VaulTLS is a modern solution for managing mTLS (mutual TLS) certificates with ease. It provides a centralized platform for generating, managing, and distributing TLS certificates for your home lab.
The main reason why I developed VaulTLS was that I didn't like messing with shell scripts and OpenSSL. I also did not have an overview about the expiration of individual certificates.
- 🔒 Comprehensive TLS X.509 certificate management
- 💻 SSH certificate management
- 📱 Modern web interface for certificate management
- 🔐 OpenID Connect authentication support
- 📨 Email notifications for certificate expiration
- 🚀 RESTful API for automation
- 🛠 Docker/Podman container support
- ⚡ Built with Rust (backend) and Vue.js (frontend) for performance and reliability
Installation is managed through a Container. The app needs to be behind a reverse proxy for TLS handling.
VAULTLS_API_SECRET is required and should be a 256-bit base64 encoded string (openssl rand -base64 32).
podman run -d \
--name vaultls \
-p 5173:80 \
-v vaultls-data:/app/data \
-e VAULTLS_API_SECRET="[VAULTLS_API_SECRET]" \
-e VAULTLS_URL="https://vaultls.example.com/" \
ghcr.io/7ritn/vaultls:latestBy specifying the VAULTLS_DB_SECRET environmental variable, the database is encrypted. Data is retained. It is not possible to go back.
The default log level is moderate. If a different one is desired, please specify it using the VAULTLS_LOG_LEVEL environmental variable.
For bug reports, a trace log report is desirable. Be aware that the trace does contain secrets.
To set up OIDC you need to create a new client in your authentication provider. For Authelia a configuration could look like this
- client_id: "[client_id]"
client_name: "vautls"
client_secret: "[client_secret_hash]"
public: false
authorization_policy: "one_factor"
pkce_challenge_method: "S256"
redirect_uris:
- "https://vaultls.example.com/api/auth/oidc/callback"
scopes:
- "openid"
- "profile"
- "email"
userinfo_signed_response_alg: "none"For VaulTLS the required variables can be configured via environmental variables or web UI.
| Environment Variable | Value |
|---|---|
VAULTLS_OIDC_AUTH_URL |
https://auth.example.com |
VAULTLS_OIDC_CALLBACK_URL |
https://vaultls.example.com/api/auth/oidc/callback |
VAULTLS_OIDC_ID |
[client_id] |
VAULTLS_OIDC_SECRET |
[client_secret] |
If VaulTLS claims that OIDC is not configured, the most likely cause is that it couldn't discover the OIDC provider based on the VAULTLS_OIDC_AUTH_URL given. In general the base url to the auth provider should be enough. For Authentik the required URL path is /application/o/<application slug>/. If that doesn't work, directly specify the .well_known url.
Certain environment variables can be container secrets instead of regular variables.
VaulTLS will try to read secrets from /run/secrets/<ENV_NAME>, if you want to specify a different path, you can do so in the environmental variable.
The following variables support secrets:
VAULTLS_API_SECRETVAULTLS_DB_SECRETVAULTLS_OIDC_SECRET
During the first setup a TLS Certificate Authority is automatically created. If OIDC is configured, no password needs to be set. Users can either log in via password or OIDC. If a user first logs in via OIDC, their e-mail is matched with all VaulTLS users and linked. If no user is found, a new one is created.
Users can only see certificates created for them. Only admins can create new certificates. User certificates can be downloaded through the web interface.
The current CA certificate to be integrated with your reverse proxy is available as a file at /app/data/ca/ca.cert
and as download via the API endpoint /api/certificates/ca/download.
Further API documentation is available at the endpoint /api
Certificates downloaded come in the PKCS#12 file format. They are a bundle consisting of the public certificate and private key. By default, PKCS#12 passwords are optional and certificates will be generated with no password. On the settings page, the PKCS#12 password requirements can be set with the following options:
| PKCS12 Password Rule | Result |
|---|---|
| Optional | Passwords are optional and can be blank |
| Required | Passwords are required, and can be user supplied |
| System Generated | Random passwords will be generated |
Passwords are stored in the database and retrieved from the web interface only when the user clicks on view password.
VaulTLS also has support for server certificates. The user flow remains quite similar with the difference that SAN DNS entries can be specified. Download is also using a possibly password-protected PKCS#12 file. Since most reverse proxies require the certificate and private key to be supplied separately, the PKCS#12 file may need to be split. This can be done, for example, with openssl:
openssl pkcs12 -in INFILE.p12 -out OUTFILE.crt -nokeys
openssl pkcs12 -in INFILE.p12 -out OUTFILE.key -nodes -nocertsTLS certificates cannot be simply deleted since their validity period is cryptographically encoded in the certificate. VaulTLS provides the CRL mechanism to revoke certificates. This file is used by the validation side (such as the server for client certificates) to check if the certificate has been revoked. CRLs are stored as files under /app/data/crl/. They can be downloaded in the CA tab of the frontend and can be retrieved from the API under /api/certificates/ca/<id>/crl. They do not require authentication to be accessed.
VaulTLS also supports SSH certificates. To use these you must manually create a new SSH CA in the CA tab. Since SSH does not provide a bundled file format to store the private key and certificate, the file is provided as a ZIP archive.
To use caddy as a reverse proxy for the VaulTLS app, a configuration like the following is required.
reverse_proxy 127.0.0.1:5173To integrate the CA cert for client validation, you can either use a file or http based approach. Extend your TLS instruction for that with the client_auth section. Documentation here: https://caddyserver.com/docs/caddyfile/directives/tls#client_auth.
File based:
tls {
client_auth {
mode <usually verify_if_given OR require_and_verify>
trust_pool file {
pem_file <Path to VaulTLS Directory>/ca.cert
}
}
}HTTP based:
tls {
client_auth {
mode <usually verify_if_given OR require_and_verify>
trust_pool http {
endpoints <Address of VaulTLS Instance such as 127.0.0.1:5173>/api/certificates/ca/download
}
}
}If you choose verify_if_given, you can still block clients for apps that you want to require client authentication:
@blocked {
vars {tls_client_subject} ""
}
abort @blocked- Allow user details to be updated
- Improve testing



