Frequently Asked Questions
Her you can find answers to commonly asked questions related to Public Key Infrastructure (PKI)
What is Public Key Infrastructure (PKI)?
Public key infrastructure (PKI) is a commonly used technology for safeguarding computer and network access, and for protecting communications. PKI credentials consist of a pair of cryptographic keys and an electronic certificate that are employed to identify and authenticate the user.
What is a digital certificate?
A digital certificate is an electronic proof of identity provided by an authorized certification authority (CA).
What is a certification authority?
A certification authority is a body that issues digital certificates. A digital certificate is employed to assign a public key to a person or organization.
What is certificate management?
Electronic certificates are encrypted electronic IDs used to securely authenticate users, devices, and software. Certificate Management is handled as part of Public Key Infrastructures and includes the complete lifecycle management of each certificate (issue, revoke, renew, block, etc.).
What is a digital identity?
A digital identity is the total sum of unique online characteristics of a subject or object. A digital identity is created by the registration in electronic form of these characteristics.
What is an identity?
Identity refers to the digital identity of a person, device, process, or any other object that is part of a digital network. The digital identity is the sum of information that uniquely describes the object and contains information about its properties and relationships to other objects, such as rights (entitlements) to perform certain actions in the digital or physical world. In the past, only people have been given digital identities to communicate in the digital world. Today, we are witnessing the rise of the Internet of Things, where most physical objects, machines, and even services around us are going to be connected in a digital infrastructure. All these objects need an identity to be able to establish trustworthy connections and communicate in the digital network.
What is certificate-based authentication?
Certificate-based authentication ensures that only authorized users, devices or servers can connect to a network or application. Revocation of certificates instantly blocks access in case of compromise or emergency.
What is an eID?
eID is an electronic identification that is a solutions of citizens and organizations, accessing services by banks, government authorities and other companies. Many service providers give users the option to sign electronic documents with a digital signature (non-repudiation). A strong eID is based on PKI and certificates. Common Access Card is one form of eID, which is a physical identity card with a chip that carries the keys and certificates in a secure way and enables the card to be used for online and offline personal identification, authentication or signing. The card may be used for online authentication for e-government applications. An electronic signature, provided by a private company, may also be stored on the chip and act as an eID.
What is an eID infrastructure?
Complete PKI infrastructure services to issue, validate, retrieve and audit digital certificates.