Keyfactor Command

Best Self Hosted Alternatives to Keyfactor Command

A curated collection of the 5 best self hosted alternatives to Keyfactor Command.

Cloud-based PKI and machine identity automation platform that issues, inventories, monitors, and automates lifecycle management of digital certificates and keys across enterprise and multi-cloud environments, providing centralized governance, discovery, and renewal automation.

Alternatives List

#1
Infisical

Infisical

Infisical is an open-source platform to manage and deliver app secrets, certificates (PKI), SSH credentials, and encryption keys across teams and infrastructure.

Infisical screenshot

Infisical is an open-source security platform for centrally managing application secrets and configuration, internal and external PKI certificates, and privileged access workflows. It helps teams reduce credential sprawl by securely delivering, rotating, and auditing sensitive values across environments and infrastructure.

Key Features

  • Secrets management across projects and environments with web UI, CLI, SDKs, and API
  • Dynamic secrets and scheduled secret rotation for supported backends
  • Secret syncs and delivery options for CI/CD, cloud platforms, and Kubernetes workloads
  • Secret scanning and leak prevention tooling to catch exposed credentials
  • Built-in PKI with private CA hierarchy, certificate issuance, renewal, and revocation
  • ACME-based certificate enrollment and certificate lifecycle governance policies
  • SSH certificate issuance for short-lived, centralized infrastructure access
  • Key Management System (KMS) for encrypt/decrypt workflows and key governance
  • Role-based access controls, approvals, temporary access, and audit logs

Use Cases

  • Centralize and distribute application secrets to developers, CI pipelines, and runtime environments
  • Run an internal CA and manage X.509 certificates for services, devices, and apps
  • Replace long-lived infrastructure credentials with short-lived SSH certificates and dynamic secrets

Limitations and Considerations

  • Some premium/enterprise functionality is separated into an enterprise directory and may require a commercial license

Infisical is well-suited for organizations that need a modern developer experience for secrets and PKI while maintaining strong governance through access controls and auditing. It can serve as a unified layer for managing credentials and certificates across diverse stacks and deployment environments.

24.5kstars
1.7kforks
#2
step-ca

step-ca

step-ca is a private CA and ACME server for issuing and automating X.509 TLS and SSH certificates, enabling short-lived credentials and secure enrollment for teams.

step-ca screenshot

step-ca is an online private certificate authority for issuing and managing X.509 (TLS) and SSH certificates. It is designed for automated certificate lifecycle management in DevOps environments, including short-lived certificates and multiple enrollment options.

Key Features

  • Private ACMEv2 server for automated TLS certificate issuance and renewal
  • Issues X.509 server and client certificates (configurable key types and lifetimes)
  • SSH certificate authority for user and host certificates
  • Multiple provisioning methods, including ACME challenges, OIDC/OAuth tokens, cloud instance identity documents, and JWK-based bootstrapping
  • Supports operating as an intermediate CA under an existing root CA
  • Pluggable database backends for CA state (including embedded and SQL options)

Use Cases

  • Automate internal TLS for services, APIs, containers, and Kubernetes workloads
  • Replace static SSH keys with short-lived SSH certificates tied to SSO
  • Run a private ACME service for development, staging, and internal production environments

Limitations and Considerations

  • Some enterprise PKI features (for example full HA at very high volume, advanced revocation services, or a web admin UI) may require additional tooling or a commercial offering

step-ca is a strong choice for teams that need a flexible private CA with ACME automation and SSH certificate support. It helps standardize identity and trust across infrastructure while reducing manual certificate handling.

8kstars
520forks
#3
Cert Warden

Cert Warden

Open-source centralized ACME client to manage TLS certificates with automated renewals, API-key retrieval for clients, http-01/dns-01 challenge support, Go backend and React UI.

Cert Warden screenshot

Cert Warden is a centralized ACME client that provides a REST API and web UI to create, manage, and automatically renew TLS certificates. It centralizes ACME account handling and exposes a scoped API-keyed GET interface so consumers can fetch individual keys and certificates without implementing ACME themselves.

Key Features

  • Centralized ACME orchestration: manage ACME accounts, keys, and certificates from a single service.
  • REST API for consumers: authenticated GET endpoint with scoped API keys to retrieve keys/certificates programmatically.
  • Automated renewals: background automation for certificate issuance and renewal using RFC 8555-compliant ACME providers.
  • Challenge support: built-in HTTP server for http-01 and integrated support for many DNS providers for dns-01 challenges.
  • Frontend and backend: React-based web UI with a Go backend providing the API and ACME logic.
  • Deployment options: official Docker images and docker-compose examples plus binary releases for multiple platforms.
  • Robust logging and debugging options: detailed access and debug logs to track who or what is accessing key material.

Use Cases

  • Centralize TLS management across a home lab or small infrastructure to avoid running ACME clients on each endpoint.
  • Provide short-lived scoped certificate access to services or devices that cannot run a full ACME client.
  • Automate certificate renewals for services that require a simple API to fetch X.509 material.

Limitations and Considerations

  • Intended for small/home-lab use; the project is primarily maintained by a single developer and does not include commercial support.
  • Stores private key material in a local database file; compromise of that database compromises the entire PKI and requires strong operational safeguards (backups, access controls, encryption at rest as appropriate).
  • The project bundles a frontend and backend and the documentation notes there is limited support for running them separately.

Cert Warden is a practical option for users who want a single service to manage ACME interactions and make certificates available via an API. It emphasizes automation and simple client retrieval, but users should evaluate the operational security trade-offs before storing sensitive key material in its database.

475stars
16forks
#4
VaulTLS

VaulTLS

Self-hosted web app to generate, manage and distribute mTLS client and server certificates with OIDC auth, email alerts and a REST API.

VaulTLS is a self-hosted web application for generating, managing and distributing mutual TLS (mTLS) certificates. It provides a central UI and REST API to create client and server certificates, manage a local Certificate Authority, and monitor certificate expirations.

Key Features

  • mTLS client and CA certificate management with UI-driven workflows
  • Server certificate support (SANs) and PKCS#12 export options
  • OpenID Connect (OIDC) authentication integration for SSO
  • Email notifications for upcoming certificate expiration
  • RESTful API for automation and integration with tooling
  • Container-first distribution (Docker image) and simple reverse-proxy integration
  • Optional database encryption via an environment variable to encrypt stored data

Use Cases

  • Centralized issuance and distribution of client certificates for a home lab or small infrastructure
  • Integrating with a reverse proxy (example Caddy configuration provided) to enforce client certificate authentication
  • Automating certificate issuance and expiry notifications via the provided REST API

Limitations and Considerations

  • Automatic certificate regeneration/auto-renew is listed on the roadmap and is not guaranteed in older releases
  • Targeted primarily at home-lab / small deployments; lacks built-in clustering/HA storage features

VaulTLS is intended as a practical, lightweight tool to simplify mTLS workflows and certificate lifecycle management for self-hosted environments. It focuses on ease of use, container deployment, and integrations for authentication and reverse-proxy setups.

311stars
6forks
#5
mkcert Web UI

mkcert Web UI

Web-based UI for mkcert to generate, download, and monitor locally-trusted development TLS/SSL certificates with SCEP, authentication, Docker deployment, and email alerts.

mkcert Web UI provides a browser-based interface for the mkcert CLI to create and manage locally-trusted development TLS/SSL certificates. It exposes certificate generation, downloads, monitoring, and a built-in SCEP enrollment service while enforcing input validation and rate limits for security.

Key Features

  • Certificate generation for multiple domains and IPs with PEM, CRT and password-protected PFX (PKCS#12) output
  • Built-in SCEP server supporting GetCACert and GetCACaps for automated device enrollment and challenge-based authentication
  • Enterprise-grade protections: allowlist command validation, path traversal prevention, filename validation, input sanitization, and multi-tier rate limiting
  • Flexible authentication: basic auth and OpenID Connect SSO support; session secret configuration
  • Certificate monitoring with configurable warning/critical thresholds and automated email notifications for expiring certificates
  • Docker and docker-compose deployment support and a simple HTTP API for generate, list, download, and monitoring endpoints

Use Cases

  • Centralize generation and distribution of development TLS certificates for local networks and developer teams
  • Automate certificate provisioning on devices using the SCEP service for managed device enrollment
  • Monitor certificate expiry across development assets and send email alerts to administrators

Limitations and Considerations

  • Requires the mkcert CLI and local trust of the mkcert root CA; initial root CA installation is a prerequisite
  • No built-in hardware security module (HSM) or remote CA integration; keys and certificates are stored on local filesystem by default
  • Exposing SCEP or the management UI publicly requires careful network and authentication configuration to avoid security risks

mkcert Web UI is suited for teams and developers who need an accessible UI to run mkcert at scale in development environments. It simplifies certificate workflows while retaining the underlying mkcert trust model and operational constraints.

195stars
7forks

Why choose an open source alternative?

  • Data ownership: Keep your data on your own servers
  • No vendor lock-in: Freedom to switch or modify at any time
  • Cost savings: Reduce or eliminate subscription fees
  • Transparency: Audit the code and know exactly what's running