status Management: Administrators can activate, deactivate, or suspend organizations based on compliance requirements or internal policies.
Keeping this information accurate ensures compliance with security and operational protocols.
Organization Representative Management
Each organization must designate primary and alternate representatives.
These representatives are responsible for interacting with the system and making formal requests (like certificate orders or EV validations).
The Organization Representative Information section displays:
Name, Role, and Contact Information of the representatives
Access levels or permissions granted to them
Ability to edit or replace representatives when necessary
Ensuring correct representative information guarantees smooth communication and process flows with the organization.
Extended Validation (EV) Request Approvals
Track and manage EV certificate requests for the selected organization.
EV certificates are used to establish higher trust levels, especially in public-facing applications.
Admins can:
Approve, Reject, or Request Modifications to EV requests.
Track the status of each EV request (e.g., Pending, Approved, Rejected).
Ensure audit logs are maintained for each approval or rejection for future reference and compliance.
This feature helps administrators enforce rigorous security practices for organizations requiring enhanced validation processes.
Advanced Actions for Administrators:
Export Organization Data:
Export the list of organizations along with their details for reporting or compliance purposes.
Set Up Alerts and Notifications:
Configure alerts to receive notifications on status changes or upcoming renewals.
Automate notifications for EV request status updates to stay informed in real time.
Audit Trail:
Access a history of changes and approvals for each organization to ensure accountability and transparency.
Log all modifications to representative information and EV requests for compliance auditing.
This helps enterprises to re-use organization details in the ordering form and quickly get the OV certificates with minimum verification requirements and customer pending actions.
Navigate to Organizations > Add Organization
Enter the required Organization Information
Enter the Organization Representative Information
Upload the Organization Registration Documents and click on Submit for Validation
The organization details verification will be pending with validation for OV. For details on OV validation process, click here.
The Organization details are verified by the eMudhra validation team and approved.
After the Organization verification, the Organization information can be re-used to order the certificate reverification of the organization details.
Note: The OV Organization details is also verified while ordering a OV certificate. For details on ordering a OV certificate, please click here. The same organization details can be re-used for the subsequent OV orders.
Navigate to New Certificate > SSL/TLS Certificates > EV certificate
For EV Organizations, user must verify the organization by ordering any EV certificate. For details on ordering a EV certificate, click here.
The EV Organization details are verified by the eMudhra validation team and approved.
In the Organizations page, the organization details verification will be pending with validation for as EV & OV.
The same EV Organization details can be re-used for ordering a new EV or OV certificate as a pre-vetted organization.
Note: Exclusive EV prevetting of organization is not available.
Scope: Covers Microsoft Windows operating systems (e.g., Windows 10, Windows 11, and their server equivalents) and Microsoft’s products like Internet Explorer and Edge.
Importance: Inclusion ensures that emSign certificates are trusted on all supported Windows environments by default, allowing seamless usage in enterprise networks and consumer devices.
Version/Last Update: Monthly releases; latest deployment notice as of June 26, 2025.
Apple Root Certificate Program
Scope: Includes macOS, iOS, iPadOS, and Safari.
Importance: Being part of Apple’s trust store allows emSign’s certificates to function seamlessly across Apple desktops, laptops, and mobile devices, covering a vast user base in both consumer and business contexts.
URL: https://support.apple.com/en-us/103272 (current list at )
Version/Last Update: Root Store version 2024051500 (current for iOS 18, iPadOS 18, macOS 15, tvOS 18, visionOS 2, and watchOS 11).
Mozilla Root Store
Scope: Impacts Mozilla Firefox and derivative browsers or applications using Mozilla’s root store.
Importance: Firefox is a popular cross-platform browser, used extensively on Windows, macOS, Linux, and Android. Inclusion here ensures that emSign certificates work smoothly across diverse computing environments.
URL: (included certificates report at )
Version/Last Update: Mozilla Root Store Policy version 3.0 (effective March 15, 2025).
Android Root Store
Scope: Governs the vast Android ecosystem—smartphones, tablets, and other devices running Android OS.
Importance: With a significant share of the global mobile market, inclusion in the Android root store means that emSign certificates are trusted on devices from a wide array of manufacturers.
Version/Last Update: Updated with Android OS releases; current with Android 16 (as of August 2025, includes updates via Google Play since Android 14).
Java (Oracle) Root Store
Scope: The Java platform and applications that rely on Java’s default keystore (cacerts).
Importance: Many enterprise and server-side applications depend on Java’s trust store. Being included here ensures smooth integrations where Java-based applications must validate or use emSign-issued certificates.
URL: https://www.oracle.com/java/technologies/javase/carootcertsprogram.html (cacerts file included in JDK distributions)
Version/Last Update: Updated with JDK releases; current with JDK 25 (released September 2025).
Note: The specific coverage and update cycles differ by platform; some devices or operating systems may require manual updates to trust the latest root CAs.
For more information on emSign's inclusion in specific root stores, feel free to check ccadb or reach out to our support team.
Organization & Domain Management: Pre-verify and manage domains and organizations for faster certificate issuance.
API Integrations: Access REST and ACME APIs to generate and manage their own keys.
Certificate Management: Issue and monitor certificates, with built-in tools to track expiring certificates.
Finance & Billing Management: View financial reports, manage account funds, and update billing information.
Private CA Management: Create and manage private CAs and develop customized products for internal use.
Reports & Tools: Utilize the reporting features and tools available on the platform.
Profile and Notifications: Manage profile information and receive alerts related to self-orders and associated group activities.
Limitations:
Enterprise accounts do not have access to sub-account creation or price list management for sub-accounts.
Navigating to the Sign-Up Page: Open the URL https://www.hub.emsign.com and click on “Sign Up” button
Upon clicking the "Sign Up" link on the home screen, users are redirected to the "Sign up as an Enterprise" page.
Entering User Information:
Users are required to fill in the following details:
Your Name
Your Email Address
Mobile Number
Organization Name
Country (select from the dropdown menu)
Accepting Terms and Conditions:
Users must accept the terms and conditions by selecting the checkbox.
Click the "Sign Up" button to proceed.
Acknowledgement and Account Activation:
Upon clicking the "Sign Up" button, a thank you message will appear on the screen, confirming the sign-up request.
An account activation email will be sent to the registered email ID.
Activating the Account:
Users must click the activation link in the email to proceed to the "Activate Your Account" page.
Setting a Password:
On the "Activate Your Account" page, users will be prompted to set a password following the system-provided instructions.
Password Generation and Update:
After entering the password, click the "Generate Password" button to complete the process.
The password will be successfully updated, and the account will be ready for use.
ount by contacting the emSign Hub account manager.
Follow these steps to place an order for a DV SSL/TLS certificate through the CERTInext portal. The same process applies for DV Multi-domain (UCC), Wildcard, and Wildcard-UCC products.
Choose Product & Validity
Select the product from the Product Dropdown List: Options include emSign SSL/TLS - DV, DV Wildcard, DV-UCC, or DV Wildcard-UCC.
If a UCC product is selected, enter the number of domains to see the order value in real-time.
All emSign SSL/TLS certificates are valid for 1 year by default.
Click "Next" to proceed.
Certificate Requester Information
Enter the following details for the certificate requester to ensure all notifications are sent to the correct person:
Requester Name
Requester Email ID
Mobile Number
Designation
Upload or Paste Certificate Signing Request (CSR)
You can provide the CSR in either of the following ways:
Upload CSR file.
Paste CSR directly into the designated field.
Note: The CSR helps auto-populate the Domain Name under the certificate details section. If skipped, the SAN (Subject Alternative Name) field will not be auto filled.
You can also skip this step by selecting "Skip CSR
Certificate Details
The Domain Name is auto populated based on the uploaded CSR.
If no CSR is provided, or if additional domains are needed:
Enter the domain name manually.
Pre-verified domains associated with the selected group will appear in the dropdown list.
Additional Information (Optional)
Reporting Tags: Add tags to map the request for easier tracking and filtering.
Click "Add Tag" to provide the Tag Name and Tag Value, then click "Save" to proceed.
Order Remarks: Add any relevant remarks for internal tracking.
Order Summary & Payment
Review the product information, certificate details, and payment summary.
The Payment Group from which funds will be deducted will be indicated.
Account Balance: Displays the current balance alongside the total order value.
For USD Payments: GST is not applicable.
Post-Order Actions
Edit Custom Fields:
Custom fields associated with the order can be edited after the order is generated.
Update Additional Email Recipients:
Add or modify additional email recipients even after the order is placed to ensure they receive important notifications
What’s Next?
Upon successful order placement, the certificate requester will receive an Order Confirmation Email with a tracking link.
Use the tracking link to monitor the certificate verification process step-by-step.
Once the certificate is verified and issued, the requester can download and deploy it accordingly.
The emSign CERTInext platform allows you to incorporate custom fields in your certificate order form, streamlining record-keeping and enhancing order management efficiency.
Key Features
Default Setting: The Custom Fields feature is turned off by default. To enable this feature for your account, please contact your account manager.
Access for Administrators: Once enabled, the Custom Order Fields menu option becomes available under Settings > Custom Fields for Administrator users.
Account-Specific Customization: These custom fields are unique and specific to your account.
Use Cases
Enterprises often require additional custom fields to capture specific information relevant to their operations. Below are some common examples:
Project Codes: Record internal project codes in the order form to automatically associate them with the order.
Cost Centre/Business Unit: Capture cost centre or department names (e.g., Technology) to link orders to specific business units.
Internal Notes: Add internal request numbers, comments for order fulfillment, or special handling instructions.
Owner/Sponsor Email ID:
By leveraging custom fields, enterprises can tailor the certificate ordering process to their unique needs, improving operational efficiency and ensuring better record management.
Adding a custom field
Follow the steps below to add a new custom field to your emSign account:
Access the Add Custom Field Option: Click on the "Add Custom Field (+)" option. The 'Add Custom Field' pop-up window will appear, as shown below.
Enter Field Details:
Field/Label Name: Provide a name for the custom field.
Field Description: Add a description to display as help text for the custom field (optional).
Input Type: Select the input type from the drop-down menu. The subsequent required fields will depend on the selected input type.
Input Type Configurations:
Text Box:
Max. Length: Specify the maximum allowed characters for the text field.
Field Specification: Choose from Alphabets, Integers, or Special Characters.
Field Presence: Mark the field as Optional or Mandatory.
Click on "Add Field" to save and add the custom field to your account.
View Custom Field
Click on the 'View' hyperlink in the grid to open the Custom Field Details page. On the Custom Field View page, Account Administrators can:
Edit: Modify the custom field details as needed.
Deactivate: Disable the custom field. Once deactivated, the field will no longer appear in the order forms.
An Intranet SSL certificate functions similarly to SSL certificates issued by public authorities but is specifically designed for private networks or internal sites. It secures data exchanges within private environments by encrypting the communication between client devices and server over HTTPS. This encryption ensures that even if unauthorized parties attempt to intercept the data, they cannot decipher it, safeguarding sensitive information and passwords exchanged within the internal network.
Key Features of Intranet SSL Certificates
Technical Specifications & Installation:
Intranet SSL certificates share the same technical specifications and installation procedures as public SSL certificates. However, their usage differs.
Compliance with CA/B Forum Regulations:
emSign SSL DV Validation Process is simple & fully automated.
Validation Process: Validation of domain ownership to prove control over the domain.
Issuance Time: Shorter issuance time. Issuance in minutes.
Process Involved:
According to the CA/Browser Forum regulations, public CAs cannot issue SSL certificates for internal server names, localhost, or reserved IP addresses. As a result, private servers must acquire SSL certificates from Private CAs.
emSign Intranet SSL:
Non-Public Root Certificates: emSign provides Intranet SSL certificates via private root certificates.
Fast Issuance & Competitive Pricing: Enjoy a faster process and cost-effective pricing compared to traditional offerings.
Secure Internal Server Names and IPs:
Intranet SSL certificates enable encryption for internal server names, localhost, and reserved IP addresses.
Support for Multiple Configurations:
Single Domain
Wildcard Certificates
Multiple Domains (UCC)
Includes Organization Information:
Each certificate contains the Organization Name (O) to ensure verified identity.
Fully Automated Process & Instant Approval:
Enjoy quick and automated issuance for fast implementation.
Fast Issuance:
Certificates are typically issued within minutes of submission.
Extended Validity:
Certificates can be issued with a maximum validity of up to 5 years.
No Self-Signed Certificates:
All certificates are issued from trusted private CAs to avoid self-signed certificate risks.
Improved Performance & No Browser Warnings:
Seamless user experience with no browser security warnings.
Automatic Renewal Reminders & Early Renewal Options:
Stay protected with automatic renewal notifications and the ability to renew certificates early to prevent service disruptions.
Intranet SSL certificates are ideal for securing internal systems, protecting sensitive data, and maintaining compliance with industry standards. With emSign’s fast issuance process and competitive pricing, you can ensure your internal network remains secure and operational without compromise.
Choose Product & Validity
Navigate to Certificates > New Request.
From the Product Dropdown List, select a Private PKI product that suits your needs.
The certificate validity period will be displayed based on the selected product configuration.
Click "Next" to proceed.
Certificate Requester Information
Enter the following details for the certificate requester:
Name
Email ID
Mobile Number
Designation
These details will ensure that the requester receives all relevant order notifications.
Click "Next" to continue.
Certificate Information
Internal DNS Type:
Enter the domain name (mandatory). This can include internal domains, IP addresses, or internal server names.
Note: Domain Control Validation (DCV) is not required for internal domains.
Optionally, provide additional details such as:
Additional Domain Names
Organization Name & Unit
Country, State/Province
Click "Next" to proceed.
Certificate Signing Request (CSR)
CSR submission is mandatory for Private PKI Intranet SSL certificates.
You can provide the CSR in either of the following ways:
Upload CSR
Paste CSR
Click "Next" to proceed.
Additional Information (Optional)
Reporting Tags:
Click "Add Tag" to map tags to the order request for easy filtering.
Provide the Tag Name and Tag Value, and click "Save" to continue.
Order Remarks:
Add any relevant remarks as part of the order request.
KYC Documents (if applicable):
Upload any required KYC documents to complete the request.
Click "Next" to proceed.
Order Summary & Payment
The Order Summary section provides an overview of:
Product Information
Certificate Details
Payment Summary (including the deduction group for the payment).
Payment Information:
Displays the current account balance, order value, and grand total.
For USD payments: GST is not applicable.
For INR payments: GST will be applied.
Click "Pay Now" to finalize the payment.
After payment, the user will be redirected to the Orders View Page, where all order-related details will be displayed.
What's Next?
After the order is successfully placed, the certificate will be available for download.
Navigate to the Orders View Page and use the "Download Certificate" option to retrieve the certificate.
Select IGTF product from the Product Dropdown List.
Click "Next" to proceed.
2. Certificate Requester Information
Provide the following details:
Requester Name
Email ID
Mobile Number
Designation
These details will ensure the requester receives all relevant order notifications.
Click "Next" to continue.
Certificate Information
Domain Name: Enter the domain name (mandatory).
www Variant: By default, the checkbox "Automatically secure 'www' variant of websites" will be selected. You can uncheck it if not required.
Additional Details: Optionally, enter:
Additional Domain Names
Organization Name
Organization Unit
Country
State/Province
Click "Next" to proceed.
Internal DNS Type:
If Internal is selected, an order confirmation email will not be sent.
The user can download the certificate immediately from the "Download Certificate" option on the Orders View Page.
External DNS Type:
If External is selected, an order confirmation email with a tracking link will be sent to the requester.
The requester must complete all pending actions before downloading the certificate.
Certificate Signing Request (CSR)
CSR submission is mandatory for private PKI products.
You can provide the CSR using one of the following methods:
Upload CSR
Paste CSR
Click "Next" to continue.
Additional Information (Optional)
Reporting Tags:
Add reporting tags by clicking "Add Tag".
Enter the Tag Name and Tag Value and click "Save".
KYC Documents:
If required, enable the KYC Documents checkbox.
Upload the relevant documents and provide a brief description.
Click "Add Document" to upload multiple documents. Enterprise Administrators will review the KYC documents as part of the approval process.
Order Remarks:
Add any relevant remarks to the order request.
Order Summary & Payment
This section provides an overview of:
Product Information
Certificate Details
Administrator Validation Checklist (if applicable)
Payment Summary (including the deduction group from which payment will be made)
Administrator Validation Checklist:
This checklist will appear if configured as mandatory or optional during the product creation process.
It will only be displayed if administrator approval is required.
Payment Information:
Displays the account balance, order value, and grand total.
For USD payments: GST is not applicable.
For INR payments: GST will be applied.
Click "Pay Now" to finalize the payment.
After payment, the user will be redirected to the Orders View Page, where all order-related details will be available.
Important Note
If administrator approval is required, the order status will be displayed as "Order Pending for Approval."
What’s Next?
Upon successful order placement, the Certificate Requester will receive an Order Confirmation Email with a link to the Track Order Page.
The requester can use the tracking link to monitor the certificate verification process and download the certificate once it is ready.
Escalation POC: Record escalation points of contact for streamlined issue resolution during escalations.
Purchase Order Number: Add PO numbers to facilitate invoicing and payment processing.
Server IP Address: Capture server IP addresses to generate server-wise SSL usage reports when required.
Provider Name: Record the SSL provider’s name (e.g., eMudhra) for reference.
SSL Hosting Service Provider Name: Include the hosting service provider’s name for additional insights.
Drop-down:
Field Values List: Provide a pre-defined list of values.
Field Presence: Mark the field as Optional or Mandatory.
Date Picker:
Field Presence: Mark the field as Optional or Mandatory.
Checkbox:
Field Values List: Provide a pre-defined list of options.
Field Presence: Mark the field as Optional or Mandatory.
Email:
Max. Length: Specify the maximum allowed characters.
Field Presence: Mark the field as Optional or Mandatory.






















If another person should have authority to download the certificate, enable the relevant checkbox and provide their Contact Name and Email ID.
Click "Next" to proceed.
For sub-domains, the system allows reuse of the validation of pre-verified base domains, ensuring quick issuance without requiring repetitive DCV (Domain Control Validation).
Note: If the domain used is restricted by the administrator, the system will display a message:
"One or more domain names provided in this order are not allowed due to specific domain restrictions. Please contact your account administrator."
To add additional domains, select the DV UCC or DV Wildcard UCC product.
Newly validated domains will be mapped to the Default Organization to avoid repetitive DCV in future orders.
Click "Next" to proceed.
Custom Fields: If any custom fields have been set by the administrator, they will appear here. Custom fields are not included as part of the certificate’s Subject/SAN attributes.
Additional Email Recipients: Enable the checkbox to add recipients who will receive order confirmation, revocation, and renewal notifications (excluding verification-related notifications).
Auto-Renew Certificates: Enable auto-renewal to automatically renew certificates based on the configured criteria. If disabled, manual renewal will be required before the certificate expires.
Auto-renewal settings can also be edited later from the Orders View page after the order is placed.
Click "Next" to proceed.
For INR Payments: GST will be applied.
Click "Pay Now" to complete the payment. Upon payment, the amount will be deducted from the selected group, and the system will redirect you to the Orders Page.








Certificate Signing Request (CSR): As part of SSL DV process, CSR has to be submitted to emSign.
DNS TXT Record
Log in to your DNS provider and create a new TXT record with the provided host and value. To complete your domain verification, verify your DNS TXT record.
Step-by-Step Guide
Step 1: Log in to your DNS provider's site
Access your DNS provider's website and log in with your credentials.
Find the section where you can manage DNS settings for your domain. This is usually under "DNS Management," "Domain Management," or similar.
Step 2: Create a new TXT record
Locate the option to add a new TXT record. This might be under "Add Record," "Create Record," or similar.
Step 3: Copy the ‘Value’ from emSign system
Open the emSign order tracking link.
Select DCV Method as ‘DNS TXT Record’.
Copy the ‘Value'.
Step 4: Paste the copied Value into a new TXT record in the TXT Value field
In your DNS provider's interface, paste the copied value into the TXT Value field.
Step 5: Host field: Base Domain (e.g., example.com)
Enter the base domain for the Host field. For example, if your domain is example.com, enter example.com. If the TXT record is for a subdomain, enter the subdomain (e.g., sub.example.com).
NOTE: Leave this field blank or enter ‘@’ to signify that the TXT record is for the root of the domain.
Step 6: Select a Time-to-Live (TTL) value
Choose a TTL value. A common default is 3600 seconds (1 hour).
Step 7: Save the TXT record
Save the changes. The exact button might say "Save," "Add Record," or similar.
Step 8: Go to the emSign Platform & click ‘Verify Now’
Open the emSign order tracking link.
Click the ‘Verify Now’ button to complete the verification process.
Constructed Email
Confirming the Organization's control over the FQDN by sending an random value via email which will be valid for 24 hours.
Subscribers can resend the domain verification link from the track order page if the link expires.
Email to DNS CAA Contact
Login to your DNS provider. Create DNS CAA Record and provide your domain's email address as part of 'contactemail' property tag.
NOTE: The entire parameter value must be a valid email address as defined in RFC 6532, with no additional padding or structure, or it cannot be used.
Save the DNS CAA Record.
Email to DNS TXT Contact
Login to your DNS provider. Create the DNS TXT Record and provide your domain's email address on the following subdomain of your domain.
NOTE: The entire parameter value must be a valid email address as defined in RFC 6532, with no additional padding or structure, or it cannot be used.
HTTP/HTTPS File-based
File-based (HTTP / HTTPs URL) DCV method can only be used to prove the domain ownership over fully qualified domain names (FQDNs), exactly as named. In case you wish to have it work for both www and without www, we recommend you to use alternate DCV methods.
What is CAA?
CAA is a control to restrict which CAs can issue certificates for a particular domain name for issuing the certificate. By configuring the DNS CAA record, domain owners can specify which Certification Authorities are authorized to issue certificates to that domain name. You can use CAA to reduce your exposure to vulnerabilities in certificate authority validation systems and to enforce certificate procurement policies.
To use CAA, you publish a set of CAA records in your domain's DNS that list the CAs that you authorize to issue certificates. Before issuing a certificate, the CA checks your CAA records and blocks the request if they are not listed.
What is a CAA record?
A Certification Authority Authorization (CAA) record is a standard that lets you specify which certificate authorities (CAs) are allowed to issue certificates for your domain. The purpose of the CAA record is to allow domain owners to authorize which certificate authorities are allowed to issue a certificate for a domain.
Before issuing a certificate, the CA checks your CAA records and blocks the request if they are not listed. If no CAA record is present, any CA is allowed to issue a certificate for the domain.
CAA records can set policy for the entire domain, or for specific HostNames.
CAA records are also inherited by sub-domains.
CAA records can regulate the issuance of single-name certificates, wildcard certificates, or both.
From the Product Dropdown List, select any emSign SSL/TLS EV or EV UCC product.
If a UCC product is selected, enter the number of domains to view the order value in real-time.
Multi-year validity (up to 3 years) is available for all emSign SSL/TLS products.
Click "Next" to proceed.
Organization Details
New Organization:
If a new organization needs to be created, provide the following details:
Organization Name
Organization Unit
Street Address 1 & 2
Country, State/Province, Locality, and Postal Code
Click "Next" to proceed.
Pre-Verified Organization:
To place an order with a pre-verified organization, click "Click Here" to open the list of EV-validated organizations.
Select the desired organization, and all relevant details will be auto-filled.
Organization Representative Information
Refer to emSign SSL/TLS OV Certificate Order.
If a pre-verified organization is selected, the organization representative's details will be auto-filled.
For manual input, follow the OV certificate ordering flow by entering the representative’s name, email ID, mobile number, and other details.
Click "Next" to proceed.
Certificate Signing Request (CSR)
Refer to the DV certificate ordering process for CSR submission. Users can:
Upload CSR
Paste CSR
Skip CSR and submit it later through Order Quick Actions.
CSR auto-populates the Domain Name.
Certificate Details
The Domain Name will be auto-filled based on the CSR.
Alternatively, users can manually enter the following:
Domain Name
Business Category
Company Registration Number
For pre-verified organizations, the list of pre-verified domains will appear in the Domain Name dropdown.
Use the Single Sub-domain option to reuse pre-verified base domains for quick issuance without repetitive DCV (Domain Control Validation).
Important Note:
To add additional domains, select the EV UCC product.
Click "Next" to proceed.
Authorized Signatory Information
This section requires details of the Contract Signer and Certificate Approver.
Options for entering details:
New Entry
Existing Entry
Same as Organization Representative (for Contract Signer)
Same as Contract Signer (for Certificate Approver)
For pre-verified organizations, these details will be auto filled.
If not available, enter the following manually:
Name
Email ID
Telephone Number
Designation
Employee ID
Additional Information (Optional)
Refer to the OV certificate ordering flow for adding additional information, including:
Reporting Tags: Add tags for easier tracking and filtering.
Order Remarks: Add relevant remarks for internal use.
Technical Point of Contact: Assign another person to manage the technical aspects.
KYC Documents: Enable the checkbox to upload KYC documents, and click "Add Document" for multiple uploads.
Custom Fields: If configured, custom fields will appear here. These are not part of the certificate’s SAN or Subject attributes.
Additional Email Recipients: Add recipients who will receive order-related notifications.
Auto-Renew Certificates: Enable auto-renewal to automatically renew certificates before expiration. This can be edited later in the Orders View page.
Click "Next" to proceed.
Order Summary & Payment
Review the product details, certificate information, and payment summary.
The Payment Group from which the amount will be deducted will be displayed.
Account Balance:
USD Payments: GST is not applicable.
INR Payments: GST will be applied.
Click "Pay Now" to complete the payment. After payment, the system will redirect you to the Orders Page.
What’s Next?
After the order is successfully placed, the Organization Representative will receive an Order Confirmation Email.
The email will contain a tracking link to monitor the certificate verification process.
Once the certificate is issued, the representative can download and deploy it.

Choose Product & Validity
From the Product Dropdown List, select any SSL/TLS product: OV, OV Wildcard, OV UCC, or OV Wildcard-UCC.
If a UCC product is selected, enter the number of domains to see the order value upfront.
The default validity period for all SSL/TLS certificates is 1 year.
Click "Next" to proceed.
Organization Details
Permission Levels:
Specific Access: Users can select organizations only from a pre-verified list no option to create new organizations.
All Access: Users can either select pre-vetted organizations or enter new organization details directly.
Click "Select" to pre-fill the organization information in the form.
Click "Next" to continue.
Important Note:
If the user has an organization reuse token, it can be provided by enabling the I have an organization reuse token checkbox.
When the reuse token option is enabled, no organization consent email will be sent to the representative.
Organization Representative Information
If a pre-vetted organization is selected, the organization representative's details will be pre-filled automatically.
For a new organization, choose between "New" or "Existing" user:
New: Enter the representative’s Name, Email ID, Mobile Number, and Designation.
If the certificate download authority needs to be assigned to another individual, enable the Certificate Download Delegation checkbox and provide their Contact Name and Email ID.
Click "Next" to proceed.
Certificate Signing Request (CSR)
The process for submitting the CSR is identical to the DV SSL/TLS certificate order. Users can:
Upload CSR or
Paste CSR into the designated field.
Skipping CSR:
If the CSR is skipped, the SAN (Subject Alternative Name) field will not be auto-filled.
Users can submit the CSR later using the Order Quick Actions feature.
Certificate Details
If a CSR is provided, the Domain Name will be auto-populated.
To add a domain manually, enter it in the Domain Name field.
Pre-verified Domains: If the order is associated with a pre-verified organization, the corresponding domains will appear in the Domain Name dropdown list.
Use the Single Sub-domain
Additional Information (Optional)
This section allows users to provide additional order-related details:
Reporting Tags:
Add reporting tags by clicking "Add Tag". Enter the Tag Name and Tag Value and click "Save".
Order Remarks:
Include any remarks for internal tracking.
If custom fields are active for the account, they will appear here. These fields are configured by the account administrator and are not included in the certificate’s Subject/SAN attributes.
Additional Email Recipients:
Use this option to add email recipients who will receive Order Confirmation, Revocation, and Renewal Notifications, excluding verification-related alerts.
Auto-Renew Certificates Until Coverage:
Enable auto-renewal to ensure certificates are renewed automatically based on the configured criteria.
If disabled, manual renewal will be required before the certificate expires. This setting can be edited later from the Orders View page.
Click "
Order Summary & Payment
Review the Product Information, Certificate Details, and Payment Summary.
The Payment Group from which the order amount will be deducted will be displayed.
Account Balance:
For USD Payments: No GST will be applied.
What’s Next?
Upon successful order placement, the Organization Representative will receive an Order Confirmation Email.
This email will contain a tracking link to monitor the progress of the certificate verification process.
Once the certificate is issued, the representative can download and deploy the certificate.
The emSign CERTInext Bot is a comprehensive software solution for managing digital certificates across an organization's infrastructure. It automates the process of scanning, monitoring, and renewing certificates.
The emSign Bot is available for the following operating systems:
Windows
Ubuntu
How the emSign CERTInext Bot works
The emSign Bot is deployed on your server to scan and gather certificate data.
To download the emSign Bot executable file, navigate to Integrations > Tools > emSign CERTInext Bot.









Existing: Select the representative from the list of existing users.
Certificate Download Delegation:
To add additional domains, select the OV UCC or OV Wildcard UCC product.
Click "Next" to proceed.
Technical Point of Contact:
Enable the Technical Point of Contact checkbox and provide the individual’s Name, Email ID, Mobile Number, and Designation.
KYC Documents:
If required, enable the KYC Documents checkbox and upload the relevant documents. Use the "Add Document" button to upload multiple documents.
Custom Fields:
For INR Payments: GST will be applied.
Click "Pay Now" to complete the payment. Upon payment, the amount will be deducted from the selected group, and the system will redirect you to the Orders Page.









The emSign Bot needs to run as Administrator. Once installed, the bot is launched and the interface will appear on your system as shown below.
Need to set up templates and profiles for generating keys and provisioning certs, if you want to use the Bot for provisioning.
Navigate to Certificates > Bots to begin the setup.
Account Administrator Restrictions: By default, the account administrator can create only one emSign Bot. To create additional bots, the administrator must contact the account manager.
Who can create bots?
Both Resellers and Enterprise users can create emSign bots.
Filtering Bots: Use the search option or advanced search to filter and locate specific bots
Adding a new emSign bot: Click the plus (+) icon in the top-right corner to open the New emSign Bot modal.
Configuring the New Bot:
Provide the Bot Name and select the Group.
Click the “Generate Bot Token” button to complete the setup.
Activating the Bot:
Once created, the bot status will display “Activation Pending”
To activate the bot, click the "Settings" button in the action column. This will navigate to the emSign Bot View page, where you need to complete the following:
emSign Bot Information
Configure Scan targets
Set up scan schedule
Additional Information
emSign Bot Information
All relevant details, including the
Bot’s name
Group
Bot token
And status, will be pre-filled based on the emSign Bot’s configuration.
Account administrators have the option to modify the bot’s name, as shown below.
Step 1:
Enter the Account ID (10-digit Account Number of your CERTInext account).
The Account ID/Account Number is a unique number generated during creation of your CERTInext account. This can be found on your CERTInext account dashboard or in My Profile page.
Step 2:
Enter the Bot Token (Unique ID generated upon creation of a bot.
For e.g; f8368fea-d5da-4502-a39b-43e6752f3b5e)
Step 3:
Click on “Activate Bot” button. The bot starts to run and scan for the predefined targets.
The CERTInext Bot Utility provides multiple configuration options for communication, security, and deployment automation. Below is a breakdown of each setting with an explanation of what it does and when/how to use it while configuring the bot.
Communicate via Connector Bot:
This feature allows the CERTInext Bot to communicate with another instance of the bot running on a different system or network.
Useful for distributed environments where multiple bots handle different tasks and need to coordinate.
The Connector Bot serves as a key facilitator in certificate discovery and transfer. It operates on a dedicated server, scanning for certificates and securely pushing them to the requestor upon completion of the scan.
To establish communication, the Connector Bot shares its IP address and port details with the requestor. This allows the requestor bot to activate and receive the discovered certificates efficiently. The Connector Bot ensures a seamless and automated process, reducing manual intervention and enhancing security.
Once the scan is complete, the Connector Bot automatically transfers the identified certificates to the requestor. This setup ensures that the requestor receives up-to-date certificates with minimal effort, improving operational efficiency and compliance with security policies.
By acting as a bridge between certificate discovery and delivery, the Connector Bot streamlines the process while maintaining secure communication.
When to Use:
When you have multiple CERTInext Bot instances and want them to exchange information or commands.
Ideal for large enterprise setups where SSL/TLS certificate discovery, deployment, or monitoring is divided among multiple locations.
How to Configure:
Enable the checkbox “Communicate via Connector Bot.”
Enter the Connector Bot IP – This is the IP address of the bot you want to communicate with.
Connector Bot IP: This is the IP address of the secondary CERTInext Bot that the current bot will communicate with. It acts as the target endpoint for the connection between bot instances.
Enter the Connector Bot Port – The port on which the Connector Bot is listening for requests.
Connector Bot Port: Defines the port number through which communication between two CERTInext Bots occurs.
Save the settings and ensure the remote bot is correctly configured to accept connections.
Custom URL:
Allows you to define a specific URL endpoint where the bot connects, instead of using the default server settings.
Useful for custom integrations with private networks or third-party tools.
When to Use:
If your organization hosts a private CERTInext API instance and does not use the default service URL.
If you need to connect to an enterprise-specific SSL/TLS management server.
How to Configure:
Enable the “Custom URL” checkbox.
Enter the complete URL
Ensure the endpoint is reachable from your network.
Provide Proxy Details:
Enables proxy server support for bot communication.
Required when the network restricts direct internet access.
When to Use:
If your organization requires all internet traffic to go through a proxy server.
If you're behind a firewall that blocks direct outgoing connections.
How to Configure:
Enable “Provide Proxy Details”.
Enter:
Proxy IP (IP address of the proxy server)
The IP address of the proxy server that CERTInext Bot will use for outgoing requests.
Proxy Port (Port number for proxy communication).
The port number used by the proxy server for handling traffic.
Proxy Username (Only if authentication is required).
A username credential required for proxy authentication.
Proxy Password (Only if authentication is required).
The password associated with the proxy username for authentication.
Listener Port:
The port number on which the bot listens for incoming connections.
When to Use:
If the bot is expected to receive commands or data from external sources.
How to Configure:
Enable "Listener Port".
Enter a valid port number (e.g., 5000, 8443, or 9090).
Ensure the firewall allows incoming traffic on this port.
Final Steps:
Once all settings are configured:
Click "Activate Bot" to apply changes.
Verify the bot is connected and communicating properly.
If issues arise, check logs and firewall rules.
Reporting tags
The account user can add the reporting tags by clicking the "Add tag" option to map them to the bot for easy filtering.
Provide the Tag name & Tag value, Remarks and click on "Save" button to proceed.
Upon creation, the emSign bot status will change to "Active" & all relevant actions will be displayed in the grid as shown below.
Grid Actions
Run Scan: Initiates a scan based on the configured scan targets when this button is clicked.
Suspend Bot: Suspends the bot, changing its status to "Suspended."
Deactivate Bot: Deactivates the bot, setting its status to "Inactive." The bot will no longer be used.
View: Navigates to the My emSign Bots view page, where the Regenerate Bot Token and Edit buttons are available
Edit: If the account administrator needs to modify the emSign Bot information, click the "Edit" button
Regenerate Bot Token: To generate a new bot token, click the "Regenerate Bot Token" button.
Users
By default, last 10 users be viewed as shown below.
The list of users can be filtered & searched by Name. Click the "Search" button to apply the filter.
Create User to your account
To create a new user for your account:







Click the "New User (+)" option to navigate to the Add User creation screen.
Fill in the following details
Name
Mobile Number
Designation
Employee ID
Group Access Options:
If the group access checkbox is selected, the administrator can restrict the user to specific groups.
If unchecked, the user will have default access to all groups.
Role Assignment:
Use this option to assign a role to the user. The permissions available to the user will vary based on the assigned role.
Click the "Save" button to finalize the process.
An account activation email will be sent to the provided email address, including a link to activate the user account.
Post-Creation Management
Edit User Information: Once the user is created, administrators can edit the user details or adjust group access.
User Activation
The new user will receive an account activation email containing the account name and an activation link.
Upon activation, the user can access the account with permissions based on the assigned role.
Deactivate User
The Administrator role will have the privilege to deactivate any user permanently. If the Administrator wants to activate the user again, he can contact the emSign support for reactivation.
Group Management
Groups can represent cost centres, business units, projects, or similar organizational units. Administrators can manage and customize groups to streamline access and certificate management.
Adding and Managing Groups
Default Group
A default group is pre-configured in the group menu upon account activation.
By default, account users cannot add multiple groups. To add multiple groups, the account administrator must request assistance from an eMudhra Account Manager.
Filtering Groups
Use the Group Name filter to search and filter the list of groups, as shown below.
Configuring a New Group
Enter the Group Name.
Provide a Short Description.
Upload a Logo (if required).
Use the access configuration to control group visibility:
Checked: Restrict access to specific users.
Unchecked: Grant group access to all users by default.
Specify the certificate request settings for Organizations and Domains associated with the group.
This feature allows administrators to tailor group configurations to meet organizational requirements effectively.
Organizations
Administrators can configure certificate request permissions for groups using the "All" or "Specific" options for Organizations.
All- If this option is selected, the group will have access to all organizations within the account.
Specific- If this option is selected, the administrator can restrict the group’s access to specific organizations available in the account.
Domains
Administrators can configure certificate request permissions for groups using the "All" or "Specific" options for Organizations.
All- If this option is selected, the group will have access to all domains within the account.
Specific- If this option is selected, the administrator can restrict the group’s access to specific domains available in the account.
Finance
Administrators can define the payment mode for certificate requests using the Finance option. This ensures that payment settings are aligned with organizational policies and requirements.
Deduct from Account Balance
If this option is selected at the new request level, the amount for any certificate request placed using the group will be deducted directly from the group's balance.
If Auto Approval of certificate is checked, the system automatically approves and deducts the certificate amount from the main account balance without needing manual approval of certificates.
Allocate Credits to the Group
Check the "Allocate Credits to this Group from Account Balance" option.
Enter the following details:
Amount: Specify the amount to be allocated.
Supporting Document: Attach relevant documentation (if required).
Remarks: Add any remarks for reference.
Upon allocation, the specified amount will be debited from the account balance and credited to the group.
This feature enables efficient fund management and ensures that group-level balances are appropriately maintained.
Enforce Spend Limit
Administrators can set spending thresholds for groups to manage and control expenses:
Enable Spend Limit:
Check the "Enforce Spend Limit" option to activate spending restrictions for a group.
A threshold amount field will appear.
Set Threshold Amount:
Enter the desired threshold amount for the group.
This ensures that spending does not exceed the allocated limit, providing better financial oversight.
This feature helps in maintaining budgetary control and ensuring accountability at the group level.
Deduct from Group Balance
Enable this option to allow deductions directly from the group's balance for any certificate requests made using the group.
When this option is selected, any charges for new requests will automatically be debited from the group's allocated balance.
Allocate Credits to the Group
To allocate funds to a group, follow these steps:
Select the "Allocate Credits to this Group from Account Balance" checkbox.
Enter the following details:
Amount: Specify the amount to allocate.
Supporting Document: Attach relevant documentation if required.
Remarks: Add any notes or comments related to the fund allocation.
Upon saving, the specified amount will be debited from the account balance and credited to the group.
This functionality allows precise control over group-level finances and ensures efficient resource management.
Upon clicking on "Save" button a group will be created in the account as shown below.
Managing Group Information
Once a group is created in the account, administrators can view, edit, and manage its details.
View Group Information
Click on the Group ID to navigate to the Group View page, as shown below. This page displays:
Group details such as name, description, creator, and associated information.
Financial details, including the "Deduct from Account Balance" option.
Credits Management
Allocation/Deallocation History: A grid is available to display all credit and debit transactions, including transaction IDs and the amounts.
Allocate/Deallocate Credits: Use the "Edit" button or click on the Group ID to update credit allocations. This option is available only when the finance configuration for certificates is set to "Deduct from Group Balance". Administrators can manage group credits using the following options:
Allocate/Deallocate Credits to Group
Select this option to credit/debit an amount into the group's balance.
The credited amount will be deducted/added from/to the account balance.
User Access
A list of users with access to the group is displayed, including their roles, employee IDs, and account status.
Edit Group Information
Click on the "Edit" button to:
Update group details.
Manage credit allocations.
Adjust user permissions.
Important Note:
In sub-partner or enterprise accounts, there is no provision to add multiple groups. All group-related operations and configurations are limited to the default group structure provided within the account.

Discover Certificates is designed to discover and monitor all your SSL/TLS certificates, regardless of the issuing Certificate Authority (CA). It features the unique emSign Bot, capable of operating within isolated networks and protected environments to scan and gather certificate details. Scans are conducted according to predefined settings, and the results are automatically displayed on the portal interface.
Enterprise users can view the discovered certificates along with the servers where they are deployed. The Hub interface allows users to track emSign Bot scans, providing details on the last completed scan and the next scheduled scan. Users can also initiate manual, ad-hoc scans directly from the interface. The emSign platform simplifies certificate management, whether the organization handles a few certificates or thousands.
Discovery Dashboard: Provides a comprehensive overview of certificates issued via emSign and those detected by emSign Bot scans.
Certificate Results: Displays the total number of scanned certificates from various emSign bots.
My emSign Bots: Lists all emSign bots associated with the account for easy monitoring and management.
Download emSign Bot: Access and download available emSign bots directly from the platform.
The Certificate Results feature allows users to view all certificates discovered by emSign Bots. To access this page, navigate to Certificates > Discover Certificates. Upon clicking Discover Certificates, the results page will display a list of certificates, showing their Common Name (CN) or Subject Alternative Names (SANs).
Certificates Discovered via Bot
All certificates identified through emSign Bots are displayed on this screen. Users can apply filters to refine the list using Common Name (CN) or SAN.
By clicking Advanced Search, users can filter the certificate results based on:
Date Range
Location (Server/Port)
Issuer CA
Certificate Type
Certificate Details
Clicking on a CN/SAN value navigates to the Certificate Results View page, which provides the following information:
Certificate Info & Validity
Authority Information Access (AIA) details
Issuer CA information
Additional Information
Quick Actions
Account users can utilize certificate quick actions from this view, enabling fast and efficient management of discovered certificates.
Navigate to Discover Certificates.
Click on the relevant Domain hyperlink to open the Certificate Results page.
Click the “Download Certificate" button.
A download dialog will appear, allowing you to proceed with the download as shown below.
The certificate will be downloaded successfully.
After the discovery scan is complete, for all the certificates listed, in the table under Actions column Scan Vulnerabilities icon is present
Click on Scan Vulnerabilities icon, vulnerability result popup is displayed with the Certificate status.
Based on the status of the certificate further actions can be decided.
Go to Discover Certificates.
Click on the relevant Domain hyperlink to open the Certificate Results page.
Click the "Download Certificate" button.
A download dialog will appear, allowing you to proceed with the download as shown below.
The certificate will be downloaded successfully.
Setting up scan targets involves specifying the locations, systems, or assets that automated bots will scan to identify and assess digital certificates. This ensures that certificates across your infrastructure are valid, up-to-date, and correctly configured. The scan targets define which servers, applications, or networks will be monitored.
Scan targets can be configured through the following methods:
SSL: Monitor SSL/TLS certificates for expiration, configuration, and compliance.
HSM (Hardware Security Module): Scan and verify certificates stored within HSMs.
LDAP (Lightweight Directory Access Protocol): Monitor certificates in LDAP-based directories for validity and usage.
Certificate Store: Scan certificates stored within system or application certificate stores.
SSL/TLS
To scan certificates from the server, the account administrator must provide one of the following:
FQDN (Fully Qualified Domain Name)
IP Address or IP Address Range
TCP Port
Users can define a port range for scanning when performing SSL/TLS certificate scans on web servers.
For ex: 1-899.
To add multiple scan targets, click the "(+)" button, as shown below.
Import Scan Targets from Existing emSign Bots
To import scan targets from an existing emSign Bot, the administrator can click on the "Import Settings" option.
Upon selecting "Import Settings", a modal will appear, as shown below.
The administrator can choose a bot name from the available list and click the "Import" button to proceed.
Setup up Scan Schedule
Configure the scan schedule using the following options:
On Demand: Selecting this option allows the administrator to run scans at any time, without time restrictions.
Daily: If this option is selected, the administrator must specify the scan date, time, and time zone. Once configured, the system will automatically scan the certificates from the server daily at the scheduled time.
Weekly: When this option is selected, the administrator provides the scan day, time, and time zone. The system will automatically perform the scan every week at the specified time.
HSM (Hardware Security Module)
To scan certificates via an HSM (Hardware Security Module):
Upload or paste the HSM configuration.
Enter the HSM password.
Select the Certificates and Keys checkboxes as needed.
Click Start Action to initiate the scan.
To add multiple scan targets, administrators can click the "(+)" button, as shown below.
The account administrator can set up a Scan schedule as per their preference.
LDAP (Lightweight Directory Access Protocol)
To scan certificates via LDAP (Lightweight Directory Access Protocol):
Provide the LDAP URL and Container Name.
Enter the Admin DN (Distinguished Name) and Password.
Click Start Action to begin the scan.
To add multiple scan targets, administrators can click the "(+)" button, as shown below.
The account administrator can set up a Scan schedule as per their preference.
Certificate Store
When scanning certificates via the Certificate Store, the IP address of the system is automatically fetched, and all certificates installed on the system are scanned.
The account administrator can set up a Scan schedule as per their preference.
Cloud Providers (AWS)
Discovery through AWS/Cloud Providers include
Select the scan target as Cloud Providers
Enter the Access Key
Enter the Secret Key
Select the Region
And click on Save button.
Run the bot and all the certificates are scanned and Displayed under Discovered From as Cloud Providers in Discover Certificates page.
The account administrator can set up a Scan schedule as per their preference.
File System
When scanning certificates via the File System, the system’s IP address is automatically fetched, and all available certificates are scanned.
JKS Discovery
Discovery of JKS include scanning the java key stores for SSL/TLS certificates and public key infrastructure (PKI) certificates used for secure communications, authentication, and encryption in Java applications.
By entering the file system path, the certificates are scanned and discovered for renewal and provisioning.
Note: Only certificates that are downloaded or extracted on the system will be detected during the scan.
The account administrator can set up a Scan schedule as per their preference.
SSH
To scan certificates via SSH:
Provide the IP address, Username and Password.
Click Start Action to initiate the scan.
To add multiple scan targets, administrators can click the "(+)" button, as shown below.
The account administrator can set up a Scan schedule as per their preference.
F5-BIG-IP
To scan certificates via F5-BIG-IP:
Provide the IP address, Port number, Username and Password.
Click Start Action to initiate the scan.
To add multiple scan targets, administrators can click the "(+)" button, as shown below.
The account administrator can set up a Scan schedule as per their preference.
Cloudflare
To scan certificates via Cloudflare using their API:
Enter Cloudflare Email ID (Email associated with your Cloudflare account)
Enter Cloudflare Authkey (API Key)
Select Cloudflare Zone ID (Zone ID for the domain you’re working with)
To add multiple scan targets, administrators can click the "(+)" button.
The account administrator can set up a Scan schedule as per their preference.
Discover Certificates serves as a comprehensive tool for identifying, managing, and securing digital certificates across your infrastructure. It enables users to initiate a discovery scan, and upon completion, review the list of discovered certificates. The scan results provide key details, including the issuer, expiration dates, and usage contexts.
How to view certificates
To view the discovered certificate details, click on the CN/SAN hyperlink.
How to order certificates
Option 1: Once the certificate is initiated or configured, selecting the Order checkbox, will successfully issue the certificate
Option 2: Rotate
Once the certificate is initiated or configured, click on Rotate button, the certificate will be rotated and issued successfully.
How to download certificates
Option 1: Downloading the Certificate
After the certificate is issued, follow these steps to download it:
Click the Download icon under Actions tab.
A download popup will appear, allowing you to select the desired format to download.
Choose the format and click the Download button.
The certificate will be downloaded successfully.
Option 2: Viewing and Downloading via CN/SAN Hyperlink
Click on the CN/SAN hyperlink to open, View Discover Certificate page.
In the Quick Actions section on the top-right corner, click Download Certificate
On the top right corner of the page, under Quick Actions click on Download Certificate, the certificate will be downloaded successfully.
Format to download popup is not displayed.
How to Rekey certificate
Select the certificate with status Issued or Deployed, click on Rekey button.
Enter the remarks and click Rekey.
How to Revoke/Suspend certificate
Select the certificate, click on Revoke/Suspend button.
Select the Revoke Mode, enter the remarks and click on Revoke/Suspend button.
eMudhra CLM supports a wide range of devices and platforms for automated certificate provisioning, ensuring compatibility with modern IT infrastructures. Below is a detailed list of supported categories, devices, and platforms, along with their use cases.
Web servers host websites and require TLS certificates to enable secure HTTPS connections, protecting data in transit.
Expiration Date (e.g., certificates expiring within a specified period)
Cloud Providers: Identify and monitor certificates deployed across cloud environments.
File System: Monitor certificates stored in file directories for configuration and expiration.
SSH: Scan SSH keys and certificates to ensure secure access configurations.
Stop if scan run time exceeds: Enabling this option ensures that the scan will automatically stop if it exceeds the specified time, particularly if the bot encounters issues while scanning certificates from the server.
Advanced Settings: Administrators can enable this option to access additional settings, such as multi-thread configuration and detailed scan options for enhanced control.





















Apache
Yes
2.2.X, 2.4.X
Supports automated deployment via ACME or custom scripts. Compatible with mod_ssl for TLS configuration.
Nginx
Yes
0.8.X - 1.26.X
Integrates with ACME for automated certificate issuance and renewal. Supports HTTP/2 and modern TLS protocols.
Microsoft IIS
Yes
5.0, 5.1, 6.0, 7.0, 8.0, 8.5, 10.0
Integrates with Windows Certificate Store for seamless certificate management. Supports SCEP and EST protocols.
Jetty
Yes
Java-based server with support for automated certificate deployment via Java KeyStore integration.
Use Case: Automating TLS certificate deployment on Apache or Nginx ensures websites maintain secure connections without manual intervention, ideal for high-traffic environments.
Application servers host business-critical applications, often requiring certificates for secure communication and authentication.
Device/Platform
Supported
Version
Notes
Tomcat
Yes
9.X, 10.X
Supports Java KeyStore for certificate storage and automated updates via eMudhra CLM.
JBoss
Yes
Compatible with automated provisioning using Java KeyStore or PKCS12 files.
WebSphere
Yes
12.2.1.X (12c), 14.1.1 (14c)
Integrates with IBM’s key management tools for certificate automation.
Use Case: Application servers hosting internal APIs or customer-facing services benefit from automated certificate renewals to ensure uninterrupted secure communication.
Cloud platforms require certificates for secure access to resources, APIs, and services.
Device/Platform
Supported
Version
Notes
Azure Key Vault
Yes
Integrates with eMudhra CLM for automated certificate import and renewal in Azure environments.
AWS Key Manager
Yes
Supports automated certificate deployment to AWS resources via AWS SDK or CLI.
AWS Certificate Manager
Yes
Enables seamless integration for managing public and private certificates in AWS.
Use Case: Cloud services like AWS Certificate Manager automate certificate provisioning for load balancers and APIs, ensuring secure scalability in cloud-native environments.
Load balancers distribute traffic across servers and require TLS certificates for secure connections.
Device/Platform
Supported
Version
Notes
F5 BIG-IP
Yes
12.X-16.X
Supports automated certificate deployment via iControl REST API or ACME.
HAProxy
Yes
Integrates with ACME for automated certificate management in high-availability setups.
Use Case: Load balancers in enterprise networks use automated certificate provisioning to maintain secure traffic routing without manual updates.
CDNs deliver content globally and require certificates to ensure data integrity and performance.
Device/Platform
Supported
Version
Notes
Akamai
Yes
Not Applicable
Supports automated certificate deployment via Akamai’s EdgeGrid API or ACME.
Use Case: CDNs like Akamai use automated certificate provisioning to secure content delivery across global edge servers, ensuring low latency and high security.
HSMs securely manage and store cryptographic keys and certificates.
Device/Platform
Supported
Version
Notes
All HSMs
Yes
Compatible with major HSM vendors (e.g., Thales, Entrust, Utimaco) via PKCS11 or proprietary APIs.
Use Case: HSMs in financial or healthcare environments benefit from automated certificate provisioning to securely manage keys for compliance with regulations like PCI-DSS or HIPAA.
Repositories store and manage digital certificates and keys centrally.
Repository
Supported
Version
Notes
Active Directory
Yes
Windows Server 2012 R2
Windows Server 2016
Windows Server 2019
Windows Server 2022
Integrates with eMudhra CLM for automated certificate enrollment and management in Windows environments.
OpenLDAP
Yes
Supports automated certificate storage and retrieval in open-source LDAP deployments.
Use Case: Centralized repositories like Active Directory streamline certificate management for large-scale enterprise networks.
Certificate stores securely manage certificates within operating systems or applications.
Certificate Store
Supported
Version
Notes
Windows Certificate Store
Yes
Supports automated certificate import and renewal via SCEP, EST, or CMP protocols.
Use Case: Windows Certificate Store automation ensures seamless certificate updates for Windows-based applications and services.
eMudhra CLM leverages industry-standard protocols to automate certificate enrollment, issuance, and renewal. Each protocol is designed to address specific use cases and security requirements.
Protocol
Supported
Version
Description
SCEP (Simple Certificate Enrollment Protocol)
Yes
Simplifies certificate enrollment for devices and applications, ideal for mobile and IoT environments.
CMP (Certificate Management Protocol)
Yes
Provides a comprehensive framework for managing the entire certificate lifecycle, including issuance, renewal, and revocation.
EST (Enrollment over Secure Transport)
Yes
Enhances security for certificate enrollment using HTTPS, suitable for modern web-based environments.
Use Case: ACME is commonly used with Let’s Encrypt or eMudhra’s CA to automate certificate renewals for public-facing websites, while CMP is ideal for complex enterprise PKI environments.
Device/Platform
Supported
Version
Notes
WebLogic
Yes
Supports Oracle’s key management and automated certificate lifecycle management.
Imperva WAF (On – Prem)
Yes
X6530, X4530
Certificate deployment for Imperva Hardware-based Web Application Firewalls
Imperva (Cloud WAF)
Yes
Not Applicable
Supports automated certificate updates for Imperva’s cloud security solutions.
ACME (Automatic Certificate Management Environment)
Yes
Automates issuance and renewal of SSL/TLS certificates, widely used for web servers and cloud services.
Existing account users can create additional accounts by selecting either "Enterprise Account Sign-Up" or "Partner Account Sign-Up" from the login page of the CERTInext Portal.
Navigating to the Account Creation Page:
Upon clicking Enterprise Account Sign-Up or Partner Account Sign-Up, the user will be redirected to the respective account creation page, as described earlier.
Submitting Required Information:
Provide all the necessary details on the account creation form.
Click the "Sign Up" button to submit the request.
Account Activation Process:
An account activation email will be sent to the registered email ID.
Open the email and click the "Activate Account" button to continue.
Account Authentication:
Clicking the "Activate Account" button will redirect the user to the Account Authentication page.
The password for the existing account will be auto-filled on this page.
Click "Authenticate" to proceed.
Successful Authentication:
A confirmation message, "Account Authenticated Successfully", will be displayed upon successful authentication.
Logging into the Portal:
After authentication, the user can log in by entering their email ID and password.
Click the "Sign In" button to proceed to the Choose Your Account to Sign In page.
Choosing an Account:
A list of all Partner and Enterprise accounts associated with the user will be displayed.
Click the "Proceed" button next to the desired account to continue.
Account Expiration Notification:
If any Reseller or Enterprise account has expired, the status will be clearly displayed on the account selection page.
Users
By default, last 10 users be viewed as shown below.
The list of users can be filtered & searched by Name. Click the "Search" button to apply the filter.
Create User to your account
To create a new user for your account:
Click the "New User (+)" option to navigate to the Add User creation screen.
Fill in the following details:
Name
Mobile Number
Designation
Group Access Options:
If the group access checkbox is selected, the administrator can restrict the user to specific groups.
If unchecked, the user will have default access to all groups.
Role Assignment:
Use this option to assign a role to the user. The permissions available to the user will vary based on the assigned role.
Click the "Save" button to finalize the process.
An account activation email will be sent to the provided email address, including a link to activate the user account.
Post-Creation Management
Edit User Information: Once the user is created, administrators can edit the user details or adjust group access.
User Activation
The new user will receive an account activation email containing the account name and an activation link.
Upon activation, the user can access the account with permissions based on the assigned role.
Group Management
Groups can represent cost centres, business units, projects, or similar organizational units. Administrators can manage and customize groups to streamline access and certificate management.
Adding and Managing Groups
Default Group
A default group is pre-configured in the group menu upon account activation.
By default, account users cannot add multiple groups. To add multiple groups, the account administrator must request assistance from an eMudhra Account Manager.
Filtering Groups
Use the Group Name filter to search and filter the list of groups, as shown below.
Configuring a New Group
Enter the Group Name.
Provide a Short Description.
Upload a Logo (if required).
Use the access configuration to control group visibility:
Checked: Restrict access to specific users.
Unchecked: Grant group access to all users by default.
Specify the certificate request settings for Organizations and Domains associated with the group.
This feature allows administrators to tailor group configurations to meet organizational requirements effectively.
Organizations
Administrators can configure certificate request permissions for groups using the "All" or "Specific" options for Organizations.
All- If this option is selected, the group will have access to all organizations within the account.
Specific- If this option is selected, the administrator can restrict the group’s access to specific organizations available in the account.
Domains
Administrators can configure certificate request permissions for groups using the "All" or "Specific" options for Organizations.
All- If this option is selected, the group will have access to all domains within the account.
All- If this option is selected, the group will have access to all domains within the account.
Specific- If this option is selected, the administrator can restrict the group’s access to specific domains available in the account.
Finance
Administrators can define the payment mode for certificate requests using the Finance option. This ensures that payment settings are aligned with organizational policies and requirements.
Deduct from Account Balance
If this option is selected at the new request level, the amount for any certificate request placed using the group will be deducted directly from the group's balance.
Allocate Credits to the Group
Check the "Allocate Credits to this Group from Account Balance" option.
Enter the following details:
Amount: Specify the amount to be allocated.
Supporting Document: Attach relevant documentation (if required).
Remarks: Add any remarks for reference.
Upon allocation, the specified amount will be debited from the account balance and credited to the group.
This feature enables efficient fund management and ensures that group-level balances are appropriately maintained.
Enforce Spend Limit
Administrators can set spending thresholds for groups to manage and control expenses:
Enable Spend Limit:
Check the "Enforce Spend Limit" option to activate spending restrictions for a group.
A threshold amount field will appear.
Set Threshold Amount:
Enter the desired threshold amount for the group.
This ensures that spending does not exceed the allocated limit, providing better financial oversight.
This feature helps in maintaining budgetary control and ensuring accountability at the group level.
Deduct from Group Balance
Enable this option to allow deductions directly from the group's balance for any certificate requests made using the group.
When this option is selected, any charges for new requests will automatically be debited from the group's allocated balance.
Allocate Credits to the Group
To allocate funds to a group, follow these steps:
Select the "Allocate Credits to this Group from Account Balance" checkbox.
Enter the following details:
Amount: Specify the amount to allocate.
Supporting Document: Attach relevant documentation if required.
Remarks: Add any notes or comments related to the fund allocation.
Upon saving, the specified amount will be debited from the account balance and credited to the group.
This functionality allows precise control over group-level finances and ensures efficient resource management.
Upon clicking on "Save" button a group will be created in the account as shown below.
Managing Group Information
Once a group is created in the account, administrators can view, edit, and manage its details.
View Group Information
Click on the Group ID to navigate to the Group View page, as shown below. This page displays:
Group details such as name, description, creator, and associated information.
Financial details, including the "Deduct from Account Balance" option.
Credits Management
Allocation/Deallocation History: A grid is available to display all credit and debit transactions, including transaction IDs and the amounts.
Allocate/Deallocate Credits: Use the "Edit" button or click on the Group ID to update credit allocations. This option is available only when the finance configuration for certificates is set to "Deduct from Group Balance". Administrators can manage group credits using the following options:
Allocate/Deallocate Credits to Group
Select this option to credit/debit an amount into the group's balance.
The credited amount will be deducted/added from/to the account balance.
User Access
A list of users with access to the group is displayed, including their roles, employee IDs, and account status.
Edit Group Information
Click on the "Edit" button to:
Update group details.
Manage credit allocations.
Adjust user permissions.
Important Note:
In sub-reseller or enterprise accounts, there is no provision to add multiple groups. All group-related operations and configurations are limited to the default group structure provided within the account.
Role-based access control
The emSign CERTInext platform offers six roles, each designed to address specific responsibilities and access requirements within the system:
Administrator
Manager
Finance Manager
Standard User
Administrator
The Administrator role provides full access to the platform, enabling comprehensive management of users, groups, organizations, and financial operations. This role is intended for system overseers responsible for administrative and operational tasks.
Key Access Controls
Full portal access, including the Dashboard.
Manage:
Certificates (requests, orders, expiring certificates).
Organizations, domains, groups, and users.
Private and public Certificate Authorities (CAs) and products.
Sub-accounts and price lists for sub-accounts.
Access to:
REST and ACME APIs.
Financial features.
Audit logs and tools.
Reports and account settings.
Create user invitations and assign roles.
Manager
The Manager role focuses on overseeing groups, users, and orders while managing sub-accounts and associated group features. This role excludes full administrative and financial permissions.
Key Access Controls
Dashboard access (billing alerts, low credit alerts, and self-orders tracking).
Manage:
Organizations and domains.
Groups (including credit allocation) and users.
Private and public CAs and products.
Sub-accounts and price lists for sub-accounts.
Access to:
REST and ACME APIs.
Financial features.
Audit logs, reports, and tools.
Finance Manager
The Finance Manager role is tailored for managing financial operations, such as fund allocation, price lists, and finance-related features, without broader administrative control.
Key Access Controls
Dashboard access (billing alerts and self-orders tracking).
Manage:
Groups (credit allocation) and users.
Sub-accounts and price lists for sub-accounts.
Private and public CAs and products.
Access to:
REST and ACME APIs.
Financial features.
Audit logs, reports, and tools.
Standard User
The Standard User role allows for requesting certificates and accessing group orders. It includes broader access than the Basic User but lacks administrative permissions.
Key Access Controls
Dashboard access (billing alerts and self-orders tracking).
Manage:
Private and public CAs.
Access to:
REST and ACME APIs.
Reports, tools, and profile settings.
Basic User
The Basic User role provides minimal permissions, focusing on personal tasks such as requesting certificates and managing profile information.
Key Access Controls
Dashboard access (billing alerts and self-orders tracking).
Access to:
REST and ACME APIs.
Reports, tools, and profile settings.
Discovery User
The Discovery User role is dedicated to users responsible for certificate discovery operations. This includes tasks such as key management, key store handling, and accessing discovery-related features.
Enforce 2FA
To enhance account security, the platform offers the option to enable Two-Factor Authentication (2FA) via T-OTP (Time-Based One-Time Password).
Enabling 2FA
Check the box for "Enforce 2FA via T-OTP authentication mode" in the Account Configuration settings.
Note that enabling 2FA is optional and can be configured by the administrator based on company policy.
What Happens After Enabling
Once enabled, users will need to configure T-OTP during their first login by:
Scanning the provided barcode[M21] .
Entering the generated OTP.
T-OTP authentication will then apply to all users associated with the account.
This feature ensures an added layer of security for platform access.
IP Restrictions
The IP Restrictions feature enables administrators to restrict access to business data by specifying a range of authorized IP addresses. This ensures secure and controlled access to sensitive information.
Configure IP Restrictions
Select a User: Choose the user for whom the restriction will apply. Alternatively, you can apply the restriction to all users.
Enter Allowed IP Range:
Specify the Allowed IP Start Address.
Specify the Allowed IP End Address.
Add Description (Optional): Provide a description for the IP restriction for easy identification.
This feature enhances security by ensuring that only authorized IP addresses can access your business data.
A created IP Restriction Rule can be disabled at any time by the administrator, providing flexibility to adjust access controls as needed.
Adding Credits
A message to Add Credits will be displayed when the account balance falls below the threshold set by the account administrator.
Clicking the "Add Credits" hyperlink redirects to Billing & Payments > Add Credits.
Follow the prompts to add funds and ensure your account balance is sufficient for future transactions.
These features ensure smooth account operations by keeping billing information updated and maintaining adequate account credits.
Billing & Payments
Add Credits
emSign CERTInext offers two modes of payment to add credits: Online Payment & Offline Payment.
To add credits to your account, navigate to Billing & Payments > Add Credits.
Online Payment
Upon selecting online Payment, the current account balance is displayed at the top.
Enter the Amount to be credited, then click the Pay button
The system will redirect to the payment gateway. Enter your card details to proceed with the payment
To verify the payment status, enter the Payment ID under the "Recheck Payment Status" section and click the Recheck button.
Offline Payment
On selecting offline Payment, the current account balance is displayed at the top.
Enter the offline credits payment details and click the "Make Payment" button.
Once the "Submit Offline Payment" button is clicked, a thank you message will displayed on the screen. Upon eMudhra finance approval, the amount will be credited into the account.
Invoices
The Invoices page provides a comprehensive list of all generated invoices for your certificate orders and services. From this page, you can download, review, and pay invoices, making it easy to track your organization's billing and payments.
Download Invoice
Via the Certificates Section
Navigate to Certificates > Orders.
Open the View Order page for the specific order.
Click on Download Invoice to download a copy with all payment details.
Via Billing & Payments Section
Navigate to Billing & Payments.
Under Action, click on the Download icon next to the desired invoice.
The invoice will then be downloaded to your system.
Download Credit Note
To download any credit note, go to Certificates > Orders > View order page.
This order action will be displayed when the Order status is cancelled (or) Rejected.
On click of "Download Credit Note" a credit note will be downloaded with all the payment information.
Discovery User

























