Share your ideas

Deployment of TLS certificates should be automated

When the TLS certificate expires (yearly), it must be deployed manually on all servers, from the PCAs on downward. When you have a large server count (50, for example) this process is time consuming and error prove (as it's a manual process).

To make this process more manageable, TMS should be enhanced to pre-deploy the certificate to all servers, including the PCAs, and then broadcast an update schedule to all servers. The servers would then self-update at their proscribed time.

The old certificate would be retained (not overwritten) and a provision for rollback would be provided. Possibly, TMS would retain non-SSL communication capabilities for validation and triggering an administrator controlled rollback.

For example:

3:00am: half of PCAs and HBRs update

3:05am: The other half update

3:10am: All canisters update

3:15am: All archive servers update

3:20am: All remaining update (portal/report/data collection/pre-agg, etc)


The update process must be very reliable. Reboot should not be required. Ideally service restart should not be required (Socket reconnect/retry).


Search tags: TLSTool.exe, TCXcert.pfx, tealeaf.crt, tealeaf.p12, ServerCertPath

  • Eric Stamper
  • Oct 7 2021
How will this idea be used?

This enhancement will reduce cost and risk, and reduce service down-time.

What is your industry? Insurance
What is the idea priority? Medium