Using the Certificate Expiring Soon rule template, you can set up rules to regularly scan your JumpCloud managed certificates and automatically create an alert when any certificate is approaching its expiration date within a specified time window (for example, expiring in the next 30 days).
It helps you proactively renew certificates before they expire, so you can avoid service interruptions and security issues - without having to manually track expiry dates.
To configure the rule, follow the steps detailed in Configure Rules for Device Monitoring and Alerting.
In the conditions section:
- Select the certificate types you wish to monitor from the dropdown.
- Click Add Threshold and enter the number of days before expiry to trigger alerts and notifications.
You can configure up to 5 thresholds in days (for example 90 days before expiry, 60 days before expiry, and so on)
- Maximum supported threshold: 90 days
- Enable Post-Expiry Alerts to receive daily alerts after a certificate expires. Alerts continue until the certificate is renewed or replaced.
Each certificate generates only one active alert per threshold. When a stricter expiration threshold is met, the previous alert resolves automatically to avoid duplicates.
How this works
Admin configures the certificate type, defines the threshold and creates the rule. The rule:
- Runs immediately, then every 24 hours
- Scans your JumpCloud‑managed certificates.
- Calculates days remaining until expiry
- Creates alerts or notifications when a certificate:
- Reaches a configured threshold, or
- Has already expired
If the Enable Post-Expiry Alerts toggle is on, when certificates expire, you will receive alerts daily until the certificate is renewed.
Alert Behavior
A certificate can trigger multiple alerts over time—for example, at 90, 60, and 30 days before expiry and one alert daily post expiry until the certificate is renewed.
- Each certificate generates one alert per threshold
- When a certificate first crosses a threshold (e.g., 60 days), an alert is created
- On subsequent days, the same alert is updated (not duplicated)
Multiple Thresholds
Each threshold is evaluated independently
- As stricter thresholds are reached:
- A new alert is created
- The previous alert is automatically resolved
Expired Certificates
When a certificate expires:
- A new expired alert is created
- Previous threshold alerts are resolved
If Post-Expiry Alerts are enabled:
- A new alert is generated daily
- The previous day’s alert is auto-resolved
Example
Configuration:
- Certificate Type: All
- Thresholds: 90, 60, 30 days
Certificate expiry date: May 1, 2026
Here’s what happens over time:
| Date | Days until expiry | What happens |
| Jan 31, 2026 | 90 | First time <= 90. 90 days alert is created. |
| Feb 1, 2026 | 89 | Still < 90 but already alerted, so no new alert. Existing alert details are updated. |
| Mar 2, 2026 | 60 | First time <= 60. 60 days alert is created. 90 days alert is auto-resolved |
| Mar 3, 2026 | 59 | Still < 60, so no new alert. Existing alert details are updated. |
| Apr 1, 2026 | 30 | First time <= 30. 30 days alert is created. 60 days alert is auto-resolved. |
| Apr 2, 2026 | 29 | Still < 30, so no new alert. Existing alert details are updated. |
| May 1, 2026 | 0 (expired) | Certificate expired. Expired alert is created. 30 days alert is auto-resolved. |
| May 2, 2026 | -1 (expired) | Still expired. Another expired alert is created. Previous day’s alert is auto-resolved. |
| May 3, 2026 | -2 (expired) | Still expired. Another expired alert is created. Previous day’s alert is auto-resolved. |
If the certificate is renewed:
- Alerts are automatically resolved
- Daily alerts stop
FAQ
The system evaluates changes without creating duplicate alerts.
Adding a Threshold
If you add a new threshold (e.g., 90 days):
- On the next run, certificates within that range may trigger alerts
- Alerts are created only if that threshold hasn’t already triggered before
Removing a Threshold
If you remove a threshold:
- No new alerts are generated for it
- Existing alerts for that threshold are automatically resolved
- Certificates continue to be evaluated against remaining thresholds