Skip to main content

Documentation Index

Fetch the complete documentation index at: https://infisical.com/docs/llms.txt

Use this file to discover all available pages before exploring further.

Approval workflows add a human review step before certificates are issued. Use them to enforce separation of duties, ensure oversight of sensitive certificates, or meet compliance requirements.

When to Use Approvals

Separation of duties

Different people must request and approve certificate issuance.

Sensitive certificates

Production or customer-facing certificates need additional review.

Compliance requirements

Regulatory frameworks require documented approval before issuance.

Prevent unauthorized issuance

Ensure certificates are only issued after proper validation.
For fully automated workloads (e.g., using Infisical Agent), enable the machine identity bypass option so automated systems can issue certificates without waiting for approval.

How Approval Policies Work

An approval policy defines the workflow that must be completed before certificates are issued. Policies are configured per Application and can be scoped to specific profiles attached to that Application. When a certificate request is made through an enrollment method:
  1. Request enters pending state
  2. Approvers are notified (if configured)
  3. Each approval step must be completed in sequence
  4. Once all steps are approved, the certificate is issued

Create an Approval Policy

In your Application, go to the Settings tab and find the Approval Policies section. Click Create Policy.
1

Configure basic settings

FieldDescription
Policy NameA descriptive name like production-cert-approval
Max. Request TTLHow long a request can remain pending before expiring
Certificate ProfilesWhich profiles require approval
Bypass for machine identitiesAllow automated systems to skip approval
2

Configure approval steps

Each step defines who can approve and how many approvals are required:
FieldDescription
Step NameOptional name like Security Team Review
ApproversUsers or groups eligible to approve
Required ApprovalsHow many must approve (e.g., 2 of 5)
Notify ApproversSend notification when approval is needed
Example multi-step workflow:
  1. Team Lead Review — Requires 1 approval from team leads
  2. Security Review — Requires 2 approvals from security team
3

Review and create

Review your configuration and click Create.

Managing Approval Requests

View Requests

In the Certificate Manager sidebar, go to Approval Requests to see all pending and completed requests:
StatusMeaning
OpenPending approval
ApprovedAll steps completed, certificate issued
RejectedAn approver rejected the request
CancelledRequester cancelled the request
ExpiredRequest exceeded max TTL

Approve a Request

1

Open the request

Click on a pending request to view details.
2

Review certificate details

Verify the request information:
  • Requester name and email
  • Certificate profile
  • Common name and SANs
  • Key usages and validity period
3

Approve

If you’re an eligible approver for the current step, click Approve.
Once all required approvals are obtained, the certificate is automatically issued.

Reject a Request

1

Open the request

Click on a pending request.
2

Reject with reason

Click Reject and optionally add a comment explaining why.
When a request is rejected, the workflow ends and no certificate is issued.

FAQ

If the policy has multiple steps, your approval may have completed only one step. The certificate is issued only after all approval steps are completed. Check the request details to see which step is currently pending.
The Approve button only appears if:
  • You’re listed as an approver for the current step
  • The request is still pending (not expired or rejected)
  • Previous steps have been completed
Yes, approval policies work with any enrollment method. However, automated clients like Certbot typically can’t wait for human approval. Consider using the machine identity bypass for automated workloads.
The request moves to Expired status and no certificate is issued. The requester must submit a new request.
By default, yes — if they’re listed as an eligible approver. For separation of duties, configure approver groups that exclude potential requesters.