Identify existing certificates, their validity, and hosting locations (servers or network devices).
Ensure certificates have valid relationships with Configuration Items (CIs) for ownership and support details.
Join the #BuildWithBuildAgent Challenge! Get recognized, earn exclusive swag, and inspire the ServiceNow Community with what you can build using Build Agent. Join the Challenge.
3 weeks ago
In this article, I share my experience configuring the Certificate Inventory Management (CIM) module in ServiceNow, the challenges faced during discovery, and practical approaches that worked. If you’re planning to implement CIM, these insights will help you anticipate potential hurdles and plan effectively.
CIM, part of the ITOM suite, helps organizations manage the inventory and lifecycle of TLS/SSL certificates. Expired certificates often lead to unexpected outages, and manual tracking is both time-consuming and error prone. CIM provides:
To establish a complete CIM process, we need to ingest the existing certificate inventory to ServiceNow with all the required details and relationship.
Certificate Discovery
Impact Analysis
There were several approaches to discover certificates.
We started with Port scan approach by enabling TLS/SSL port probe which automatically started to capture TLS certificates in the next horizontal discovery schedules.
Certificates discovered were stored in the Unique Certificate "cmdb_ci_certificate" table, with relationships to hosting CIs maintained in CMDB. The relationship information is stored in "cmdb_rel_ci" table with Used by::Uses type of relation.
Incomplete Discovery
SSLHandshakeException: Non-compatible TLS protocol (e.g., TLS10 vs TLS12)IOException: Connection forcibly closedSSLException: Unrecognized SSL messageWe have to spent time analyzing ECC queue logs for root causes.
CI Discovery Issues
So, we were not able to achieve 100% discovery with this approach.
Below Alternate Methods were tried:
cmdb_ci_endpoint_http table, but results were inconsistent in this approach too.We adopted a hybrid approach:
Conclusion
I hope these insights and challenges help those planning to implement Certificate Inventory Management (CIM) in ServiceNow. Understanding these details upfront will allow you to assess potential roadblocks and design a more effective implementation strategy.
Feel free to share your experiences, lessons learned, or success stories with CIM in the comments. I would love to hear how others approached this journey!
Hi,
thanks for sharing your article — I’m currently working on the same topic, so this was genuinely interesting to read. I do have two pieces of feedback:
1. Visualization of the discovery approaches
The graphic comparing the different discovery methods is difficult to interpret in its current form. The internal ServiceNow discovery process visually dominates roughly two-thirds of the space, which unintentionally shifts the focus away from the actual comparison of the approaches. A more balanced layout, with clearer emphasis on the discovery variants themselves, would make the message clearer and easier to grasp.
2. Missing KPIs and measurable outcomes
In the section describing your final approach, I was expecting some concrete metrics. For example:
Adding these numbers would provide valuable context for readers who are trying to evaluate or replicate the approach.
Cheers,
Dennis
Thank you for your response. Regarding several approaches available for TLS certificate discovery, ServiceNow documents and Learning university has details about how to configure each method. I will also share detailed explanation about each method and differences shortly.
Secondly, we started with the goal of ensuring the certificates are renewed on time with automated reminder notifications to owners. unfortunately, with these challenges that I mentioned in my article and CMDB data dependencies, it was not achievable with 100% automation. So, we had to plan automation + manual approach. We are still in the process of realizing its value.