The Entrust Certificate Manager allows organizations with large numbers of private and public trust certificates to monitor and track their in-use certificates. New certificates can be requested, issued and downloaded for immediate deployment all without leaving the ServiceNow environment.
Role-based access control is available to identify the persons in the organization responsible for certificate administration. Other users can be assigned permissions to request certificates subject to an additional approval workflow where a certificate administrator must approve their request prior to a certificate being issued.
Integration with both Entrust Certificate Services and the Entrust CA-Gateway allows both public trust and private trust certificates to be issued and managed in ServiceNow.
Integration with the ServiceNow CMDB module ensures that all digital certificate that are created in your organization will automatically be added to CMDB and tracked as CIs alongside all of your other IT assets.
This application is domain-separation aware. Users and administrators assigned to domains are only able to see requests and certificates for the organization(s) assigned to their domain to support MSP workflows.
Individual certificate users can view their issued certificates and "self-service" request replacement certificates prior to the certificates expiring. Certificate administators also have the ability to view all issued certificates and issue replacement certificates on behalf of their users.
Note: This application requires the use of an Entrust Certificate Services account or the Entrust CA-Gateway.
- Fix for failing of retrieving list of all ECS certificates.
Release 2.9: Bug fixes for retrieving a list of all ECS certificates for a user
Release 2.8:
- Bug fixes for PKCS12-based PKI certificate profiles
Release 2.7:
- Bug fixes on auto-deletion of non-PKI certificates from the All Certificates section
Release 2.6:
- Compatible with Vancouver version
- Approver user role modified to scoped role
- Rejected certificates stage set to "Completed"
- PKI certificates mapping fixed
- CMDB certificate table mapping fixed
- On initialization PKI certs are deleted and synced again
Release 2.5:
- When Certificate Owner" is not found in Service Now, filed is empty.
- "Organizational Unit" field is present only in "Private" type of certificate.
- Application compatible with Tokyo release.
- Workflow step modified (When there is no user with x_entru_ecs_approver_user set in Service Now, request for certificate will fail).
Release 2.4:
- "Unrecognized field" error fixed
- Subject Alternative Name - valid domains error fixed
- Ampersand(&) symbol allowed in Custom Fields
- Custom Fields removed from Catalog at the initial installed application
Release 2.3:
- Bug Fix related approving certificate.
Release 2.2:
- Application compatible with San Diego release
- Order field Subject Dn for PKI sertificates is mandatory
Relesae 2.1:
- Certificate ownership information is now passed to CA-Gateway when using CA plugins that accept this information
- Bug fixes related to CA-Gateway when multiple CAs are available to issue certificates
Release 2.0:
- Issuing private trust certificates via the Entrust CA-Gateway is now supported. Certificate Authorities (CAs) and Certificate Profiles configured in CA-Gateway are discovered by the application and can be used to issue certificates in ServiceNow.
- Reference approval workflow in the application can now be modified by customers to achieve a customized workflow
- Certificates found or created using the application will automatically be added into the CMDB database and will be visible in the ServiceNow Certificate Management application
- The certificate request user interface for ECS Certificates will now capture and populate custom fields defined in your ECS account
Release 1.1:
- Application now uses Entrust Certificate Services REST API for certificate issuance
- Certificates synchronized from Entrust Certificate Services will automatically be assigned to users in the ServiceNow instance using the owner's email address to match users
- Certificate owners will now receive certificate expiry notice emails directly from Entrust Certificate Services
- Domain Separated instances are supported. Certificate data is assigned to organization domains to ensure certificates can only be view and requested by individuals that are part of an organization.
Application requires the use of an active Entrust Certificate Services account or the Entrust CA-Gateway.