Connect to a network appliance or cloud service
Connect DigiCert® Trust Lifecycle Manager to your dedicated network appliances or cloud applications to discover and automate certificate deployments.
Before you begin
You need an active DigiCert sensor to help manage the installed certificates on your external network systems. To learn more, see Deploy and manage sensors.
Add the connector
From the Trust Lifecycle Manager main menu, select Integrations > Connectors.
Select the Add connector button.
Select the applicable system type from the Appliances or Cloud services section.
Enter a friendly Name for this connector.
Select a Business unit for this connector. Only users assigned to this business unit can manage the connector.
For the Managing sensor, select an active DigiCert sensor to use to manage this connector.
Fill in the requested configuration parameters. These vary by network appliance or cloud service type.
Network appliance/service
Configuration parameters
Notes
A10
Management IP
Management port
Username
Password
The provided credentials must be for an account with full administrator access.
Citrix ADC
Management IP
Management port
Web protocol
Web username
Web Password
SSH username
SSH password
SSH port
The provided credentials must be for an account with full administrator access.
F5 BIG-IP LTM
Management IP
Management port
Username
Password
The provided credentials must be for an account with full administrator access. In the F5 account properties, the Terminal Access field must be set to "Advanced shell".
When adding the connector, use the Additional settings section to configure options for how to store files on the F5 appliance.
AWS CloudFront
Account ID
Authentication method
The linked AWS account must include managed policies
CloudFrontFullAccess
,AWSCertificateManagerFullAccess
, andIAMReadOnlyAccess
or equivalent permissions.For descriptions of supported AWS authentication methods, see Authentication methods for AWS connectors.
AWS ELB (Application/Network)
Account ID
AWS region
Authentication method
The linked AWS account must include managed policies
AWSCertificateManagerFullAccess
andElasticLoadBalancingFullAccess
or equivalent permissions.For descriptions of supported AWS authentication methods, see Authentication methods for AWS connectors.
AWS unified
AWS scope
Account ID
IAM role (for organization scope) or AWS region (for account scope)
Authentication method
Use an AWS unified connector to import and deliver certificates to AWS Certificate Manager (ACM) in one or more AWS accounts.
For the AWS scope, select whether to link to an AWS organization (and all its member accounts) or to a specific AWS account. Required AWS permissions depend on scope selection; for details see Minimum required permissions for AWS unified connectors.
For descriptions of supported AWS authentication methods, see Authentication methods for AWS connectors.
Select Add to complete the link to the network appliance or cloud service.
What's next
Trust Lifecycle Manager looks for existing certificates on the network appliances and cloud services you connect to. The number of certificates it finds will appear on the Integrations > Connectors page in the Automation targets column.
Select a connector by name to view the details for it, then select the links in the Assets found on this connector section to load and manage the discovered assets for that connector on the Inventory page.
Important
On network appliance virtual IPs, certificates must be stored in X.509 format for Trust Lifecycle Manager to discover and automate them. Password-protected PFX certificates are not supported.
Set up certificate lifecycle automation to automate management of certificates on the connected network appliances and cloud services.
If you have an AWS unified connector, you can use the Admin web request function to enroll new certificates with automated delivery to AWS Certificate Manager (ACM) in the linked AWS accounts.