Device provisioning & certificate management

Foundational UI for secure device provisioning at scale

I design end-to-end product experiences and the UX systems that sustain them — from early foundations through growth, optimization, and scalability.

Initial company & product state

Company position

The company was expanding its cybersecurity platform to include device provisioning and certificate management—a critical capability for medical device manufacturers operating under strict regulatory and security requirements. I joined this medtech cybersecurity startup as the first designer, working during an early and critical phase of the company’s growth.

Although this product constituted the majority of the company's revenue, there was no UI. This needed to be created in days. I operated across product design, product management, and technical writing. This work needed to ship quickly to support customer commitments, leaving little room for iteration after release.

Product state

There was no existing UI for device provisioning. Backend capabilities existed, but there was no defined user experience for:

  • Provisioning devices securely
  • Managing certificates and keys
  • Understanding device state, errors, or completion status
  • There was no clear product positioning
  • There was no onboarding or help center

The workflow was inherently technical, with high risk if misconfigured, and required a clear, guided experience to be usable by security and engineering teams.

Challenge

  • Design and ship a complete device provisioning and certificate management experience in days—not months—without sacrificing clarity, safety, or scalability, in order to meet customer commitments
  • Not even internal stakeholders could understand the story of this crypto product.
  • There was no UI, and a very short turn-around to build a complete UI

This required:

  • Translating complex backend provisioning logic into an understandable UI
  • Making system state, errors, and next steps explicit
  • Delivering quickly while aligning with enterprise and regulatory expectations
  • Creating first help center, complete with API documentation

Approach

I designed and delivered the full device provisioning and certificate management experience end to end—defining workflows, system feedback, and interaction patterns to support secure device onboarding from day one. I created the entire UI and help center in around a week.

Roles

As a team of one, I worked across multiple products simultaneously, fulfilling many roles:

  • Product designer
  • Product manager
  • Marketing
  • Technical writer

Core workflows

  • Designed end-to-end device provisioning flows, from initiation through completion
  • Created clear step sequencing to prevent misconfiguration
  • Defined success, in-progress, and failure states
  • Designed UI patterns for certificate creation, assignment, and lifecycle state
  • Designed filtering mechanism, as well as identifying filters and filter options
  • Document UI and API in product's first help center
  • Ideated and created first product datasheet

Onboarding & activation

I created onboarding emails, a get started hub, and a help center.

Get started

I unfortunately don't have a copy of the get started hub, but it had the same layout as the one for the SBOM vulnerability management platform, which I am showing below for context.

Help center

I built the help center from the ground up (in Gitbook), which can be viewed here: https://docs.medcrypt.com/

The help center made product value proposition and functionality clear to stakeholders and customers alike.

Breadcrumbs to get started quickly

This was the first iteration of breadcrumbs, where users could select a particular system. It was planned to allow selecting multiple systems, and for the breadcrumb to scale up to include showing device and certificate currently being viewed.

Toolbars

The UI needed to support row-level actions as well as bulk actions.


Users needed to be able to switch between date formats


Global provisioning was planned for the next phase. My scalable design system made adding this functionality a snap.

Users could see at a glance what systems were ready, as well as how many devices would be provisioned in each system

System status visibility and error handling

A top customer complaint with the current back-end functionality was that they had to request device status reports from the company. The UI ensured users always understood current state as well as historical statuses of each device.

  • Surfaced real-time provisioning status and system feedback
  • Designed error states that clearly communicated cause and resolution paths
  • Ensured user understood current state and next steps
  • Users could customize their view to hide/show only the columns that they needed

Why tables? 

Although I was working on a nested card interface (which you can see below in certificate management), our original design needed to be a table, to reuse the existing table pattern. I determined what information needed to be in the table (and what could be on-demand), the device provisioning flow, next steps, bulk actions, filtering, and more. I had to make millions of decisions very quickly, so kept track of them in cards, then transferred them to the PRD when everything was finalized.

This shows all possible columns

Filters

Because we were constrained to leveraging the existing table from the design system due to the quick turnaround, and companies could have hundreds of thousands of devices and certificates, I devised a filtering mechanism to ensure users could get to what they needed quickly.

This shows the collapsed and expanded views of filters, as well as more granular certificate-level sections

Device provisioning workflows

Nothing was defined, so I needed to determine what an device provisioning approval flow would look like and the happy and unhappy paths.

Status badge system

Building on what I'd already established for the SBOM vulnerability management platform, I adapted it for this product's needs, determining states and what to call them, ensuring that system status was clear and users understood next steps.

Defined the flow for manual and automatic provisioning, which included actually figuring out what the steps needed to be and how they would make most sense to the user.

Error badges

Badges brought clarity to the number of possible error codes, as well as how the user could recover from an error. For the first iteration of the UI, it was determined that attempting to reprovision the device was the only current avenue, so I made sure that errors and any recovery options were clearly documented in the help center.

Providing clear next steps

Each device had available actions depending on where in the provisioning process it was.

The new approve/reject workflow needed additional hover states for actions.

Confirmation panels

To reduce cognitive burden and the possibility of errors, I designed confirmation panels that brought forth all necessary information to enable user to confidently confirm single or bulk device provisioning approval or rejection.

Confirmation modals

For simler actions that did not need to bring forth device and certificate information, I created confirmation modals and corresponding toasts so that users understood what to expect, didn't lose their work and could quickly pick up later.

Processing modals

After confirming an action, users can immediately see the status of their action. They can also close the modal, which will continue the process in the background, displaying a processing indicator on the main page.

Toasts

For every user or system action, users always know exactly what's happening, what was successful, and what was not.

Since some processes could take a while (some still relying on manual efforts behind the scenes), toasts indicated the current state of a system's provisioning status.

Confirmation modals

Confirmation modals make sure users don't lose work or accidentally perform irreversible actions.

Email notifications

When a provisioning package was ready, users would receive a email with next steps.

Create new system

After creating the system, users could provision devices to that system. Users could select from the most common use cases, upsell to a custom integration, configure their system, download security certs, and download their provisioning package.

System creation wizard: Select use case step
System creation wizard: Configure system step
System creation wizard: Download Guardian library step
System creation wizard: View & download security certificates step

Confirmation panels for system provisioning

After configuring the system, users could review what they were about to provision. For this first iteration of the UI, they could not change the configuration, which is why there is no Back button.

System management

Systems would show their current state, whether a provisioning package was available, the system was deployed, or system configuration was not yet complete, ensuring users knew what needed their attention.

Systems page: Light and dark modes

Certificate management

Certificate management was a new functionality even to the back-end, so I had to research certificates to understand certificate types, levels of nesting, what information certificates contained and what was most important to surface at the card level vs what could be in the detail panel. This enabled users to understand certificate structure, status, and certificate details at a glance, as well as exporting certificates for importing into other systems, for example.

Empty state

If a system was not provisioned yet, no certificates would show.

Certificates view

Users could understand certificate nesting structure, which was important since if a root or parent intermediate certificate expired, all child certificates would be temporarily suspended.

Nested certificates and selected certificate details in light and dark mode

Certificate status badges

I devised a badge system to show current certificate status, as well as revocation status.

Confirmation panels for certificate revocations

Because revoking one or more certificates on a device was serious, I created confirmation panels for single and bulk certificate revocations.

Product datasheet

In addition to creating the UI and help center, I also created the product's first datasheet, helping to solidfy product positioning and value prop for a very technical product. This was essential as our sales and marketing people had deep medical device experience, but didn't know anything about device provisioning and certificate management.

I delivered a complete UI, workflows, and help center in about a week.

  • Enabled secure device provisioning through a clear, operable UI
  • Got users to value quickly and unstuck with Get started hub and Help center
  • Reduced risk in a high-stakes, security-critical workflow
  • Delivered a foundational platform capability under aggressive timelines
  • Established patterns that could scale as provisioning needs expanded
  • Ideated and designed first product datasheet and created product positioning collateral and website strategy, including creating first case studies