Skip to main content
Certificate approval workflows add a human review step before certificates are issued, helping organizations enforce security controls and compliance requirements.

When to Use Approval Workflows

Approval workflows are recommended when:
  • Separation of duties is required: Your organization requires different people to request and approve certificate issuance.
  • Sensitive certificate issuance needs oversight: Certificates for production environments, customer-facing services, or internal PKI require additional review.
  • Compliance mandates review: Regulatory frameworks or internal policies require documented approval before certificate issuance.
  • Preventing unauthorized issuance: You want to ensure certificates are only issued after proper validation of the request.
If your use case involves fully automated certificate management for workloads (e.g., using Infisical Agent), you may want to enable the machine identity bypass option instead of requiring approval.

Approval Policies

An approval policy defines the workflow that must be completed before certificates can be issued from specific certificate profiles. When a certificate request is made against a profile with an approval policy, the request is placed in a pending state until the required approvers review and approve it. Key features of approval policies include:
  • Multi-step workflows: Configure sequential approval steps where each step must be completed before the next begins.
  • Flexible approvers: Assign individual users or groups as eligible approvers for each step.
  • Required approval count: Specify how many approvals are needed per step (e.g., require 2 out of 5 eligible approvers).
  • Machine identity bypass: Allow machine identities to issue certificates without approval for automated workloads.
  • Request expiration: Set a maximum time-to-live (TTL) for pending requests.

Guide to Creating an Approval Policy

To create an approval policy, head to your Certificate Management Project > Certificate Manager > Approvals > Policies and press Create Policy. pki approval policies
1

Configuration

Configure the basic policy settings:
  • Policy Name: A descriptive name for the policy such as production-cert-approval.
  • Max. Request TTL: The maximum time a request can remain pending before it expires (optional).
  • Certificate Profiles: Select one or more certificate profiles that this policy applies to. Any certificate request made against these profiles will require approval.
  • Bypass approval for machine identities: When enabled, machine identities can issue certificates from the selected profiles without requiring approval. This is useful for automated workloads that need certificates without human intervention. pki approval policy configuration
2

Approval Sequence

Configure the approval steps. Each step defines who can approve and how many approvals are required:
  • Step Name: An optional name for the step such as Security Team Review.
  • Approvers: Select individual users or groups who are eligible to approve this step. Multiple approvers can be selected.
  • Required Approvals: The number of approvals needed to complete this step. For example, if you select 5 approvers and require 2 approvals, any 2 of the 5 can approve to complete the step.
  • Notify Approvers: When enabled, eligible approvers receive a notification when their approval is required.
You can add multiple steps to create a sequential approval workflow. For example:
  1. Team Lead Review: Requires 1 approval from the team leads group
  2. Security Review: Requires 2 approvals from the security team
Each step must be completed in order before the certificate is issued.pki approval policy sequence
3

Review

Review your policy configuration and click Create to save the policy.pki approval policy reviewpki approval policy created

Approval Requests

When a certificate request is made against a profile with an approval policy, an approval request is created. Approvers can then review and approve or reject the request.

Viewing Requests

Navigate to your Certificate Management Project > Certificate Manager > Approvals > Requests to view all approval requests. You can filter requests by status: pki approval requests
  • Open Requests: Requests currently pending approval
  • Approved: Requests that have been approved and certificates issued
  • Rejected: Requests that were rejected by an approver
  • Cancelled: Requests cancelled by the requester
  • Expired: Requests that exceeded their maximum TTL

Approving a Request

1

Open the request

Click on a pending request to view its details.pki approval request open
2

Review the certificate details

Review the certificate request information including:
  • Requester name and email
  • Certificate profile
  • Common name and subject alternative names (SANs)
  • Key usages and extended key usages
  • Validity period
  • Basic Constraints pki approval request detail
3

Approve or add comments

If you are an eligible approver for the current step, click Approve to approve the request.pki approval request approve modalpki approval request approved
Once all required approvals for all steps are obtained, the certificate is automatically issued.

Rejecting a Request

1

Open the request

Click on a pending request to view its details.pki approval request open
2

Review the certificate details

Review the certificate request information.pki approval request detail
3

Reject with reason

If you are an eligible approver for the current step, click Reject to reject the request. Optionally add a comment explaining the rejection.pki approval request rejected
When a request is rejected, the workflow ends and no certificate is issued.

FAQ

If the approval policy has multiple steps, your approval may have completed only one step. The certificate is issued only after all approval steps are completed. Check the request details to see which step is currently pending and ensure all required approvers have approved.
The Approve button only appears if you are an eligible approver for the current step. Verify that:
  • You are listed as an approver (either directly or through a group) for the current approval step
  • The request is still in a pending state and hasn’t expired
  • A previous step hasn’t already been rejected
Approval policies can be configured on profiles using any enrollment method, including API, ACME, and EST. However, automated clients like Certbot typically cannot wait for human approval.
When a pending request exceeds the maximum TTL configured in the approval policy, it automatically moves to an Expired status. No certificate is issued for expired requests. The requester will need to submit a new certificate request.
By default, an approver can approve their own requests if they are listed as an eligible approver. If your organization requires separation of duties where requesters cannot approve their own requests, configure the approval policy with approver groups that exclude potential requesters.