Ultimate Certificate Manager
Your PKI, one install away.
The self-hosted certificate authority with a modern web UI. Create, manage, discover, and automate your certificates — no YAML, no CLI expertise needed.
Choose your platform. One command, full PKI.
docker run -d --restart=unless-stopped \
--name ucm \
-p 8443:8443 \
-v ucm-data:/opt/ucm/data \
neyslim/ultimate-ca-manager:latest
Then open
https://localhost:8443
and log in with
admin /
changeme123
A complete certificate management platform, not just a CLI tool.
Build complete CA hierarchies. Root CAs and intermediate CAs with full chain management — all from the web UI.
Scan your network to find every certificate. Identify expiring, misconfigured, or unknown certs automatically.
Built-in ACME server compatible with certbot, Caddy, and any ACME client. Automate certificate issuance.
Define reusable certificate profiles with pre-set fields, key usages, and validity periods.
Protect your CA keys with PKCS#11 hardware security modules. SoftHSM included for testing.
4 roles — admin, operator, auditor, viewer. Tamper-evident audit logs with SHA-256 hash chains.
Industry-standard enrollment protocols (RFC 8894 & RFC 7030) for network devices and automated provisioning.
One package install on Debian, RHEL, or Docker. No Java, no application server, no complexity.
Contextual help panel on every page with guides, tips, and keyboard shortcuts. No need to leave the app.
Not just a CLI with a web wrapper. A real, modern interface — on desktop and mobile.
Manage your PKI from any device.
A complete PKI platform — from certificate authority to network discovery.
Create Root and Intermediate Certificate Authorities with full chain validation. Manage keys, CRLs, and OCSP responders from a single interface.
Issue, renew, revoke, and export certificates in PEM, DER, PKCS#12, and JKS formats. Track expiration with automated alerts and dashboard widgets.
Scan your network to find all TLS certificates in use. Identify unmanaged, expired, or soon-to-expire certificates across your infrastructure with SNI probing and SAN extraction.
Built-in ACME server (RFC 8555) for automated certificate issuance. Compatible with certbot, acme.sh, and any standard ACME client.
Enroll devices via SCEP (RFC 8894) and EST (RFC 7030). Ideal for network equipment, MDM, and IoT deployments.
Protect CA private keys with Hardware Security Modules via PKCS#11. Compatible with YubiHSM, SoftHSM, Thales Luna, and other PKCS#11 devices.
Four built-in roles — Admin, Operator, Auditor, Viewer — with granular permissions. Supports LDAP, mTLS, WebAuthn, and SSO authentication.
Tamper-evident audit trail with SHA-256 hash chains. Every action is logged with user, timestamp, IP, and integrity verification.
Install in under a minute with native DEB and RPM packages, or run as a Docker container. No Java, no Kubernetes, no external database required.
Full interface available in 9 languages: English, French, German, Spanish, Italian, Portuguese, Japanese, Chinese, and Ukrainian.
Define reusable certificate profiles with pre-configured subject fields, key usages, extensions, and validity periods for consistent issuance.
Licensed under GPLv3. Fully self-hosted, no vendor lock-in, no telemetry. Audit the code yourself on GitHub.