Public key Infrastructure(PKI)

(PKI) in simple terms is defined as a set of hardware,software,people,policies,producers needed to create,manage,store,distribute and revoke digital certificates based on asymmetric cryptography.It provides a secure framework to establish and maintain a trustworthy networking environment by validating the user credentials beyond any reasonable doubts. Secure your organization with a trusted identity

PKI enables users of an insecure public network such as the internet to securely and privately exhange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.The trusted authority is the Certificate Authoity(CA) that forms the core of the infrastructure .The CA can identify an individual or an organization issue digital certificates and manage them.


    • Allowed key Algorithms DSA,RSA,ECDSA/DC.
    • Support for Multiple RA Connections to single CA.
    • Database Supported MS SQL,ORACLE,POSTGRESQL,MYSQL,MariaDB.
    • Support for OCSP Validation.
    • Support & Compatible with all Industry Standard HSMs.
    • Support Time Stamping.
    • Comprehensive Audit and Logging System.
    • Fully Compliant with CCA IO Gulidlines.
    • Support for hierarchical CA Structure.
    • Web trust Compliant.
    • Support for issuance of MS Document Sign, MS Smart Card log on, MS EFS Certificate.
    • Support both LDAP and Ad Directory System.
    • Support for PKCS#11.
    • Updation of CRLs(certificate revocation list).
    • Availability of SOAP,REST Services.
    • Well suited for Enterprise Cas.