Skip to content

Web-based PKI Manager - Secure X.509 certificate lifecycle management with Cosmian KMS integration

License

Notifications You must be signed in to change notification settings

oriolrius/pki-manager-web

Repository files navigation

PKI Manager

A modern, web-based Public Key Infrastructure management application for securely generating, issuing, managing, and revoking X.509 digital certificates.

License Node pnpm

Overview

PKI Manager provides complete control over your Private Key Infrastructure without relying on external certificate authorities. Perfect for enterprises, home labs, and development environments that demand full control over their security infrastructure.

Key Highlights

  • Self-Hosted PKI: Create and manage your own root Certificate Authorities
  • Multi-Type Certificates: Server (TLS/SSL), Client Auth, S/MIME Email, Code Signing
  • Secure Key Management: Integration with Cosmian KMS for secure key storage
  • Bulk Operations: CSV-based bulk certificate creation and batch operations
  • OIDC Authentication: Provider-agnostic auth supporting Keycloak, Auth0, Okta, Azure AD
  • Modern UI: React 19 with light/dark theme support and responsive design
  • Type-Safe: End-to-end TypeScript with tRPC for API type safety

Screenshots

Dashboard

Monitor your PKI at a glance with real-time statistics and expiration tracking.

Dashboard Light Mode

Dashboard - Light Mode

Dashboard Dark Mode

Dashboard - Dark Mode

Certificate Authority Management

Create and manage self-signed root CAs with flexible configuration options.

CA List

Certificate Authorities List

Create CA

Create New CA

CA Details

CA Details View

CA Sample Data

Sample Data Generation

Certificate Management

Issue, manage, and revoke certificates with comprehensive control.

Certificates List

Certificates List with Filters

Issue Certificate

Issue New Certificate

Certificate with SANs

Subject Alternative Names (SANs)

Certificate Details

Certificate Details & Export

Bulk Operations

Efficient batch certificate creation and management.

Bulk Creation

Bulk Certificate Creation (CSV)

Bulk Selection

Bulk Operations (Download, Renew, Revoke)

Features

Certificate Authority Management

  • ✅ Create self-signed root Certificate Authorities
  • ✅ Configurable subject fields (CN, O, OU, C, ST, L)
  • ✅ Key algorithm selection (RSA-2048, RSA-4096)
  • ✅ Flexible validity periods (1-30 years)
  • ✅ CA revocation with reason tracking
  • ✅ Export in multiple formats (PEM, CRT, DER, CER)

Certificate Issuance & Management

  • Server Certificates - HTTPS/TLS for web servers and APIs
  • Client Certificates - Client authentication and mTLS
  • Email (S/MIME) - Email encryption and signing
  • Code Signing - Software and code signing
  • ✅ Subject Alternative Names (DNS, IP Address, Email)
  • ✅ Advanced key algorithms (RSA-2048/4096, ECDSA-P256/P384)
  • ✅ Certificate renewal with same parameters
  • ✅ Revocation with standard reasons (keyCompromise, superseded, etc.)
  • ✅ Comprehensive certificate details view

Export & Download

  • ✅ Multiple formats: PEM, CRT, DER, CER
  • ✅ Certificate chains (PEM Chain)
  • ✅ PKCS#7 (P7B)
  • ✅ PKCS#12 with private key (PFX, P12) - password protected
  • ✅ Java KeyStore (JKS)
  • ✅ Batch download (all formats as ZIP)
  • ✅ Security warnings for private key exports

Bulk Operations

  • ✅ CSV-based bulk certificate creation
  • ✅ Flexible field mapping with optional parameters
  • ✅ SAN auto-detection (email, IP, DNS)
  • ✅ Batch download multiple certificates
  • ✅ Bulk renewal for expiring certificates
  • ✅ Batch revocation with reason
  • ✅ Multi-select deletion

Monitoring & Alerts

  • ✅ Real-time dashboard with PKI statistics
  • ✅ Expiration tracking with visual indicators
  • ✅ "Expiring Soon" widget (configurable threshold)
  • ✅ Color-coded status badges (active, revoked, expired)
  • ✅ Automatic status updates based on validity periods

Search & Filtering

  • ✅ Search by Common Name or SAN
  • ✅ Filter by issuing CA (with persistence)
  • ✅ Filter by status (active/revoked/expired)
  • ✅ Filter by certificate type
  • ✅ Sortable tables with instant results

Security

  • ✅ Cosmian KMS integration for secure key storage
  • ✅ Private keys never stored unencrypted locally
  • ✅ Password-protected private key exports
  • ✅ Audit logging for all operations
  • ✅ Revocation tracking with detailed reasons
  • ✅ Secure key pair generation (RSA, ECDSA)

Authentication

  • ✅ OpenID Connect (OIDC) authentication
  • ✅ Provider-agnostic (Keycloak, Auth0, Okta, Azure AD)
  • ✅ Authorization Code Flow with PKCE
  • ✅ Role-based access control (admin/user roles)
  • ✅ JWT validation via JWKS
  • ✅ Silent token renewal

User Experience

  • ✅ Modern, responsive UI with card-based layout
  • ✅ Light/Dark theme with system detection
  • ✅ Sample data generators for quick testing
  • ✅ Form validation with helpful error messages
  • ✅ Contextual action buttons
  • ✅ Real-time status updates

Architecture

This is a monorepo project with two main packages:

pki-manager/
├── backend/          # Node.js/Fastify API server
├── frontend/         # React 19 SPA
├── assets/           # Screenshots and images
└── tests/            # E2E screenshot tests

Technology Stack

Backend

  • Framework: Fastify 5.2 (high-performance HTTP server)
  • API Layer: tRPC v11 (end-to-end type safety)
  • Database: SQLite with better-sqlite3 (embedded, portable)
  • ORM: Drizzle ORM 0.36 (type-safe SQL)
  • Validation: Zod 3.24 (schema validation)
  • KMS: Cosmian KMS (secure key management)
  • Testing: Vitest 2.1
  • Runtime: Node.js 20+

Frontend

  • Framework: React 19.2
  • Routing: TanStack Router 1.133 (file-based, type-safe)
  • State Management: TanStack Query 5.90 (server state)
  • API Client: tRPC 11.0 (type-safe RPC)
  • Styling: Tailwind CSS 4.1 (utility-first)
  • UI Components: shadcn/ui (Radix UI primitives)
  • Icons: Lucide React, FontAwesome
  • Build Tool: Vite 7.1

Testing

  • E2E: Playwright 1.56 (screenshot automation)

Quick Start

# 1. Start Cosmian KMS
cd kms && docker compose up -d

# 2. Start Keycloak (for authentication)
cd keycloak && docker compose up -d

# 3. Install dependencies
pnpm install

# 4. Configure and run
cp backend/.env.example backend/.env
cp frontend/.env.example frontend/.env
cd backend && pnpm db:migrate
pnpm dev  # from root

Test Users: Login with admin/admin or user/user

For detailed setup, see DEVELOPMENT.md and Authentication Guide.

Common Use Cases

Enterprise

  • Internal CA hierarchy for corporate networks
  • Employee certificates for VPN/Wi-Fi
  • S/MIME email encryption
  • Code signing for software distribution

Development

  • Local HTTPS certificates for development
  • API authentication testing
  • Microservices mTLS
  • Container certificate management

Home Lab

  • Secure internal services (Proxmox, TrueNAS)
  • Home automation HTTPS
  • Private VPN server certificates
  • IoT device authentication

API Documentation

The application uses tRPC for type-safe API communication. Key endpoints:

Dashboard

  • dashboard.stats - Get PKI statistics
  • dashboard.expiringSoon - Get expiring CAs/certificates

Certificate Authorities

  • ca.list - List all CAs
  • ca.getById - Get CA details
  • ca.create - Create new CA
  • ca.revoke - Revoke CA
  • ca.delete - Delete CA
  • ca.download - Download CA certificate

Certificates

  • certificate.list - List certificates (with filters)
  • certificate.getById - Get certificate details
  • certificate.issue - Issue new certificate
  • certificate.bulkIssue - Bulk certificate creation
  • certificate.renew - Renew certificate
  • certificate.revoke - Revoke certificate
  • certificate.delete - Delete certificate
  • certificate.download - Download certificate

All endpoints are fully type-safe with automatic TypeScript inference.

Security Considerations

  • Private keys are stored securely in Cosmian KMS
  • Password-protect all private key exports
  • Regularly monitor certificate expiration
  • Use strong key algorithms (RSA-4096 or ECDSA-P384 for sensitive use cases)
  • Revoke compromised certificates immediately
  • Backup your database regularly
  • Secure access to the KMS endpoint
  • Use HTTPS in production

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

License

This project is licensed under the Apache License 2.0 - see the LICENSE file for details.

Additional Resources


Built with ❤️ using modern web technologies