What is a digital certificate?

A digital certificate contains information that helps guarantee a person is not an impostor. You get a digital certificate on request by visiting a CA website and providing information that identifies you. Organizations will use digital certificates to verify the identities of people and organizations they do business with... and need to trust.

Creating a secure connection!

The growing threat of rogue machines from malicious parties and employees who take advantage of bring-your-own-device (BYOD) policies has many in IT wondering how they can control which users and machines can access and operate on their networks.

Business challenges related to digital certificates

  • No automatic “snapshot” or view exists that details the number of certificates used by an organization.
  • Certificates expire at different times, potentially exposing customers to dangerous “certificate has expired” messages.
  • Corporate documents must be submitted for the vetting process each time a new certificate is needed.
  • No automatic discounts are received despite the purchase of numerous certificates.
  • Budgetary requirements become difficult to determine when each department purchases ad hoc.

The solution – Credential Management System by Asseco.

KEY TECHNICAL FEATURES
  • Managed platform

    A centralized repository to manage all of your certificates and certificate lifecycle operations

  • Advanced delegated user admin

    Administrators have the ability to create additional users with defined roles and appropriate privileges. User rights can be assigned at the profile and domain level.

  • Ease of deployment and ongoing management

    Asseco certificate management platform makes it easy for administrators to issue and revoke certificates as needed

  • Multi instance provisioning

    Whether you are issuing soft certificates or driving towards higher assurance with PKI HW devices such as smart cards or USB tokens, it is easy to issue, renew and revoke certificates

  • Leverage existing access control policies

    Configurable certification according to defined policies (templates) of certification (multiple certificates can be obtained for various purposes on one device for the same user)

  • One solution for all endpoints

    Certificates can be issued to all endpoints, including users, machines and devices

Examples use cases

  • User authentication

    Replace passwords or add a second authentication factor to control access to corporate network, Windows logon or dedicated applications,

  • Server Authentication

    Identify all the servers and devices within an enterprise to allow mutual authentication

  • Trusted Services Provider

    Registers of digital certificates – qualified and standard digital signature