Public Key Infrastructures
Electronic signatures allow the creation of many new approaches for clearing transactions via public networks. A public key infrastructure (PKI) enables the linking of electronic keys to individuals, legal entities or servers. While not strictly necessary in closed networks, certificates serve as a means of ensuring authenticity in an open or multi-party system.
With certificates, the relation between a key and a person is guaranteed by a reliable Certification Authority, a trusted third party. The establishment and governing of the processes and technologies necessary to issue certificates and signatures demand careful and comprehensive planning efforts.
All actions, ranging from issuing through revocation to renewal of certificates must be closely coordinated. The respective processes vary depending on the application environment and the end user. With company-internal PKIs, e.g. for protecting an in-house application, the emphasis is on a seamless integration of the PKI into the existing IT systems. Issuing is often carried out by the personnel department, with the work council overlooking the process. When dealing with external PKIs, e.g. for clearing music downloads via Digital Rights Management, the issuing processes and the ease of use are the main development goals.
Running and maintaining a PKI requires a multitude of different components and technologies. Our excellent know-how in the PKI environment enables us to support you in building your PKI, be it by designing your specific processes, customizing your off-the- shelf products or developing an all new PKI environment with all the components tailored exactly to your needs. Many projects allow for the use of open source developments when implementing a solution. As an example, our OSCP responder for Bouncy Castle Extensions has been integrated into numerous operational applications to provide a quick and easy online status check.
Our knowledge covers all the established PKI standards and technologies like X.509, OSCP and LDAP. Whether you are designing, building or extending your PKI, you will find in us a proficient partner on both the operational and technical level.