-
-
Notifications
You must be signed in to change notification settings - Fork 5.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Show EV status and issuer next to the expiration days #4687
Comments
I have updated your title to reflect that you want a Certificate transparency monitor as described on https://certificate.transparency.dev/monitors/ I think that integrating such tooling might be helpfull, but currently not a huge priority as a lot of existing tooling around this already exists. |
I think it's not what I want. I don't want to monitor if somebody creates certificates for my servers. |
Why do you use EV certificates and a mix of other CAs? |
Why not? |
Honestly curious: Where would they be required? I never got why people like to spend money on that.
LetsEncrypt does have the |
Let's encrypt supports only domain validated certificates (DV), if you need or want to have company information included in the certificate then you need a owner validated certificate (OV), some use-cases even require extended validation certificates (EV). |
Still not getting it: What is the usecase for ev certs you talked about? My only context is https://wikipedia.org/wiki/Extended_Validation_Certificate#Criticism |
Really this discussion? Nobody cares if you like EV certificates or not. |
Host Europe doesn't have any API for managing DNS so this isn't working. |
I am trying to gauge here if this would be a generally usefull feature (i.e. for all users) or just something that falls in the #646 category and supports your particular workflow.
But Banks would likely not use this software (we don't have multi-user auth, SSO, nor the necessary features such as a ISO27001 certification)...
So your customers want EV-Certs. Why? Including this where we currently do is still fine imo. => I still don't see a reason why uptime kuma should include this info in a notification.. I somewhat question the premise:
LetsEncrypt sends you the expiry notifications at 20 and 7 days => Your LetsEncrypt certs should be renewed before that, likely before the 30 days or on the 30th day like |
One step would be show this information also when you click on the Cert Exp days in the status page. This works only when you are in the dashboard. |
π I have found these related issues/pull requests
No related issues found
π·οΈ Feature Request Type
Status-page, Certificate expiry
π Feature description
I monitor a lot of https pages and it shows the certificate expiration time.
I want to show the certificate issuer next to the days.
So if it's Letsencrypt, I don't care if 10 days are left. But if it's from a company or an internal certificate, I need to do something earlier. The times I can configure currently are not very good to handle this different types of workflows very good.
I don't need a reminder 30 days before the expiration for letsencrypt.
But 30 days for EV certificates should be necessary.
And you could also show in this case if its an EV certificate.
βοΈ Solution
Show EV status and issuer next to the expiration days
β Alternatives
No response
π Additional Context
No response
The text was updated successfully, but these errors were encountered: