cert-manager with CryptoHub through CryptoHub’s API and Futurex’s issuer controller.
About Kubernetes
According to Kubernetes overview:For a detailed review of the Kubernetes (K8s) components and structure, refer to the officalKubernetes documentation.
What is CryptoHub?
Futurex’s CryptoHub is the most flexible and versatile cryptographic platform in the industry, combining every cryptographic function within Futurex’s extensive solution suite. It enables organizations to deploy, manage, and monitor virtual cryptographic modules — including HSM emulators, certificate authorities (CAs), key generation services, and PKI workflows — all through a unified web-based dashboard. CryptoHub can be operated via its intuitive GUI to:- Issue and revoke X.509 certificates
- Manage root and intermediate CAs
- Enforce key usage policies (e.g., Sign/Verify, Key Encipherment)
- Integrate with external systems (e.g., Kubernetes, PKI APIs, CI/CD pipelines)
What is Kubernetes cert-manager?
cert-manager is a popular native Kubernetes tool designed to automate the management and issuance of TLS (Transport Layer Security) certificates within the cluster. It ensures that certificates are valid and up-to-date, and attempts to renew them at a configured time before expiration.
In a Kubernetes environment, applications often need TLS certificates to secure communication, such as between microservices or for inbound/outbound traffic. Manually managing these certificates across many services can be complex and error-prone.
cert-manager simplifies this by:
- Issuing Certificates: It can acquire certificates from various sources, known as Issuers or ClusterIssuers (like Futurex CryptoHub in this guide), including self-signed CAs, and external CAs.
- Managing the Lifecycle: It automatically handles the certificate signing request (CSR) process and stores the resulting certificate and private key in a standard Kubernetes object called a
Secret. A KubernetesSecretis an object that stores sensitive data such as password, OAuth tokens, or APIs keys. - Automating Renewal: It monitors issued certificates and triggers a renewal request automatically before they expire, ensuring uninterrupted secure service.
cert-manager provides the native Kubernetes API and control loop that allows users to request certificates using standard Kubernetes manifests (YAML), abstracting away the specifics of the actual CA that performs the signing.
How CryptoHub works with Kubernetes
In this deployment, Kubernetes serves as the orchestration layer for critical security and certificate management services. The integration follows this workflow:- An application team creates a
Certificateresource in Kubernetes (YAML) requesting a TLS certificate (e.g., example.com). cert-managerdetects the request and creates aCertificateRequestresource.- Futurex’s
issuer-controllerreceives the request and sends it to CryptoHub through its REST API. - CryptoHub registers the request as pending approval.
- An authorized approver logs into CryptoHub, reviews request details (issuer, subject, validity, purpose), and manually approves or denies the request.
- If approved, CryptoHub signs the certificate and returns it to the controller.
- The controller then stores the signed certificate in a Kubernetes
Secret. - The application pod mounts the
Secretand uses the certificate for TLS.

