Skip to main content

Documentation Index

Fetch the complete documentation index at: https://infisical.com/docs/llms.txt

Use this file to discover all available pages before exploring further.

Issue a TLS certificate from your own private CA in about 10 minutes. You’ll set up a certificate authority, create a policy and profile, then issue your first certificate.

Prerequisites

  • Product Admin permissions (to create CAs, policies, and profiles)

Steps

1

Create a Certificate Authority

Go to Certificate Manager → Settings → Certificate Authorities and click Create.
FieldValue
Namemy-root-ca
TypeRoot CA
Key AlgorithmEC_prime256v1
Learn more about CAs →
2

Create a Certificate Policy

Go to Settings → Certificate Policies and click Create.
FieldValue
PresetTLS Server Certificate
Nametls-server
The preset pre-configures all the right settings for standard TLS certificates.Learn more about policies →
3

Create a Certificate Profile

Go to Settings → Certificate Profiles and click Create.
FieldValue
Nameweb-servers
Certificate AuthoritySelect my-root-ca
Certificate PolicySelect tls-server
Learn more about profiles →
4

Create an Application

Go to Certificate Manager → Applications and click Create.
FieldValue
Namemy-first-app
Certificate ProfileSelect web-servers
Learn more about Applications →
5

Configure Enrollment

In your Application, go to the Settings tab and find the Certificate Profiles section. Click Configure on the web-servers profile, then click Add enrollment method and select API.Learn more about enrollment →
6

Issue Certificate

In your Application, go to the Certificate Requests tab and click Request Certificate.
FieldValue
ProfileSelect web-servers
Common Nameexample.local
Click Request and download your certificate and private key.

Result

You now have two files:
  • certificate.pem — Your TLS certificate
  • private-key.pem — The private key (keep this secure)
Verify your certificate:
openssl x509 -in certificate.pem -text -noout
You should see your certificate details including the Common Name (example.local), validity period, and that it was signed by my-root-ca.

Next Steps