Skip to main content

Concept

Infisical can use Venafi TLS Protect Cloud as an external Certificate Authority to sign your internal intermediate CAs. This allows you to leverage Venafi’s cloud-based PKI infrastructure while managing your CA hierarchy within Infisical. The flow works as follows:
  1. Infisical generates a Certificate Signing Request (CSR) for the intermediate CA.
  2. The CSR is submitted to Venafi TLS Protect Cloud via the configured Application and Issuing Template.
  3. Venafi signs the certificate and returns it along with the certificate chain.
  4. Infisical imports the signed certificate back into the intermediate CA.
The certificate issued by Venafi must correspond to the CSR generated by Infisical. If the Issuing Template in Venafi is misconfigured and produces a certificate that does not match the CSR (e.g., different subject, different key), the installation will fail.Ensure your Venafi Issuing Template is configured to honor the CSR’s subject fields and key.

Prerequisites

  • A Venafi Connection configured in your organization
  • A Venafi Application with an Issuing Template that supports CA certificate issuance
  • An intermediate CA created in Infisical (not yet installed)

Guide to Installing an Intermediate CA via Venafi

1

Create an Intermediate CA

If you haven’t already, head to your Certificate Management Project > Certificate Authorities > Internal Certificate Authorities and press Create CA.Set the CA Type to Intermediate and fill out the details for the intermediate CA (Common Name, Organization, Key Algorithm, etc.).
2

Open the Install Certificate Modal

Press the Install Certificate option on the intermediate CA you just created. Select External CA (Automated) and press Continue.pki install select method
3

Select Venafi TLS Protect Cloud

Choose Venafi TLS Protect Cloud as the CA integration provider and press Continue.pki install external select
4

Configure the Venafi Signing Details

Fill out the following fields:pki install venafi form
  • Venafi Connection: Select the Venafi Connection to use for signing.
  • Application: Select the Venafi Application that contains the Issuing Template for CA certificate issuance.
  • Issuing Template: Select the Issuing Template within the Application that will be used to sign the intermediate CA certificate.
  • Validity Period (Days): The number of days the certificate should be valid. This is optional and depends on your Issuing Template configuration.
  • Path Length: The maximum number of intermediate CAs that can be chained below this CA. Use -1 for no limit, or 0 to prevent further chaining.
5

Install the Certificate

Press Install to submit the CSR to Venafi and import the signed certificate.
The installation is processed asynchronously. After clicking Install, the certificate request is queued and you will see the CA status update once the certificate has been signed and imported.

Auto-Renewal

Infisical supports automatic renewal of intermediate CA certificates signed by Venafi. When enabled, Infisical will automatically submit a new CSR to Venafi and import the renewed certificate before the current one expires.
Navigate to the CA details page of your Venafi-signed intermediate CA. Click the edit (pencil) icon in the Details section to open the renewal settings.pki venafi auto-renewal pageToggle Auto-Renewal on and set the Days Before Expiry to configure when the renewal should be triggered.pki venafi auto-renewal modal

Manual Renewal

You can also manually trigger a renewal for a Venafi-signed intermediate CA at any time.
Navigate to the CA details page and press the Renew CA button.pki venafi renew pageThe renewal modal will confirm that this CA is configured to use Venafi TLS Protect Cloud for signing. Press Renew via Venafi to submit a new CSR to Venafi and install the renewed certificate.pki venafi renew modal

Signing Configuration Management

You can view and update the signing configuration for a Venafi-signed CA at any time:
  • GET /:caId/signing-config — Retrieve the current signing configuration
  • PATCH /:caId/signing-config — Update the Venafi connection, application, issuing template, or validity period
Updating the signing configuration does not affect the currently installed certificate. Changes take effect on the next installation or renewal.

FAQ

The installation will fail. Infisical validates that the returned certificate matches the CSR’s public key. Check your Venafi Issuing Template configuration to ensure it honors the CSR’s subject fields and key algorithm.
Yes. You can update the signing configuration to change the type. Create a new signing configuration with type: "internal" and specify the parent CA. Then renew or reinstall the intermediate CA certificate.
Infisical supports the following Venafi TLS Protect Cloud regions: US, EU, AU, UK, SG, and CA. Select the region that matches your Venafi instance when creating the connection.
The installation is asynchronous. When you trigger the installation, the request is queued and processed in the background. The API returns HTTP 202 (Accepted) immediately. You can monitor the CA status to check when the certificate has been installed.