eG Enterprise version 7.5 introduces advanced capabilities for detailed SSL Certificate Monitoring including monitoring for web servers and apps using SSL. Monitoring SSL certificates is essential to ensure secure connections, prevent service outages, and maintain user trust. Here are a few things you need to monitor and questions you should ask to keep your services and apps running reliably and securely.
Question 1 – Which SSL certificates are nearing expiry? Have any expired?
Why you care: Monitoring SSL certificates for expiry is critical to avoid service disruptions, browser warnings, and user trust issues. An expired certificate can block access to your website or application, break secure connections, and cause compliance failures.
It can also disrupt APIs and services, leading to lost revenue or data exposure. Regularly checking which certificates are nearing expiry ensures continuity, maintains security, and supports compliance. Alerting in advance allows timely renewal and prevents last-minute emergencies.
How eG Enterprise helps:
Question 2 – Which (if any) SSL certificates are privately signed?
Why you care: Privately signed certificates aren’t trusted by browsers or external users, leading to security warnings and blocked access. They’re useful in internal systems but risky if accidentally used in public-facing services. Monitoring for them helps avoid trust issues, ensures proper use, and maintains compliance. Detecting private certs early prevents outages, user confusion, and potential vulnerabilities in exposed systems.
Privately signed certificates may not necessarily cause failure but can block caching vital for usable performance, learn more in this deep-dive postmortem where a self-signed certificate caused significant problems for a real customer’s web application, see: Troubleshooting Web Application Performance & SSL Issues.
Question 3 – Certificate Chain Validity – Are root/intermediate certificates valid? Are any nearing expiry?
Why you care: You need to ensure that the full chain (including intermediate certificates) is valid and properly configured. An incomplete chain can cause trust issues. Monitoring chain validity helps maintain uninterrupted secure connections and ensures the full trust path from your certificate to a trusted root authority.
Question 4 – Revocation Status – Have any certificates been revoked?
Why you care: Checking if SSL certificates are revoked is essential because a revoked certificate is no longer trusted by the issuing Certificate Authority (CA). Revocation can occur due to compromise, misuse, or administrative error. If a revoked certificate is still in use, browsers may block access or show warnings, exposing users to security risks.
You can manually check whether an SSL certificate has not been revoked by using the CRL (Certificate Revocation List) or OCSP (Online Certificate Status Protocol) to verify its validity.
How eG Enterprise helps:
Question 5 – Signature Algorithm – Are any certificates using lower strength public keys?
Why you care: It is best practice to use modern secure signature algorithms (such as SHA-256). You want to avoid relying upon weak or deprecated algorithms such as SHA-1.
Detailed Diagnostics for All SSL Certificates
SSL Certificate Expiry Report
You can always access the ready-to-go SSL Certificate Expiry Report via the “Reporter” tab in the main eG Enterprise console. Navigate to the “Reports by Function” section and “Domain Specific Reports -> Security and Compliance -> SSL Certificate”.
Summary
eG Enterprise v7.5 introduces a number of useful features to allow administrators to automate their management of SSL technologies and certificates without manual effort.
eG Enterprise is an Observability solution for Modern IT. Monitor digital workspaces,
web applications, SaaS services, cloud and containers from a single pane of glass.