SSLEEK simplifies SSL certificate management, aiming to ease the workload of system administrators. It provides essential tools to help manage digital security more effectively, with a focus on simplifying processes and enhancing protection.
🔐 Calling All SysAdmins and Internet Geeks! 🔐
We need your expertise!
Are you dealing with certificate management challenges in mixed environments? So are we! We're working on a solution, and your feedback can make it even better.
Your insights are incredibly valuable to us. By sharing your thoughts, you'll help us fine-tune our product to better suit your needs and those of other sysadmins.
Plus, we're planning to open-source the agents part of our product. Your feedback can help shape our ability to integrate with proper vendors.
Join us in simplifying certificate management. Your input will guide the future of our product and make life easier for IT professionals everywhere.
Let's work together to revolutionize certificate management. Share your feedback and help us build something truly useful.
Congratulations on the launch!
It seems that our company's SSL certificates need to be configured on AWS, but I am not sure how to do it. Dealing with these certificates can be quite frustrating. Previously, we developed a webpage, but it couldn't be accessed because we didn't have the proper certificates (https). Your product might be able to solve many of these issues!
The tool’s approach to easing SSL management and focusing on protection is brilliant. The clean and intuitive interface is a big plus. Excited to see its impact on digital security!
@william_jin
Hi William, our goal is to manage the entire lifecycle of certificates in complex environments. While many products are merely certificate/SSL monitoring tools, we aim to develop a comprehensive tool for actual certificate management. Here are some real-life examples:
If you have multiple endpoints serving a single domain, such as DNS load-balanced servers, multi-cloud deployments, anycasted IPs from multiple locations, or third-party CDNs, our tool will automatically discover all endpoints serving the same certificate and ensure that each endpoint is serving the correct certificate.
For applications using certificates to authenticate to services on the Internet or local network, our agent will discover all certificates present on the filesystem and periodically check their validity.
If your script automatically renews a certificate (e.g., a Let's Encrypt certificate), but the application using the certificate is not aware of the renewal (resulting in a different certificate being served on the TCP port versus the one present on the filesystem), we will notify you about this discrepancy.
We plan to integrate with third-party products to help you discover, monitor, and replace certificates on network equipment from different vendors. Additionally, we intend to open-source this part of our code to encourage community-driven development.
We will check all discovered certificates against the certificate transparency log or your private certificate authority. This way, we can notify you if a new certificate has been issued while your endpoints are still serving the old one.
In the upcoming weeks, a new feature will provide a detailed history of events for each certificate, domain, and endpoint on their respective detail pages. The feature enhances visibility into certificate installments, improves security, and simplifies management of these digital assets.
We've researched competitors several times and have not found a product that approaches the problem in this way. If you know of any, I would really appreciate it if you could let us know.
ssleek