Integration with ZeroSSL21 minutes to read
Password Manager Pro facilitates integration with ZeroSSL — the certificate authority (CA) that uses the Automatic Certificate Management Environment (ACME) protocol to provide secure SSL certificates free of cost. This integration helps you achieve an end-to-end life cycle management of ZeroSSL certificates installed on your domains from a single interface. This document discusses the steps you should follow to establish a connection with your ZeroSSL account, acquire, deploy, renew and perform all certificate management related operations from Password Manager Pro. Before you proceed with the integration, complete the following step as a prerequisite:
Follow the step-by-step procedure below to integrate ZeroSSL with Password Manager Pro:
1. Create a ZeroSSL AccountTo begin the process of requesting SSL certificates from ZeroSSL, you must create an account. This is a one-time process and can be done directly from the Password Manager Pro interface.
Once your account is created, you can update the account email address, delete it from Password Manager Pro, or deactivate the account entirely. Please note that deleting the account only removes it from Password Manager Pro. Even if you delete the account here, it will still be active in the ZeroSSL portal. To add the same account back to Password Manager Pro, export the key and use the Add Account option with the same details used before. However, if you select the Deactivate option while deleting the account, then the ZeroSSL account will be removed completely and you cannot add it back to Password Manager Pro with the same details.
2. Raise a Certificate RequestOnce your ZeroSSL account is registered, you can proceed with raising certificate requests to the CA. To complete a certificate request, you will be presented with a challenge verification to fulfill in order to validate your domain and issue the certificate you have requested.
Note: Password Manager Pro supports wildcard certificate requests for DNS based challenges. For wildcard certificate requests, enter the common name in the format *.domainname.com To configure your DNS account, follow the below steps:
![]() 2.1 Azure DNS
2.2 Cloudflare DNS
2.3 AWS Route 53 DNSGenerate and specify the Access Key ID and Secret associated with your AWS account. If you do not have an AWS account, create one and generate the Access Key ID and Secret by following the steps given below:
To grant the required permissions:
2.4 RFC2136 DNS UpdateIf you are using open source DNS servers such as Bind, PowerDNS etc., that support RFC2136 DNS update, follow the steps below to automate DNS-based domain control validation procedure using Password Manager Pro.
2.5 GoDaddy DNSIf you are using GoDaddy DNS for DNS validation, follow the steps below to automate DNS-based domain control validation procedure using Password Manager Pro: Steps to Obtain GoDaddy API Credentials:
Now, in Password Manager Pro interface, follow the below steps to add GoDaddy DNS to ZeroSSL CA:
2.6 ClouDNS If you are using ClouDNS for DNS validation, follow the steps below to automate the DNS-based domain control validation procedure using Password Manager Pro:
Now, in the Password Manager Pro interface, follow the below steps to add ClouDNS to ZeroSSL CA:
3. ZeroSSL Challenge VerificationPassword Manager Pro expedites domain validation through automatic verification of HTTP-01 and DNS-01 challenges (currently Azure, Cloudflare, Amazon Route 53, RFC2136 DNS update, GoDaddy DNS, ClouDNS). For the automation to take effect, you have to initially map the end-server details to Password Manager Pro, which is a one-time process.
| |