A modern, web-based Public Key Infrastructure management application for securely generating, issuing, managing, and revoking X.509 digital certificates.
PKI Manager provides complete control over your Private Key Infrastructure without relying on external certificate authorities. Perfect for enterprises, home labs, and development environments that demand full control over their security infrastructure.
- Self-Hosted PKI: Create and manage your own root Certificate Authorities
- Multi-Type Certificates: Server (TLS/SSL), Client Auth, S/MIME Email, Code Signing
- Secure Key Management: Integration with Cosmian KMS for secure key storage
- Bulk Operations: CSV-based bulk certificate creation and batch operations
- OIDC Authentication: Provider-agnostic auth supporting Keycloak, Auth0, Okta, Azure AD
- Modern UI: React 19 with light/dark theme support and responsive design
- Type-Safe: End-to-end TypeScript with tRPC for API type safety
Monitor your PKI at a glance with real-time statistics and expiration tracking.
Dashboard - Light Mode |
Dashboard - Dark Mode |
Create and manage self-signed root CAs with flexible configuration options.
Certificate Authorities List |
Create New CA |
CA Details View |
Sample Data Generation |
Issue, manage, and revoke certificates with comprehensive control.
Certificates List with Filters |
Issue New Certificate |
Subject Alternative Names (SANs) |
Certificate Details & Export |
Efficient batch certificate creation and management.
Bulk Certificate Creation (CSV) |
Bulk Operations (Download, Renew, Revoke) |
- ✅ Create self-signed root Certificate Authorities
- ✅ Configurable subject fields (CN, O, OU, C, ST, L)
- ✅ Key algorithm selection (RSA-2048, RSA-4096)
- ✅ Flexible validity periods (1-30 years)
- ✅ CA revocation with reason tracking
- ✅ Export in multiple formats (PEM, CRT, DER, CER)
- ✅ Server Certificates - HTTPS/TLS for web servers and APIs
- ✅ Client Certificates - Client authentication and mTLS
- ✅ Email (S/MIME) - Email encryption and signing
- ✅ Code Signing - Software and code signing
- ✅ Subject Alternative Names (DNS, IP Address, Email)
- ✅ Advanced key algorithms (RSA-2048/4096, ECDSA-P256/P384)
- ✅ Certificate renewal with same parameters
- ✅ Revocation with standard reasons (keyCompromise, superseded, etc.)
- ✅ Comprehensive certificate details view
- ✅ Multiple formats: PEM, CRT, DER, CER
- ✅ Certificate chains (PEM Chain)
- ✅ PKCS#7 (P7B)
- ✅ PKCS#12 with private key (PFX, P12) - password protected
- ✅ Java KeyStore (JKS)
- ✅ Batch download (all formats as ZIP)
- ✅ Security warnings for private key exports
- ✅ CSV-based bulk certificate creation
- ✅ Flexible field mapping with optional parameters
- ✅ SAN auto-detection (email, IP, DNS)
- ✅ Batch download multiple certificates
- ✅ Bulk renewal for expiring certificates
- ✅ Batch revocation with reason
- ✅ Multi-select deletion
- ✅ Real-time dashboard with PKI statistics
- ✅ Expiration tracking with visual indicators
- ✅ "Expiring Soon" widget (configurable threshold)
- ✅ Color-coded status badges (active, revoked, expired)
- ✅ Automatic status updates based on validity periods
- ✅ Search by Common Name or SAN
- ✅ Filter by issuing CA (with persistence)
- ✅ Filter by status (active/revoked/expired)
- ✅ Filter by certificate type
- ✅ Sortable tables with instant results
- ✅ Cosmian KMS integration for secure key storage
- ✅ Private keys never stored unencrypted locally
- ✅ Password-protected private key exports
- ✅ Audit logging for all operations
- ✅ Revocation tracking with detailed reasons
- ✅ Secure key pair generation (RSA, ECDSA)
- ✅ OpenID Connect (OIDC) authentication
- ✅ Provider-agnostic (Keycloak, Auth0, Okta, Azure AD)
- ✅ Authorization Code Flow with PKCE
- ✅ Role-based access control (admin/user roles)
- ✅ JWT validation via JWKS
- ✅ Silent token renewal
- ✅ Modern, responsive UI with card-based layout
- ✅ Light/Dark theme with system detection
- ✅ Sample data generators for quick testing
- ✅ Form validation with helpful error messages
- ✅ Contextual action buttons
- ✅ Real-time status updates
This is a monorepo project with two main packages:
pki-manager/
├── backend/ # Node.js/Fastify API server
├── frontend/ # React 19 SPA
├── assets/ # Screenshots and images
└── tests/ # E2E screenshot tests
- Framework: Fastify 5.2 (high-performance HTTP server)
- API Layer: tRPC v11 (end-to-end type safety)
- Database: SQLite with better-sqlite3 (embedded, portable)
- ORM: Drizzle ORM 0.36 (type-safe SQL)
- Validation: Zod 3.24 (schema validation)
- KMS: Cosmian KMS (secure key management)
- Testing: Vitest 2.1
- Runtime: Node.js 20+
- Framework: React 19.2
- Routing: TanStack Router 1.133 (file-based, type-safe)
- State Management: TanStack Query 5.90 (server state)
- API Client: tRPC 11.0 (type-safe RPC)
- Styling: Tailwind CSS 4.1 (utility-first)
- UI Components: shadcn/ui (Radix UI primitives)
- Icons: Lucide React, FontAwesome
- Build Tool: Vite 7.1
- E2E: Playwright 1.56 (screenshot automation)
# 1. Start Cosmian KMS
cd kms && docker compose up -d
# 2. Start Keycloak (for authentication)
cd keycloak && docker compose up -d
# 3. Install dependencies
pnpm install
# 4. Configure and run
cp backend/.env.example backend/.env
cp frontend/.env.example frontend/.env
cd backend && pnpm db:migrate
pnpm dev # from root- Frontend: http://localhost:5173
- Backend API: http://localhost:3000
- Cosmian KMS: http://localhost:42998
- Keycloak: http://localhost:42997 (admin/admin)
Test Users: Login with admin/admin or user/user
For detailed setup, see DEVELOPMENT.md and Authentication Guide.
- Internal CA hierarchy for corporate networks
- Employee certificates for VPN/Wi-Fi
- S/MIME email encryption
- Code signing for software distribution
- Local HTTPS certificates for development
- API authentication testing
- Microservices mTLS
- Container certificate management
- Secure internal services (Proxmox, TrueNAS)
- Home automation HTTPS
- Private VPN server certificates
- IoT device authentication
The application uses tRPC for type-safe API communication. Key endpoints:
dashboard.stats- Get PKI statisticsdashboard.expiringSoon- Get expiring CAs/certificates
ca.list- List all CAsca.getById- Get CA detailsca.create- Create new CAca.revoke- Revoke CAca.delete- Delete CAca.download- Download CA certificate
certificate.list- List certificates (with filters)certificate.getById- Get certificate detailscertificate.issue- Issue new certificatecertificate.bulkIssue- Bulk certificate creationcertificate.renew- Renew certificatecertificate.revoke- Revoke certificatecertificate.delete- Delete certificatecertificate.download- Download certificate
All endpoints are fully type-safe with automatic TypeScript inference.
- Private keys are stored securely in Cosmian KMS
- Password-protect all private key exports
- Regularly monitor certificate expiration
- Use strong key algorithms (RSA-4096 or ECDSA-P384 for sensitive use cases)
- Revoke compromised certificates immediately
- Backup your database regularly
- Secure access to the KMS endpoint
- Use HTTPS in production
Contributions are welcome! Please feel free to submit a Pull Request.
This project is licensed under the Apache License 2.0 - see the LICENSE file for details.
- Development Guide - Setup, scripts, and development workflow
- Authentication Guide - OIDC setup and provider configuration
- Keycloak Setup - Local Keycloak development environment
- Features Documentation - Detailed feature documentation
- Cosmian KMS Documentation
- X.509 Certificate Standard (RFC 5280)
- PKCS Standards
Built with ❤️ using modern web technologies











