














Thought I was building a cheaper Venafi. Was wrong. Three lessons learned.
Solo founder, no funding. Building certctl, an open core cert lifecycle platform, against an enterprise market dominated by Venafi (CyberArk), Keyfactor, AppViewX. Wanted to share what I've actually learned, since per this sub's rules a pure pitch isn't the format.
Lesson 1: The commercial cert market isn't actually selling certs.
Spent the first three months thinking I was building a cheaper Venafi. Was wrong. The commercial cert market is selling management software with a cert wrapped around it as the billing vehicle. Let's Encrypt commoditized DV certs in 2016. Browsers don't visually distinguish DV from EV anymore (Chrome 77, Firefox 70, both 2019). DigiCert / GlobalSign / Sectigo / Entrust still charge $200 to $500/year per cert because the cert is the loss-leader. The actual revenue is the proprietary automation portal, key vault, monitoring dashboard, and "premium support" they bundle into each cert sale.
Reframing this changed the product entirely. I'm not building a cheaper Venafi. I'm building the thing the loss-leader bundling is hiding: the management layer should be free, the cert is whoever's free CA you trust.
Lesson 2: The connector library is the moat, not the protocol code.
Enterprise CLM platforms (Venafi, Keyfactor, etc) ship native integrations for maybe 60% of what their customers actually run. The other 40% gets bridged via custom plugin frameworks written by their professional-services architects, billed at $250 to $400/hr, hundreds of hours in year one, on top of a six-to-seven-figure license. The job titles vary (Solutions Architect, Implementation Architect, Accelerator Architect, Digital Trust Architect) but the work is identical: write the integration the platform should have shipped with.
That 40% is the actual category. Native connectors for IIS, F5, Java keystores, K8s, AWS ACM, Azure Key Vault, Postfix + Dovecot, agentless SSH. That's where the real engineering work is, and commercial vendors actively avoid shipping it because the gap funds their professional services line.
Progress: 12 issuer connectors and 15 target connectors shipped so far. Each one took 1 to 3 days but maintenance is a tax forever as vendor APIs drift. This is the unglamorous work nobody else is incentivized to do, which is exactly why an OSS layer makes sense.
Lesson 3: Licensing is the conversation I keep having.
Went with BSL 1.1. Got pushback in r/freesoftware on the "non-OSI" framing. The honest reasoning: Apache 2.0 day one means AWS wraps it as a managed service before the project has a community. BSL prevents the competing-managed-service case but allows everything else (read, modify, fork, self-host, run internally). Same license HashiCorp and MariaDB use for the same reason. Still working out whether that's the right call long-term.
The forcing function in the background.
CABF SC-081v3 already cut public-CA max validity to 200 days as of March 15, 2026. 100-day in 2027. 47-day in 2029. Manual cert workflows break at that cadence. The category is going to grow roughly 4x by 2029 just from cadence pressure. This is the window for an OSS alternative to take ground.
Just launched on Product Hunt today if you want to take a look: https://www.producthunt.com/products/certctl?launch=certctl
Repo: https://github.com/certctl-io/certctl
Landing: https://certctl.io