Skip to main content

TLS Certificates

TLS Certificates are digital credentials used to present and prove the identity of a system during a TLS handshake. In USP, TLS Certificates are essential for establishing secure, authenticated communication between trusted components.

info

For more information on where and how TLS Certificates are used, refer to How USP Uses Certificates.

Using Hardware Security Modules (HSMs)

TLS Certificates in USP can be stored in two ways:

  • Locally, where the credential content is uploaded and securely stored by USP Manager.
  • Externally, in a Hardware Security Module (HSM), where the key never leaves the physical device.

An HSM is a dedicated cryptographic device that stores and protects keys within a tamper-resistant environment.

When a TLS Certificate is stored in an HSM, its content remains inside the hardware, and all cryptographic operation, such as signing during TLS handshakes, are performed within the device. The USP Server never has direct access to the raw key data.

USP communicates with HSMs through the PKCS#11 interface using the configuration defined in the HSM Connection. That connection specifies the library path, token identifiers, authentication PIN, and other details required for USP Server to access the HSM.

TLS Certificate Administration via USP Admin UI

Adding a TLS Certificate

To add a TLS Certificate, follow these steps:

  1. From the Sidebar, click Authentication > Certificates.
  2. Click TLS Certificates.
  3. Click Add TLS Certificate.
  4. Complete the details for the new TLS Certificate using the Field Descriptions table as a guide.
    warning

    Once saved, the TLS Certificate's Private Key cannot be viewed again.

  5. Click Save.

Field Descriptions

NameDescriptionSpecificationsRequired
NameThe name of the TLS Certificate.
  • Must be unique.
  • Must follow the Standard Naming Pattern.
Yes
DescriptionThe description of the TLS Certificate.No
Store Certificate and Private Key in HSMWhen enabled, certificate and keys are managed through a preconfigured HSM Connection.Yes

HSM Certificate ID

The unique identifier for the certificate or key in hexadecimal format (CKA_ID). For example, 4A4B4 or 0x4A4B4C.Yes, if Store Certificate and Private Key in HSM is enabled.

HSM Certificate Label

The human-readable name assigned to the certificate or key inside the HSM (CKA_LABEL). The label is used to identify the object (e.g., TLS-Key-Prod).Yes, if Store Certificate and Private Key in HSM is enabled.
CertificateThe TLS Certificate content.Must be in PEM format.Yes, if Store Private Key in HSM is disabled.
Private KeyThe Private Key for the TLS Certificate.Yes, if Store Private Key in HSM is disabled.

Editing a TLS Certificate

warning

When editing a TLS Certificate, the TLS Certificate and Private Key fields appear empty, but the original values remain stored unless deliberately overwritten. This is intentional, as the USP Manager does not allow updating only one of these fields. To make changes, you must edit both the certificate and its corresponding private key.

To edit a TLS Certificate, follow these steps:

  1. From the Sidebar, click Authentication > Keys.
  2. Click TLS Certificates.
  3. Click the row of the TLS Certificate you want to edit.
  4. Click the Edit button above the TLS Certificate details.
  5. Edit the details of the TLS Certificate using the Field Descriptions table as a guide.
  6. Click Save.
warning

If you modify a TLS Certificate that is currently in use by a USP Server instance, the changes will not take effect until you manually apply the updated configuration by pushing it to the server. To apply the changes:

  1. Navigate to Monitoring > Status.
  2. Click the Name of the associated USP Server instance.
  3. Go to the Configuration tab.
  4. Review the pending changes in the Updated Configuration column.
  5. If the changes are correct, click Push Configuration.

TLS Certificate Metadata

TLS Certificate details include all parameters given in the Field Descriptions table above, plus the following read-only metadata:

NameDescription
IDUniversally Unique Identifier of this TLS Certificate.
EnabledA Boolean value indicating the status of the TLS Certificate. The only possible value is true.
CertificateThe TLS Certificate content.
Created AtDate and time this TLS Certificate was created.
Updated AtDate and time this TLS Certificate was last updated.

Deleting a TLS Certificate

To delete a TLS Certificate, follow these steps:

  1. From the Sidebar, click Authentication > Keys.
  2. Click TLS Certificates.
  3. Click the row of the TLS Certificate you want to delete.
  4. Click the Delete button above the TLS Certificate details.
  5. You will be asked to confirm the deletion. Click Delete.
warning

USP Manager prevents deletion of a TLS Certificate if it is currently referenced by a Configuration Item.

Additionally, if the TLS Certificate is used by a USP Server instance, the updated configuration must be manually applied. To apply the changes:

  1. Navigate to Monitoring > Status.
  2. Click the Name of the associated USP Server instance.
  3. Go to the Configuration tab.
  4. Review the pending changes in the Candidate Configuration - Preview section.
  5. If the changes are correct, click Push Configuration.

The changes do not take effect on the server until this step is completed.