← Back to TLSMCP Overview

Server Certificates That
Renew Themselves

Let's Encrypt, internal CAs, commercial providers — TLSMCP automates server certificate renewal, rotation, and monitoring across every service. No more cron jobs. No more 3am expiry pages. No more silent failures.

Any CA provider Zero-downtime rotation One policy, every service

Server Cert Renewal Is a Ticking Clock

Every server certificate has an expiry date. Miss it, and your service goes down. The question isn't if a renewal will fail — it's when.

Let's Encrypt Breaks Silently

Certbot configs drift. DNS validation lapses. Cron jobs fail without alerting. You discover the problem when customers can't reach your site — not before.

Every Service Is Different

Nginx uses one renewal method. Your internal Go service uses another. The legacy Java app has its own keystore. Consistency across environments is a myth.

Scaling Multiplies the Pain

3 services is manageable. 30 is fragile. 300 is a full-time job. Every new service adds another renewal to track, another config to maintain, another failure mode.

Rotation Means Downtime

Replacing a certificate often means restarting the service. Even a graceful reload can cause connection drops. Nobody wants to schedule that at scale.

No Single Pane of Glass

Certificates scattered across servers, load balancers, CDNs, and container orchestrators. Nobody knows the full picture until something expires.

Mixed Provider Chaos

Let's Encrypt for public endpoints, internal CA for microservices, commercial certs for compliance. Each has its own renewal flow, its own tooling, its own way of failing.

One Command. Every Server Cert.

TLSMCP monitors every server certificate in your fleet. When a cert approaches expiry, it renews automatically — regardless of provider. New certs are deployed with zero downtime using overlapping validity windows.

No per-service configuration. No provider-specific scripts. No cron jobs to forget. Define your policy once in Cyphers Hub; TLSMCP enforces it everywhere.

And because TLSMCP handles both server and client certificates, you manage the entire certificate landscape from one control plane. See the mTLS story →

# Check all server certs across fleet
$ tlsmcp certs status --type server
  api-gateway 23d remaining ✓ ok
  auth-service 2d remaining ⚠ renewing
  data-pipeline 41d remaining ✓ ok
  webhook-ingress 5d remaining ⚠ renewing
  mcp-server 67d remaining ✓ ok

# Auto-renewal kicks in
  auth-service:
   → Renewing with Let's Encrypt...
   ✓ Renewed (90d lifetime)
   → Deploying new cert...
   ✓ Zero-downtime rotation complete

  webhook-ingress:
   → Renewing with internal CA...
   ✓ Renewed (365d lifetime)
   ✓ Zero-downtime rotation complete

Works With Every CA You Use

TLSMCP doesn't care where your certificates come from. One renewal engine, one rotation policy, one monitoring dashboard — regardless of provider.

Let's Encrypt

ACME protocol automation with DNS and HTTP validation. No more certbot cron jobs. Handles wildcard certs and multi-domain SANs automatically.

Internal CA

Issue server certs from your own certificate authority for internal services. Full lifecycle management with custom validity periods and policy controls.

Commercial CAs

DigiCert, Sectigo, GlobalSign — TLSMCP handles the renewal workflow for commercial certificates that compliance requires. Same zero-downtime rotation.

Cloud Provider CAs

AWS ACM, Google-managed SSL, Azure Key Vault — TLSMCP can orchestrate alongside cloud-native certificate services for hybrid deployments.

ACME-Compatible

Any CA that supports the ACME protocol works out of the box. Zero custom integration. Point TLSMCP at the directory URL and go.

Mixed Environments

Run Let's Encrypt for public endpoints and internal CA for private services — from the same Cyphers Hub policy. One dashboard for everything.

A Server Cert Expires at 2am

Two scenarios. Same cert. Different outcomes.

Without TLSMCP
-30d

Renewal reminder email

Buried in someone's inbox. Tagged "deal with later."

-7d

Certbot renewal attempt

Fails silently — DNS validation TXT record is stale. No alert fires.

02:00

Certificate expires

Users see ERR_CERT_DATE_INVALID. PagerDuty fires. Someone gets woken up.

02:45

Manual intervention

SSH in. Debug certbot config. Manually run renewal. Restart nginx. Pray.

03:20

Service restored

80 minutes of downtime. Post-mortem tomorrow. Same thing happens again in 90 days.

With TLSMCP
-30d

TLSMCP flags upcoming expiry

Cert appears in Cyphers Hub dashboard. Renewal scheduled automatically.

-14d

Auto-renewal triggered

TLSMCP renews the cert via Let's Encrypt. Validates DNS automatically. New cert staged.

-14d

Zero-downtime rotation

New cert deployed with overlapping validity. Old cert still valid as fallback. No restart needed.

02:00

Old cert would have expired

Already replaced two weeks ago. Nobody notices. Nobody wakes up. Service runs as normal.

always

Continuous monitoring

Every cert in your fleet visible in one dashboard. Renewal health, expiry dates, provider status — all in Cyphers Hub.

What TLSMCP Automates for Server Certs

Pre-Expiry Renewal

Certs are renewed well before they expire — configurable from 7 to 60 days in advance. Never race against a deadline again.

Zero-Downtime Deploy

Overlapping validity windows mean the new cert is active before the old one expires. No service restarts. No connection drops.

Fleet Monitoring

Every server cert across every environment in one Cyphers Hub dashboard. Filter by provider, expiry window, service, or health status.

Failure Alerting

If a renewal fails — DNS issue, provider outage, validation error — TLSMCP alerts immediately and retries. No silent failures.

Audit Logging

Every renewal, rotation, and expiry event is logged with timestamp, provider, and outcome. Compliance-ready reporting out of the box.

Policy-Driven Config

Define renewal windows, preferred providers, and rotation strategy once in Cyphers Hub. Applied consistently to every server cert in your fleet.

Server Cert Questions, Answered

Does TLSMCP replace certbot?

Yes. TLSMCP handles the full ACME workflow that certbot does — domain validation, certificate issuance, renewal — plus zero-downtime deployment, fleet monitoring, and alerting. One tool for everything, not one tool per server.

What happens if a renewal fails?

TLSMCP retries automatically with exponential backoff. If the issue persists — DNS misconfiguration, provider outage — you get an immediate alert via webhook, email, or Cyphers Hub dashboard. Because renewal starts days before expiry, you have time to intervene.

Can I mix Let's Encrypt and commercial certs?

Absolutely. Assign different CA providers per service or per environment. Public-facing services on Let's Encrypt, compliance-sensitive endpoints on DigiCert, internal services on your own CA. TLSMCP manages all of them identically.

How does zero-downtime rotation work?

TLSMCP stages the new certificate alongside the existing one. The sidecar proxy starts serving the new cert to new connections while existing connections continue on the old cert. Once all old connections drain, the old cert is retired. No restart, no gap, no dropped connections.

Does this work with Kubernetes / Docker?

Yes. TLSMCP deploys as a sidecar container in Kubernetes pods or a companion container in Docker Compose. It manages server certs as Kubernetes secrets or mounted volumes — no changes to your application containers.

How does this affect my [cyphers] Score?

Automated server cert renewal directly improves your Lifecycle Hygiene and Revocation Configuration dimensions. No expired certs, no stale configs, no gaps in coverage. Learn more about the [cyphers] Score →

Stop Managing Server Certs.
Start Automating Them.

Add TLSMCP to your first service. Watch it handle the next renewal automatically. Free to start.