Video Blog
In our Video Blog, we provide comprehensive insight into the key features and applications of our Managed PKI and Certificate Lifecycle Manager (CLM) solution. In the short videos listed below, we explain the many possibilities step by step and show you how to harness the full potential of our 360° Managed PKI and CLM solution.
Quick Introduction to the CLM Dashboard
The dashboard in MTG’s CLM offers full transparency. Here, all relevant information comes together. In this brief introduction, we give you an overview of how to efficiently monitor, analyze, and control the corresponding processes with just a few clicks. Fast and seamless workflows are ensured with modern and easy navigation.
Our videos not only provide an informative overview but also engage with practical examples. They are aimed at both beginners and experienced users who want to deepen their knowledge. Discover how easy and effective modern certificate management can be!
Policy Settings
Policies are essential for standardizing the certificate process and minimizing risks.
In this video, we provide insights into the configuration of key policies and explain how to adapt them to your needs. Learn, for example, how to optimize certificate issuance policies. With a policy in place, you can quickly and accurately create certificates. MTG CLM supports a wide range of trusted internal and public Certificate Authorities (CAs).
Creating Certificates in 4-Steps
Creating certificates doesn’t have to be complicated. In this video, we walk you through the user-friendly 4-step process that lets you generate certificates quickly and securely. Whether for internal applications or digital signatures, we show you how it’s done. It’s also easy to import external certificates, such as network device certificates.
Role and Rights Management Made Easy
Our platform enables you to precisely and securely control user roles and rights. In our video, which focuses on user management and detailed permission settings, we show you how to assign and manage roles efficiently, ensuring the security of your certificate management. Learn how to use our detailed configuration options with central roles and rights management.