Documentation

Certificates

The Certificates section in MSPControl allows you to securely store, manage, and share SSL or other types of certificates. Similar to Passwords, certificates are protected by Azure Key Vault, ensuring nothing is stored locally. You can optionally require authorization, control peer access, and even password-protect your certificates for additional security.

Certificates


Enabling the Certificate Manager & Azure Key Vault

Before you can upload or manage certificates, you must enable the feature and configure Azure Key Vault:

  1. Go to Settings > Policies > Documentation > Password Manager Policy
    Check Enable Certificate Manager to activate certificate functionality.
  2. Enter Your Azure Key Vault Credentials
    Provide the Tenant ID, Client ID, Client Secret, and Vault Base Url associated with your Azure Key Vault. MSPControl will use these details to securely store and retrieve certificates (as well as passwords, if enabled).
  3. Save Changes
    Your configuration is now active. The Certificates section will appear in the
    Documentation menu once enabled.

Without enabling Certificate Manager and providing valid Azure Key Vault credentials,
the Certificates functionality will be unavailable.

Password and Certificate Policy Password and Certificate Policy configuration


Overview

The main Certificates page lists your stored certificates, showing:

  • Description – A short label or identifier (e.g., “Wildcard SSL for example.com”).
  • Subject – The certificate’s primary domain name or common name.
  • Subject Alternative Names – Any additional domains or SANs included in the certificate.
  • TagsPeer tags for categorizing or indicating ownership/relevance.
  • Created Date / UpdatedDate – Timestamps for when the certificate was added or last modified.
  • Expires – The certificate’s expiration date.
  • Requires Authorization – Indicates whether extra authorization is required to view or export the certificate.

You can filter certificates by peers, tags, or use the Show Disabled checkbox to reveal
previously disabled certificates.


Creating a New Certificate

  1. Click “Create Certificate”
    Opens a form to define the new certificate entry.
  2. Description
    Provide a descriptive label (e.g., “Exchange Server 2025 SSL”).
  3. Cert
    Upload the certificate file (e.g., .pfx or .p12) from your local machine. By default, MSPControl accepts Personal Information Exchange files (commonly .pfx or .p12), which bundle both the certificate and its private key.
  4. Password
    If your certificate file is password-protected (e.g., .pfx with a private key), enter or generate that password here.
  5. Peers Tags
    (Optional) Assign peer tags indicating who this certificate is for or relevant to.
  6. Requires Authorization
    If enabled, only peers explicitly listed under “Peers With Access” can view this certificate.
  7. Peers With Access
    Select peers who can access the certificate. You may also set an expiration date/time for temporary access.
  8. Submit
    Saves your certificate, which appears in the list. Peer access and authorization requirements will govern who can view or manage it.

Add Certificate


Actions on Existing Certificates

Select one or more certificates, then use the -Actions- dropdown to perform bulk operations:

  • Set Requires Authorization – Toggles whether the selected certificates require extra authorization to view or export.
  • Add Peers With Access – Grants specific peers or groups permission to manage the selected certificates.
  • Delete Peers With Access – Removes previously granted access from chosen peers.
  • Add Peers Tag – Assigns a peer tag (e.g., “Finance,” “DevOps”) to the selected certificates.
  • Delete Peers Tag – Removes an existing peer tag from the selected certificates.
  • Delete Selected – Permanently removes the selected certificates from MSPControl (and Azure Key Vault). This action cannot be undone.

Disabling vs. Deleting

Instead of deleting a certificate you no longer use, you can mark it as “disabled” (if supported in your version), preventing further use while preserving a record of it. Toggle Show Disabled to view or hide such certificates in the list.


Best Practices

  • Maintain Accurate Descriptions – Use clear, descriptive names to easily identify each certificate’s purpose and domain coverage.
  • Enable Authorization for Sensitive Certificates – If the certificate is critical (e.g.,
    used for a production environment or a high-traffic site), require authorization to minimize unauthorized viewing.
  • Review Access Periodically – Revisit who has access to important certificates and remove or disable certificates that are expired or no longer in use.
  • Use Secure Passwords – For any private key or .pfx file, ensure the associated password is strong and stored safely. Consider generating a new password if it’s been compromised or widely shared.