Skip to content

Profile Settings

The profile settings page allows you to manage basic account information, change your password, and configure API access keys for programmatic access to anssl services.

Visit the Profile Settings page.

The top of the page displays your basic account information:

  • Email Address: Email used for login and receiving notifications
  • Registration Date: Account creation date
  • Account Status: Current account status (Active/Restricted)

Regularly changing your password helps protect your account security.

  1. Enter Current Password

    Enter your current password in the “Current Password” field

  2. Set New Password

    Enter your new password in the “New Password” field

    Password requirements:

    • At least 8 characters
    • Contains uppercase and lowercase letters
    • Contains numbers
    • May contain special characters
  3. Confirm New Password

    Re-enter your new password in the “Confirm Password” field

  4. Submit Changes

    Click the “Change Password” button to complete the change

API access keys allow programmatic access to the anssl API for automated certificate management.

An access key is a pair of credentials containing an Access Key ID and Secret Key:

  • Access Key ID: Public key identifier
  • Secret Key: Private key content, displayed only once upon creation
  1. Click the “Create Key” button in the “API Access Keys” section

  2. The system generates a new access key pair

  3. Immediately copy and save the Secret Key

    This is the only opportunity to view the complete Secret Key

  4. Save the key securely in a password manager or environment variable

Use access keys in your application to call the anssl API:

Terminal window
# Set via environment variables
export ANSSL_ACCESS_KEY_ID="your_access_key_id"
export ANSSL_SECRET_KEY="your_secret_key"
// Use in code
const client = new AnSSLClient({
accessKeyId: process.env.ANSSL_ACCESS_KEY_ID,
secretKey: process.env.ANSSL_SECRET_KEY
});

For enhanced security, it’s recommended to rotate access keys regularly:

  1. Create a new access key

  2. Update your applications with the new key

  3. Verify the new key works correctly

  4. Delete the old access key

If a key is compromised or no longer needed:

  1. Find the corresponding key in the key list
  2. Click the “Delete” button
  3. Confirm the deletion
  • ✅ Use strong passwords (containing uppercase, lowercase, numbers, and special characters)
  • ✅ Change passwords regularly (recommended every 3-6 months)
  • ✅ Don’t use the same password across multiple sites
  • ✅ Use a password manager to generate and store passwords
  • ❌ Don’t share your password with others
  • ❌ Don’t save passwords on public devices
  • ✅ Store keys in environment variables or key management systems
  • ✅ Rotate keys regularly (recommended every 90 days)
  • ✅ Create different keys for different applications
  • ✅ Delete unused keys promptly
  • ❌ Don’t hard-code keys in source code
  • ❌ Don’t commit keys to version control systems
  • ❌ Don’t output keys in logs

The system monitors abnormal account activities:

  • Logins from unusual locations
  • Frequent password change attempts
  • Abnormal API calling patterns
  • Multiple failed authentication attempts

If suspicious activity is detected, the system will:

  1. Send security notifications to your email
  2. Potentially restrict account access temporarily
  3. Require identity re-verification

Click “Forgot Password” on the login page to reset your password via email verification.

Each account can create up to 5 active access keys. To create more, delete unused keys first.

Access keys themselves don’t expire, but regular rotation is recommended. API calls have rate limits - see API documentation for details.

Immediately delete the compromised key and create a new one. Check for unauthorized API call records.