Public key Infrastructure(PKI)
(PKI) in simple terms is defined as a set of hardware,software,people,policies,producers needed to create,manage,store,distribute and revoke digital certificates based on asymmetric cryptography.It provides a secure framework to establish and maintain a trustworthy networking environment by validating the user credentials beyond any reasonable doubts. Secure your organization with a trusted identity
PKI enables users of an insecure public network such as the internet to securely and privately exhange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.The trusted authority is the Certificate Authoity(CA) that forms the core of the infrastructure .The CA can identify an individual or an organization issue digital certificates and manage them.
FEATURES DETAILED
-
- Allowed key Algorithms DSA,RSA,ECDSA/DC.
- Support for Multiple RA Connections to single CA.
- Database Supported MS SQL,ORACLE,POSTGRESQL,MYSQL,MariaDB.
- Support for OCSP Validation.
- Support & Compatible with all Industry Standard HSMs.
- Support Time Stamping.
- Comprehensive Audit and Logging System.
- Fully Compliant with CCA IO Gulidlines.
- Support for hierarchical CA Structure.
- Web trust Compliant.
- Support for issuance of MS Document Sign, MS Smart Card log on, MS EFS Certificate.
- Support both LDAP and Ad Directory System.
- Support for PKCS#11.
- Updation of CRLs(certificate revocation list).
- Availability of SOAP,REST Services.
- Well suited for Enterprise Cas.