PKI: Public Key Infrastructure
– about PKI and our PKI Solutions

Contact us about PKI solutions

Without even knowing it, you are probably using PKI and PrimeKey technologies on a daily basis. Our PKI solutions and certificates are used in everything from biometric passports to internet banking, smartphones and tablets. Additionally, our solutions can be found in software distribution and authentication, online identity providers, under the hood of modern cars and more. And yes, we secure the Internet of Things (IoT) as well. Public Key Infrastructures are about building frameworks for issuing trusted digital identities to users, servers and things. Continue reading to learn more about PKI and our PKI solutions.

Why do you need Public Key Infrastructure (PKI)?

Today’s world relies heavily on PKI. From governments to innovative tech startups, to world-leading enterprises. What they all have in common is that they realize the risk of catastrophic consequences of not protecting their data properly ⁠- consequences for their users, customers and ultimately for their own brand. PKI is the backbone of most IT security solutions today.

PKI, Public Key Infrastructure solution, PrimeKey

Open source PKI technology and signing solutions

PrimeKey uses open standards for our PKI and signing software, providing you with crypto agility. This means that you don’t bind yourself to a certain standard or way of handling your security.

With our open source PKI and signing software, you have access to the source code of the software and this gives you insurance from unforeseen events. With our Open Source PKI solution, you also get:

  • high expertise within PKI and IT security and we gladly share our knowledge
  • a flexible and agile product for your benefit
  • over 15 years of experience of working with PKI
  • a product that scales easily as you grow
  • support from experienced experts.

PKI is about building a framework

What is PKI? Public Key Infrastructure (PKI) is about building a framework for issuing trusted digital identities to parties, such as users, servers or things. The PKI framework is governed by a set of policies and procedures which define the level of security that should be achieved.

PKI typically includes a combination of software and hardware components that together implement functions for Certificate Authorities, Registration Authorities and Validation Authorities that are responsible for issuing and lifecycle manage trusted identities for the users, servers and things. The trusted identities are implemented as certificates and they are the foundation for many security services that implement authentication, non-repudiation and confidentiality.

PKI Enterprise, Public Key Infrastructure - illustration

About PKI certificates and digital certificates

A PKI certificate is a digitally signed document that is similar to a physical identity card or a passport used in the analog world. The PKI certificate, or digital certificate, is a trusted digital identity used to provide and prove the identity of a user, server or a thing when communicating over untrusted networks.

A key concept behind this is the use of private and public key encryption, where the public key is stored in the certificate along with information about the owner and some administrative data. The certificate is signed by the issuing CA and the signature is attached in the certificate. The X.509 standard defines the most commonly used formats for digital certificates.

Private and public key encryption

In private and public key encryption or asymmetric encryption schemes, a corresponding keypair is used for encryption. One key is used to encrypt a message and the other key in the keypair is used to decrypt. In PKI, one key is called private key and the other key is called public key.

The private key is kept secret and should not be used by anyone else than the owner. The public key is public and stored in a certificate.

PrimeKey PKI products

We are passionate about encryption, certificates, keys and IT Security, and we love to share our knowledge. So if you have further questions about the technology involved, contact us today or read more about our PKI products here below.

EJBCA Appliance – our PKI hardware

Our turnkey EJBCA Appliance is the best choice for most medium and large-size deployments — suitable even for managed services and Internet of Things (IoT).

PrimeKey EJBCA Appliance has a fixed pricelist and enables you to save months of work and expenses.

The Appliance is also particularly useful if you are looking for additional hardware to go with your overall PKI solution, or if you don’t have your own PKI department.

 

EJBCA Appliance

EJBCA Enterprise – our PKI software

EJBCA Enterprise provides you with the basic security services for trusted identities and secure communication in any environment and use case.

EJBCA Enterprise enables multiple integration and automation possibilities and issues certificates to persons, infrastructure components and IoT devices.

EJBCA Enterprise is flexible, scalable and secure and is installed at numerous ETSI/eIDAS-, WebTrust audited and ePassport reference customers.

 

EJBCA Enterprise

EJBCA Cloud – our cloud-based PKI

EJBCA Cloud is a powerful, flexible Certificate Authority and complete PKI in the cloud.

EJBCA Cloud PKI is an open source IT-security software for Certificate Issuance and Certificate Management. EJBCA Cloud protects your data and provide safe digital communication when needed.

EJBCA Cloud is used for most imaginable PKI use cases and gives you full control of everything you do. Deploy it today in your AWS or Azure cloud.

 

EJBCA Cloud

How can we help?

    I accept that PrimeKey stores my information, and I accept cookies for analysis and business identification. Read more about cookies and privacy policy here.
Contact us