Mar 12, 2026
|
OVERVIEW: This page provides instructions on how to manage your Certificates using TLS Connect. At the completion of this process, you will be able to manage your Certificates in TLS Connect seamlessly with your GCC Managed SSL (MSSL) account. For more information and frequently asked questions, please refer to this page. |
The Domain Management sections in TLS Connect allow you to validate ownership of domains before certificates can be issued. You can view and manage domains associated with either your GCC Managed SSL profiles or Atlas accounts, depending on the issuing platform you are using.
Use this section to view and manage domains associated with your registered GCC Managed SSL (MSSL) profile.
Open the TLS Connect application and navigate to the GCC > Domain Mgmt tab.
To add a domain:
Select Add New Domain.
Enter the domain name in the Domain field.
Choose the appropriate validation method and validation level.
Click Add Domain.
To verify a domain:
Click Verify next to the domain in the domains table.
A pop-up window will display the domain verification code (DVC) or verification email address, depending on the selected validation method.
Once the validation requirement is satisfied, click Verify to complete the validation process.
You can manually request a TLS certificate at any time using the TLS Connect application.
Open the TLS Connect application and navigate to the GCC tab.
Choose how the Certificate Signing Request (CSR) will be provided:
Upload a CSR that was generated externally, or
Generate the CSR and key pair directly within TLS Connect.
Enter the fully qualified domain name (FQDN) for the certificate.
Select the certificate type to issue:
IntranetSSL
Domain Validation (DV)
Organization Validation (OV)
Extended Validation (EV)
Select the certificate validity period.
Choose the key type and key size.
If this request is intended to replace a valid, unrevoked certificate, select Reissue.
This option is available only when a prior order is associated with the certificate.
Click the Refresh button to allow TLS Connect to locate eligible orders for reissuance.
Select the appropriate order from the dropdown list.
Add any required Subject Alternative Names (SANs) to the certificate request.
Click Next.
On the following screen, select:
The certificate export format
An export password (if applicable)
The file location where the certificate will be saved.
NOTE: JDK is required to support the JKS file format.
Click Next.
On the final screen, enter a friendly name for the certificate. The friendly name is a required identifier used by Windows to distinguish certificates in the Windows Certificate Store.
Review the certificate request details. When ready, click Issue Certificate.
A confirmation message is displayed once the certificate has been successfully issued.
This inventory reflects certificates issued through GlobalSign platforms, not certificates discovered via network scanning. Your issued certificates will appear in an inventory associated with your GlobalSign issuance platform (GCC or Atlas). From this view, you can:
See certificates that are valid, expiring, or nearing expiration
Sort and filter the inventory using multiple criteria
View detailed certificate information
Download individual certificates.
Use this option to fetch new or modified certificates within the specified sync window (Atlas is 30 days, GCC is 365 days).
Use this option to export the certificate inventory to a CSV file for offline review or reporting.
The Deployment tab displays all IIS sites bound on the local Windows server, along with certificates available in the Windows Certificate Store. From this tab, you can deploy certificates to IIS sites, deploy certificates to remote targets, or export certificates for use elsewhere.
Use this option to bind a certificate to one or more IIS sites on the local server.
Select a certificate from the inventory list.
Select one or more IIS sites to which the certificate should be deployed.
Click Deploy Certificate.
Once deployed, the certificate appears next to the IIS site(s) it is bound to.
Use this option to deploy a certificate to a remote endpoint.
Select a certificate from the inventory and click Deploy Remote.
Choose the deployment target.
Use this option to export a certificate from the Windows Certificate Store.
Select a certificate from the inventory and click the export (yellow folder) icon.
Choose the export format:
PFX
JKS
PEM
NOTE: JDK is required to support JKS file formats.
Use this option to quickly verify that a TLS certificate is present and active for a specific URL and port. This check confirms that the deployed certificate is being served correctly by the target endpoint. Scan results are displayed in the Logs window at the bottom of the screen.
Setting up renewal tasks in TLS Connect requires a Premium license. For more information on this feature, refer to the Automation page.
The ACME service in TLS Connect is available for GCC customers. It requires an Atlas certificate service; speak with your Account Manager for the details.
The ACME service automatically renews certificates every 55 days by default. You can view renewal status in ACME > Manage Renewals, where you may also manually renew a certificate at any time.
If you need to adjust the default renewal interval, you can do so by updating the simple-acme configuration.”
Navigate to the installation directory for the wacs simple-acme client and open the settings.json file in a text editor.
Update the value of the ScheduledTask > RenewalDays to the desired number of days.
Save and close the settings.json file.
The updated renewal interval is applied the next time the ACME renewal task runs.
Check your certificate installation for SSL issues and vulnerabilities.