Skip to main content
[cyphrs] Hub

One control plane. Every certificate.

Internal and external. Server and client. Every environment, every endpoint, every renewal window – visible from one dashboard. Filter by trust domain, by profile, by expiry window, by health. The view you've never had across your entire certificate estate, and the starting point for taking control of Trust.

01 // Discover

You can't control what you can't see.

Before you can apply the right trust model, you need to see what's actually out there. Certificates scattered across cloud providers, on-prem servers, Kubernetes clusters, edge nodes, SaaS integrations – issued by different teams, at different times, with different expiry windows. Most organisations discover certificates when they expire. [cyphrs] Hub starts with discovery.

[cyphrs] Scout

[cyphrs] Hub's discovery engine scans your entire TLS estate from the inside – every endpoint, every certificate, every configuration.

Certificate Inventory

Every certificate across every environment. Issuer, expiry, key strength, SAN coverage. The complete picture you've never had.

TLS Vulnerabilities

Protocol weaknesses, cipher misconfigurations, missing revocation checks. Scout doesn't just find certificates – it finds the risks attached to them.

Trust Model Misalignment

Internal services running on public certificates. Systems paying the 47-day renewal tax for trust they don't need. Services that should authenticate to each other but can't – because public CAs don't issue client certificates. The insights that change your architecture.

All discovery data stays on your infrastructure. No SaaS dependency, no cloud callbacks, no data leaving your perimeter.
[cyphrs] Hub runs on-premises – your scan results, your certificate inventory, your Score data. Yours.

[cyphrs] Score

[cyphrs] Scout scans. [cyphrs] Score quantifies. Every endpoint receives a single graded assessment of its TLS posture – configuration strength, certificate health, trust model alignment. One number that tells you where you stand and where to focus first.

[cyphrs] Score badge showing a 98 Exceptional TLS posture rating validated by Scout
0–49 Vulnerable
50–84 Adequate
85–100 Hardened
95–100 Exceptional

Score. Remediate. Rescan.

Findings are scored. Every finding has a fix. Every fix gets verified.
Your Score is updated.

1
Score

Deep TLS scan – protocol, ciphers, chain, vulnerabilities. Get your 0–100 baseline.

2
Remediate

Actionable fixes for every finding – cipher config, protocol version, chain issues. Not just what's wrong, but how to fix it.

3
Rescan & Prove

Verify the fix landed. Watch the score climb. Continuous – not a one-off audit.

02 // Adopt

Not every certificate needs the same trust.

To bring those certificates under [cyphrs] governance, Scout goes from observer to agent – deployed to your endpoints, collecting the detail needed to classify and adopt every certificate under the right trust model.

Each certificate gets assigned a trust model – internal or external – based on what it's protecting, where it lives, and who needs to trust it. Hub recommends. You decide. Once classified, the certificate moves to managed and the right renewal engine takes over.

Discovered certificates
hub classifies · you approve
Internal
.internal · .local · .svc · RFC 1918
External
.com · .net · .co.uk · .org · .io
[cyphrs] Trust CA

Systems that don't need browser trust. Internal APIs, microservices, Kubernetes workloads, RFC 1918 ranges, .local and .internal domains. Your CA, your policies, your certificate lifetimes – and the ability to issue client certificates that public CAs simply don't offer. Scout deploys as the Trust CA client – generating CSRs, receiving signed certificates, managing deployment to the endpoint.

[cyphrs] ACME ARI

Systems that genuinely need public validation. Browser-facing domains, public APIs, customer-facing services. Renewal timed by the CA's own signal, not a hardcoded threshold. Scout deploys as the ACME client – handling challenges, generating CSRs, deploying certificates with zero downtime.

What governance looks like
Internal – [cyphrs]™ Trust CA
Identity
Environ.
Validity
Agent
Production
90d
Agent
Staging
180d
Service
Production
365d
User
Production
90d
Emergency
Break-glass
5–10d
External – ACME ARI / Let's Encrypt
Identity
Environ.
Validity
Server
Production
47d
Wildcard
Production
47d
SaaS
Production
47d

Every certificate now has a trust model and a policy. Scout is deployed. The lifecycle begins.

03 // Manage

The lifecycle runs. You stay in control.

Every certificate now has a trust model, a policy, and a [cyphrs] Scout agent managing it at the endpoint. From here, [cyphrs] Hub runs the lifecycle – issuance, renewal, deployment, revocation – across both trust domains from one control plane. Three engines. One view.

[cyphrs] Trust CA

Your authority. Your rules.

A private certificate authority deployed on your infrastructure. Issue server and client certificates for internal systems with policy-driven validation – no external dependency, no public CA constraints, no 47-day renewal cycles for services that never touch a browser. You define the certificate profiles. You control the lifetimes. You own the root of trust.

Policy-driven issuance

Certificate profiles enforce consistent governance. Lifetime, key type, SAN constraints – defined once, applied everywhere.

Revocation in seconds

In-memory revocation list with built-in OCSP responder. A compromised certificate is revoked and enforced immediately, not after a propagation delay.

Controlled lifetimes

Internal certificates live as long as they need to. 90 days for agents, 365 for services, 5-day break-glass for emergencies. Your policy, not the browser ecosystem's.

Complete audit trail

Every issuance, renewal, and revocation event recorded. Immutable log. Compliance-ready without the compliance overhead.

[cyphrs] ACME ARI

Public trust. Automated properly.

Some certificates genuinely need public validation. Browser-facing domains, public APIs, customer-facing services – these stay on public CAs. But renewal doesn't have to be a cron job and a prayer. ACME ARI lets the CA signal the optimal renewal window for each certificate. Hub listens. Scout executes. Certificates deploy before the old ones expire.

api.internal.acme.io:443
↻ in 11d
Key Locality CA-selected renewal Agent-generated CSR
ACME Renewal Information (ARI)
Timing source CA-suggested
ARI window in 8d in 14d
Selected renewal in 11d
Next ARI poll in 5h 42m
ARI Status
Last ARI check 18m ago
Explanation
supported Open CA guidance
Renewal History
Last renewal 2026-03-22 (3d ago)
Method DNS-01 (ACME)
Initiated by lifecycle_manager
Status
Verified
ARI replaced Reported to CA
Previous renewals 4 total · 0 failed
CA-signalled renewal

The CA tells Hub when to renew – not a hardcoded threshold. Parametric renewal windows proportional to certificate lifetime. The right timing, every time.

Zero-downtime deployment

New certificates are generated, validated, and deployed before the existing certificate expires. No gap. No manual intervention.

Incident-aware alerting

Renewal starts days or weeks in advance. If it fails, escalating retries begin immediately. Silent expiry doesn't happen.

Multi-CA support

Let's Encrypt, ZeroSSL, any ACME-compatible CA. Hub manages the relationship. You choose the provider.

[cyphrs] mTLS

The authentication layer public CAs can't provide.

Public CAs issue server certificates. They prove your website is who it claims to be. But they don't issue client certificates – and never have. If you want mutual authentication, where services prove their identity to each other, you need your own certificate authority. There is no public alternative.

That's why most teams never implement mTLS. Not because it's the wrong architecture – every security framework recommends it – but because the infrastructure to issue client certificates has been out of reach. [cyphrs] Hub's Trust CA changes that. Every service, every workload, every machine gets a certificate-based identity. The service calling your API proves it's authorised to be there. mTLS in hours, not the months it takes with traditional PKI.

How it works
Service A
Server + Client cert
mTLS
Service B
Server + Client cert
Both issued by [cyphrs] Trust CA – mutual trust without external dependencies
Client certificate issuance

Public CAs don't offer this. Hub's Trust CA issues client certificates with the same policy-driven governance as server certificates. Scoped identity for every service and workload.

Automatic rotation

Client certificates follow the same lifecycle as server certificates. Scout manages renewal at the endpoint. No manual distribution, no expired credentials, no authentication gaps.

Zero-trust foundation

mTLS is the infrastructure layer that makes zero-trust real. Not a policy document – an enforced authentication boundary at every service. Only possible when you own the CA.

mTLS gives services their identity. A2A gives agents theirs. Both require client certificates. Both require your own CA. See A2A Agent Identity →

Three engines, one control plane. Here's how it fits together.

Compliance by architecture, not by afterthought.

[cyphrs] Hub is deployed on your infrastructure, governed by your policies, and audited by your logs. Data sovereignty isn't a configuration option – it's the deployment model. Every architectural decision described above was made with regulatory requirements in mind.

Healthcare

HIPAA requires access controls, audit trails, and encryption for systems handling protected health information. Hub's certificate-based authentication, immutable audit logging, and on-premises deployment satisfy these requirements without additional compliance tooling. Mutual TLS with client certificates provides the service-level access control HIPAA demands – authentication that public CAs cannot deliver.

Financial Services

PCI DSS and SOX mandate encryption of data in transit, strong key management, and comprehensive audit trails. Hub's two-tier PKI, FIPS 140-3 validated cryptography, and policy-driven certificate governance align with these frameworks.

Government

FedRAMP and NIST 800-53 require validated cryptographic modules, controlled key management, and complete data sovereignty. Hub runs entirely within your perimeter with FIPS 140-3 approved algorithms and no external dependencies.

FIPS 140-3 validated · On-premises deployment · Complete data sovereignty · No SaaS dependency · Immutable audit trail

[cyphrs] Hub

The control plane. Everything below lives inside it.

Discover
[cyphrs] Scout
Hub-based TLS probe
[cyphrs] Score
TLS posture assessment
Adopt
[cyphrs] Scout
Deployed to endpoints
Remediation
Fix vulnerabilities
Classification
Internal / External
Manage
[cyphrs]
Trust CA
[cyphrs]
ACME ARI
[cyphrs]
mTLS
Client certificate issuance
[cyphrs]
A2A
Coming Q2 2026

AI agents need [identity] certificates too.

A2A agent-to-agent authentication flow with [cyphrs] Hub issuing identity certificates

A2A: Machine identity for autonomous agents.

Agent-to-Agent (A2A) communication is becoming infrastructure. Like service-to-service mTLS, A2A authentication requires client certificates – certificates that public CAs don't issue. Autonomous agents call APIs, access services, and act on behalf of systems – they need certificate-based identity that can be issued, scoped, rotated, and revoked. [cyphrs] Hub's Trust CA is the natural foundation for A2A agent identity. The same infrastructure that governs your services will govern your agents.

A2A scoped identity

Each agent gets a certificate with precise scope – which services it can call, what actions it can take, how long the credential lives.

A2A lifecycle management

Agent certificates follow the same issuance, renewal, and revocation model as every other certificate in Hub. No special tooling.

A2A audit trail

Every agent credential issuance and revocation recorded. Who deployed the agent, when, and what it was authorised to do.

Q2 2026

See what's out there.

Discovery requires zero infrastructure. No agents, no DNS changes, no commitment. Start with a scan and see where your certificates stand.