Documentation Index
Fetch the complete documentation index at: https://docs.certforge.xyz/llms.txt
Use this file to discover all available pages before exploring further.
Devices
In CertForge, a device (also called a client) is any endpoint — server, VM, container, IoT device, or application — that holds a certificate issued by CertForge and uses it to authenticate with services.Device identity
Each device is identified by a client certificate. The certificate’s Subject and Subject Alternative Names establish its identity. When a device connects to the mTLS API, CertForge verifies its client certificate against the configured client CA before processing any request.Enrolling a device
Via dashboard
- Go to Devices → Enroll New
- Fill in:
- Device name — a human-readable label (e.g.
web-server-prod-01) - Domains — the SANs the certificate should carry
- Trust Profile — the DTP that governs issuance
- Environment —
production,staging,development - Justification — required if the DTP requires approval
- Device name — a human-readable label (e.g.
- Submit — the request enters the approval queue or is issued immediately depending on DTP policy
Via mTLS API (automated)
Devices that already hold a valid client certificate can self-enroll via the API:Device certificate lifecycle
Automatic renewal
The renewal scheduler checks certificates daily. When a certificate is within the renewal window (default: 30 days before expiry), a renewal request is submitted automatically. If the DTP requires approval, an approver must act before the certificate is re-issued. Configure the renewal window in Admin → Settings.Manual renewal
In the dashboard, go to Devices, find the device, and click Renew. This submits a new enrollment request identical to the original.Revocation
Revoking a device certificate immediately adds it to the CA’s Certificate Revocation List (CRL). Services that check the CRL will reject the certificate. To revoke: Devices → [device] → Revoke and provide a revocation reason. Revocation reasons (per RFC 5280):key_compromise— private key may be exposedca_compromise— issuing CA is compromisedaffiliation_changed— device no longer belongs to this orgsuperseded— replaced by a new certificatecessation_of_operation— device decommissioned
ACME client devices
Devices running a standard ACME client (certbot, acme.sh, Caddy, Traefik) can point their ACME directory URL at CertForge’s built-in ACME server:Device list
Devices → All Devices shows:| Column | Description |
|---|---|
| Name | Device label |
| Domains | Certificate SANs |
| Trust Profile | DTP |
| Environment | prod / staging / dev |
| Issued | Issue date |
| Expires | Expiry date |
| Days left | Days until expiry |
| Status | Active / Expiring soon / Expired / Revoked |