Learn how to manage PKI subscribers and issue X.509 certificates for them.
In Infisical PKI, subscribers are logical representations of entities such as devices, servers, applications that request and receive certificates from Certificate Authorities (CAs).
The typical workflow for managing subscribers consists of the following steps:
Note that this workflow can be executed via the Infisical UI or manually such as via API.
In the following steps, we explore how to issue a X.509 certificate for a subscriber.
Creating a subscriber
A subscriber is the logical representation of an entity that requests and receives certificates from a CA. With a subscriber, you can specify the attributes that must be present on the X.509 certificates issued for it.
Head to your Infisical PKI Project > Subscribers to create a subscriber.
The PKI Subscriber modal is organized into two tabs:
This tab contains the core certificate attributes and settings:
web-service
.app1.acme.com, app2.acme.com
.This tab contains optional advanced features:
It’s possible to issue certificates for a subscriber with or without a certificate signing request (CSR).
When Certificate Auto Renewal is enabled, the system will automatically issue new certificates before the current ones expire, ensuring continuous certificate availability without manual intervention.
Requesting a certificate
Once you have created a subscriber from step 1, you can issue a certificate for it.
Press on the subscriber you want to issue a certificate for and click on the Issue Certificate button on that subscriber’s page.
In the following steps, we explore how to revoke a X.509 certificate and obtain a Certificate Revocation List (CRL) for a CA.
Revoking a Certificate
Assuming that you’ve issued a certificate for a subscriber, you can revoke it by selecting the Revoke Certificate option on the certificate you wish to revoke on the subscriber’s page.
Obtaining a CRL
In order to check the revocation status of a certificate, you can check it against the CRL of a CA by heading to its Issuing CA and downloading the CRL.
To verify a certificate against the downloaded CRL with OpenSSL, you can use the following command:
Note that you can also obtain the CRL from the certificate itself by referencing the CRL distribution point extension on the certificate.
To check a certificate against the CRL distribution point specified within it with OpenSSL, you can use the following command:
What is the workflow for renewing a certificate?
To renew a certificate, you have two options:
Manual Renewal: Issue a new certificate for the same subscriber. The original certificate will continue to be valid through its original TTL unless explicitly revoked.
Automatic Renewal: If Certificate Auto Renewal is enabled for the subscriber, the system will automatically issue new certificates before the current ones expire based on the configured renewal period.
How does Certificate Auto Renewal work?
When Certificate Auto Renewal is enabled for a subscriber, the system monitors certificate expiration dates and automatically issues new certificates before they expire. You can configure how many days before expiry the renewal should occur (e.g., 7 days before expiration). This ensures continuous certificate availability without manual intervention.