Comment on Decreasing Certificate Lifetimes to 45 Days
Zanathos@lemmy.world 1 month agoWhile I agree for my personal use, it’s not so easy in an enterprise environment. I’m currently working to get services migrated OFF my servers that utilize public certificates to avoid the headache of manual intervention every 45 days.
While this is possible for servers and services I manage, it’s not so easy for other software stacks we have in our environment. Thankfully I don’t manage them, but I’m sure I’ll be pulled into them at some point or another to help figure out the best path forward.
The easy path is obviously a load balanced front-end to load the certificate, but many of these services are specialized and have very elaborate ways to bind certificates to services outside of IIS or Apache, which would need to trust the newly issued load balancer CA certificate every 47 days.
fatalicus@lemmy.world 1 month ago
Yeah, this has become an issue for us at work as well.
Currently we are doing a POC for an in-house developed solution where a azure function app handles the renewal of certificates for any domain we have, both wildcard and named, and place the certificates in a key vault where services that need them can get access.
Looks to be working, so the main issue now is finding a non-US certificate provider that supports acme. EU has some but even more local there aren’t many options.