Quick start guide for using Ultimate Certificate Manager.
- Navigate to
https://your-server:8443 - Login with default credentials:
admin/changeme123 - Important: Change your password immediately in Account settings
UCM uses a 3-panel layout:
- Sidebar (left, 52px) -- Main navigation icons
- Explorer -- List of items for current page
- Details (flex) -- Selected item details and actions
| Shortcut | Action |
|---|---|
Cmd/Ctrl + K |
Open Command Palette |
Escape |
Close modals/menus |
- Go to Certificates page
- Click + New Certificate button
- Fill in the form:
- Common Name - Primary identifier (e.g.,
www.example.com) - Subject Alternative Names - Additional domains/IPs
- Issuing CA - Select parent CA
- Template - Use preset or custom settings
- Validity - Certificate lifetime
- Common Name - Primary identifier (e.g.,
- Click Create
- Select a certificate in the table
- In the details panel, click Export
- Choose format:
- PEM - Standard format (certificate + key)
- PKCS12 - Windows/Java compatible bundle
- DER - Binary format
- Set password (for PKCS12)
- Download or copy to clipboard
- Select the certificate
- Click Revoke in details panel
- Select revocation reason
- Confirm action
- Certificate is added to CRL automatically
- Go to Certificate Authorities page
- Click + New CA
- Select Root CA type
- Configure:
- Common Name - CA identifier
- Organization - Your organization name
- Key Type - RSA 4096 or ECDSA P-384 recommended
- Validity - 10-20 years typical for Root
- Click Create
- Go to Certificate Authorities page
- Click + New CA
- Select Intermediate CA type
- Choose Parent CA from your Root CAs
- Configure settings (5-10 year validity typical)
- Click Create
- Toggle between Grid and Tree view using the view switcher
- Tree view shows parent-child relationships
- Click any CA to see its details and issued certificates
- Go to CSRs page
- Upload CSR file or paste PEM content
- Select in the list
- Click Sign
- Choose:
- Issuing CA - Which CA will sign
- Template - Certificate profile
- Validity - Override template default
- Click Sign CSR
- Download or copy the signed certificate
Templates define default settings for certificates.
- Go to Templates page
- Click + New Template
- Configure:
- Name - Descriptive name
- Key Usage - Digital Signature, Key Encipherment, etc.
- Extended Key Usage - Server Auth, Client Auth, etc.
- Default Validity - Days/months/years
- Subject Constraints - Required/allowed fields
- Click Save
| Template | Use Case |
|---|---|
| Web Server | HTTPS certificates |
| Client Auth | User certificates |
| Code Signing | Software signing |
| Email (S/MIME) | Email encryption |
- Go to Users page (requires admin)
- Click + New User
- Fill in:
- Username - Login name
- Email - For notifications
- Role - Admin, Operator, Auditor, or Viewer
- Temporary Password - User changes on first login
- Click Create
| Role | Permissions |
|---|---|
| Admin | Full access, user management, settings |
| Operator | Create/manage certs, CAs, CSRs, protocols |
| Auditor | Read-only access to all resources (except users/settings) |
| Viewer | Read-only access to certificates, CAs, CSRs, templates, truststore |
UCM supports external identity providers for authentication:
- LDAP / Active Directory — Bind-based authentication with group-to-role mapping
- OAuth2 — Google, GitHub, Azure AD, or any OpenID Connect provider
- SAML 2.0 — Enterprise identity providers (Okta, Azure AD, ADFS)
Configure SSO in Settings → SSO tab (admin only). Each provider type supports automatic role mapping based on group membership.
- Go to Account → Security tab
- Click Enable 2FA
- Scan QR code with authenticator app
- Enter verification code
- Save backup codes securely
- Go to Account → Security tab
- Click Add Security Key
- Insert and touch your hardware key
- Name the key for identification
Enable Let's Encrypt-compatible certificate issuance:
- Go to Settings → ACME tab
- Enable ACME server
- Configure:
- Base URL - Public URL for challenges
- Default CA - CA for issued certificates
- Allowed Domains - Restrict issuance
- Clients use:
https://your-server:8443/acme/directory
Enable device auto-enrollment:
- Go to Settings → SCEP tab
- Enable SCEP server
- Configure:
- Challenge Password - Enrollment secret
- CA for Signing - Issuing CA
- Certificate Template - Default profile
- Devices use:
https://your-server:8443/scep
Real-time certificate validation:
- OCSP is enabled automatically
- URL:
https://your-server:8443/ocsp - Configure in CA settings for CDP/AIA extensions
RFC 7030 device enrollment:
- Go to Operations > EST
- Enable EST and assign a CA
- Devices use:
https://your-server:8443/.well-known/est - Supports simple enrollment and re-enrollment
Scan your network for certificates:
- Go to Operations > Discovery
- Create a Scan Profile with target hosts/networks, ports, and schedule
- Run a scan manually or let it run on schedule
- Review discovered certificates — status, expiry, issuer, SAN
- Import discovered certificates into UCM or flag them for tracking
For one-off checks, use the Quick Scan button to scan a single host or range without creating a profile.
The Tools section provides utilities for working with certificates:
- SSL Checker — Test SSL/TLS configuration of any server (public or internal)
- CSR Decoder — Paste a CSR to inspect subject, SANs, key type, and extensions
- Certificate Decoder — Paste a PEM certificate to view all fields
- Key Matcher — Verify that a certificate and private key match
- Format Converter — Convert between PEM, DER, and PKCS#12 formats
The Reports page provides on-demand and scheduled reporting for your PKI environment.
The reports page shows:
- Stat cards — Quick counts for certificates, CAs, expiring soon, and revoked
- Report list — All available report types with generate/download actions
- Schedule status — Which reports are scheduled and their next run time
- Go to Reports page
- Select a report type from the list:
- Expiring Certificates — Certificates expiring within a configurable number of days
- Revoked Certificates — All revoked certificates with reason and date
- CA Hierarchy — Certificate Authority tree with issued certificate counts
- Audit Summary — Recent audit log activity grouped by action type
- Compliance Status — Policy compliance overview across all certificates
- Certificate Inventory — Full inventory of all certificates with status and metadata
- Click Generate to create the report
- Choose output format: CSV, JSON, or PDF
The executive PDF report provides a comprehensive, downloadable document for management review:
- Go to Reports page
- Click Download Executive PDF
- The PDF includes:
- Cover page with organization name and generation date
- Executive summary with key metrics
- Risk assessment highlighting urgent issues
- Certificate inventory breakdown by status
- Compliance status across all policies
- Lifecycle analysis of certificate age and renewal patterns
- CA infrastructure overview
- Recommendations based on current state
- Expiring Certificates — Use the
daysparameter to control the look-ahead window (default: 30 days) - Revoked Certificates — Includes revocation reason (key compromise, CA compromise, affiliation changed, etc.)
- CA Hierarchy — Shows parent-child relationships and certificate counts per CA
- Audit Summary — Groups actions by type (create, revoke, delete, login, etc.) with counts
- Compliance Status — Shows pass/fail per policy with affected certificate details
- Certificate Inventory — Full list with serial number, CN, issuer, validity dates, and status
Change the UI theme:
- Click your user avatar (bottom of sidebar) to open the user menu
- Select Theme submenu
- Choose from 3 color schemes, each with Light and Dark variants:
- Gray (default)
- Purple Night
- Orange Sunset
- Or select Follow System to match your OS light/dark preference
Theme persists across sessions.
UCM is mobile-responsive:
- Bottom Sheet - Tap the peek bar to see explorer list
- Swipe - Drag to resize the explorer
- Tap to Select - Touch items to view details
- Auto-Close - Sheet closes when item selected
- Check username/password
- Clear browser cache
- Try incognito mode
- Check server logs:
journalctl -u ucm -f
- Verify CA has valid private key
- Check CA validity period
- Review error message in notification
- Verify service is enabled in Settings
- Check firewall allows port 8443
- Verify DNS/hostname configuration
- Test with
curl https://server:8443/scep