Key Manager Plus

Centralises and automates rotation, renewal and auditing of keys and certificates.

Key Manager Plus: centralised discovery, rotation and auditing for keys and certificates

Many organisations struggle to keep a clear inventory of keys, certificates and SSH credentials. Expiring certificates and ad‑hoc key use create outages and increase operational risk. Manual renewal and undocumented access make audits time consuming.

Key Manager Plus gives a single view of keys and certificates and enforces lifecycle controls. It automates rotation and renewal, applies access controls and keeps audit trails. That reduces routine manual work and helps teams avoid unexpected expiries and credential sprawl.

Where Key Manager Plus is used

Use case 1: Automate SSL/TLS certificate lifecycle across web servers, load balancers and internal PKI so renewals happen before expiry and inventory stays accurate.

Use case 2: Discover and manage SSH keys and privileged credentials on servers and network devices, apply controlled access and retain audit logs for change and access events.

Suitable environments

Fits mid‑sized and larger organisations with on‑prem server and network estates, hybrid cloud mixes and a central IT or security team. It is also suitable where regulatory or audit pressure requires clear evidence of key and certificate controls.

Features

Centralised Discovery & Management

Automatically discover and consolidate all SSH keys and SSL/TLS certificates within your IT infrastructure into a secure repository.

Automated Certificate Lifecycle Management

Streamline the procurement, deployment, renewal, and revocation of certificates with one-touch workflows, reducing manual intervention and errors.

SSH Key Management

Create, deploy, rotate, and manage SSH keys, ensuring secure access controls and compliance with security policies.

Private Certificate Authority (CA)

Establish an internal CA to issue and manage certificates, enhancing security and reducing reliance on external CAs.

Vulnerability Assessment

Conduct proactive scans to detect vulnerabilities like Heartbleed and POODLE, safeguarding your digital assets.

Comprehensive Reporting & Auditing

Generate detailed reports and audit trails to meet compliance requirements and facilitate security audits.

Integration with ITSM & DevOps Tools

Seamlessly integrate with platforms like Jenkins, Azure Key Vault, and ServiceDesk Plus to enhance operational efficiency.

Granular Access Controls

Implement role-based access controls to ensure only authorised personnel can manage and access keys and certificates.

Screenshots