CLM

CLM

Bring SSL.com into the CLM platform you already trust.

Certificate Lifecycle Management (CLM) is the discipline of discovering, inventorying, issuing, renewing, and revoking certificates across your entire estate. Most enterprises run this through a dedicated CLM platform — Venafi (now part of CyberArk) and Keyfactor are the two most widely deployed. SSL.com integrates as a CA into both — and exposes two REST APIs for custom integrations — so you can keep your existing CLM platform, workflows, and inventory, and use SSL.com for the certificates themselves.

What CLM is, and who does what

Certificate Lifecycle Management (CLM) spans the full life of a certificate: discovery on the network, inventory across teams and CAs, issuance, deployment, monitoring, renewal, and revocation. Different parts of that lifecycle are owned by different layers of the stack.

If you already run Venafi TPP or Keyfactor Command, you don’t need SSL.com to also be a CLM platform — you need SSL.com to plug into the one you already have. That’s what this page covers.

LayerWhat it doesWhere SSL.com fits
CLM platform (Venafi, Keyfactor)Discovery, multi-CA inventory, approval workflows, request forms, RBAC, audit, reporting, policySSL.com integrates as a CA into the platform via a published driver/plugin
Automation protocol (ACME)Standardised, unattended issuance and renewalSSL.com is a fully ACME-compatible CA — see the ACME page
REST APIs (SWS API, Developer Portal API)Programmatic access to the full certificate lifecycle for custom integrationsBoth are published and supported by SSL.com — see REST APIs section below
Certificate Authority (SSL.com)Validation, issuance, revocation, expiry notifications, account-level managementThe CA layer of your CLM stack

Native lifecycle features at SSL.com

These features are provided directly inside the SSL.com account and require no integration:

Expiry notifications

Automated email alerts before certificate expiry — so you know before your users do.

Account-level certificate list

View, download, and manage certificates issued through your SSL.com account from one place.

Renewal & reissue

Renew or reissue any certificate from the SSL.com portal — no additional tooling required.

Revocation

Revoke certificates issued through your account, individually or in bulk.

ACME automation

Fully automated issuance and renewal via the ACME protocol. See the ACME capability page for full details.

REST APIs

Two REST/JSON APIs cover the full lifecycle programmatically — the SWS API and the Developer Portal API at api.ssl.com.
What's not provided natively at SSL.com: network-wide certificate discovery, multi-CA inventory, approval workflows, customisable request forms, and fleet-wide RBAC. These are CLM-platform capabilities — use Venafi or Keyfactor with SSL.com plugged in as the CA.

Integration — Venafi TPP (CyberArk)

SSL.com integrates with Venafi Trust Protection Platform (TPP) — now part of the CyberArk Machine Identity Security portfolio — through the SSL.com Adaptable Driver for Venafi.

What the integration provides

  • Full lifecycle automation through Venafi: request, issuance, renewal, and revocation of SSL.com certificates from the Venafi platform
  • Coverage across SSL.com certificate types: SSL/TLS, client authentication, S/MIME, and code signing
  • Built on the SWS API: the driver communicates with SSL.com via the SWS API so the full certificate lifecycle and real-time data are available inside Venafi
  • Centralised visibility and policy: Venafi remains the single pane of glass — SSL.com appears as one of the CAs Venafi can issue against

How to deploy

The driver is published on the Venafi / CyberArk Marketplace. Install it into your Venafi TPP environment, configure SSL.com account credentials, and define the SSL.com products your team should be able to issue against.

SSL.com overview article  ·  CyberArk Marketplace listing

Integration — Keyfactor Command

SSL.com integrates with Keyfactor Command through the SSL.com AnyCA Gateway REST plugin, published and maintained on Keyfactor’s GitHub.

What the integration provides

  • Issue, revoke, and synchronise SSL.com certificates from Keyfactor Command, alongside any other CAs Keyfactor manages
  • Modern REST-based architecture: runs against Keyfactor’s AnyCA Gateway REST framework rather than the legacy DCOM gateway
  • Configurable certificate templates: map SSL.com product IDs to certificate profiles in Keyfactor; control lifetime and other parameters via Command’s enrollment fields
  • Compatible with Keyfactor Command v12.3 and later

How to deploy

Install the AnyCA Gateway REST per Keyfactor’s documentation, drop the SSL.com plugin into the Gateway’s Extensions directory, restart the service, and add SSL.com as an HTTPS CA inside Keyfactor Command.

Keyfactor GitHub plugin  ·  Keyfactor AnyCA Gateway REST documentation

REST API interfaces

SSL.com exposes its certificate lifecycle through two REST/JSON APIs. Either can be used directly to build custom CLM workflows, or as the integration substrate beneath a third-party CLM platform. Both authenticate against an SSL.com account, return JSON, and cover the full certificate lifecycle.

APIWhat it isWhen to use
SWS API (SSL.com Web Services)The established REST API. Drives certificate ordering, validation, issuance, re-keying, revocation, and account management. Backed by a public sandbox for safe testing.Existing partner integrations, the SSL.com Adaptable Driver for Venafi, and most current automation work. Stable, broadly deployed, well-documented.
Developer Portal API at api.ssl.comThe newer REST API and self-service developer portal — same lifecycle, refreshed surface, and a member portal for credentials and docs. Staging at api.staging.ssl.com.Recommended for new integration work. Use staging for development; promote to production against api.ssl.com when ready.

Choosing an approach

Your situationRecommended approach
Small fleet, mostly public-facing TLS, no existing CLM platformUse SSL.com's native expiry notifications and ACME automation
Mid-size estate, DevOps-driven, no CLM platformACME for issuance/renewal automation, plus SSL.com's native account-level features for tracking
Already running Venafi TPP / CyberArk Machine Identity SecurityInstall the SSL.com Adaptable Driver — keep Venafi as your single pane of glass
Already running Keyfactor CommandInstall the SSL.com AnyCA Gateway REST plugin — keep Keyfactor as your single pane of glass
Custom in-house tooling or integrating with a CLM platform not listed aboveBuild against the SWS API or the Developer Portal API at api.ssl.com
Need network discovery, multi-CA inventory, approvals, request forms, or fleet-wide RBACAdopt a CLM platform (Venafi or Keyfactor) and integrate SSL.com using the relevant plugin

Frequently asked questions

No. SSL.com provides basic, account-level lifecycle features — expiry notifications, certificate listing, renewal, revocation — plus full ACME automation and two REST APIs. Discovery, multi-CA inventory, approval workflows, request forms, and RBAC are not provided natively. For those capabilities, integrate SSL.com with a CLM platform such as Venafi TPP or Keyfactor Command.
No. Network discovery — scanning hosts and endpoints to build an inventory regardless of which CA issued them — is a CLM-platform feature. Venafi and Keyfactor both provide it. SSL.com only has visibility into certificates issued through your SSL.com account.
No. These are CLM-platform features. Define your workflows and request forms in Venafi or Keyfactor, and route the issuance to SSL.com via the integration.
Yes. The Venafi driver and the Keyfactor plugin are independent — an organisation running both platforms can connect SSL.com to each.
For new integrations, the Developer Portal API at api.ssl.com (staging: api.staging.ssl.com) is the recommended path. For existing automation, partner integrations, and anything built against the SSL.com Adaptable Driver for Venafi, the SWS API remains stable and fully supported. Both APIs cover the full certificate lifecycle.
ACME is the IETF-standard automation protocol for issuance and renewal. It can be used directly (configure an ACME client against SSL.com) or invoked by a CLM platform on your behalf. Many teams use a CLM platform for visibility and governance, with ACME as the underlying automation transport. See the ACME capability page for full details.
SSL Manager is a Windows desktop GUI for endpoint-level certificate operations — issuing, installing, and renewing on a single machine. CLM is the org-wide management discipline, run through Venafi or Keyfactor (or SSL.com's native account features for simpler estates). Teams often use SSL Manager for individual server work and a CLM platform for the fleet view.

Related products & capabilities

ACME

Automation protocol used by SSL.com's native ACME endpoint and by CLM platforms that invoke ACME — the issuance and renewal layer.

SSL Manager

Windows desktop tool for endpoint-level certificate operations — complementary to fleet-level CLM.

Single Domain TLS/SSL

Issued through CLM integrations, REST APIs, ACME, or directly.

Wildcard TLS/SSL

Issued through CLM integrations, REST APIs, ACME, or directly.

Managed PKI

Enterprise-grade managed PKI — typically paired with a CLM platform.

We’d love your feedback

Take our survey and let us know your thoughts on your recent purchase.

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognizing you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

For more information read our Cookie and privacy statement.

3rd Party Cookies

This website uses Google Analytics & Statcounter to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping these cookies enabled helps us to improve our website.

Show details