What can you do with a powerful PKI platform?

Set-up private Certificate Authority (CA)
Secure access to websites & applications (SSL/TLS)
Enable MFA for VPN or private network access
Enforce device authentication for workplace & IoT devices, MDM
Deploy code signing and authentication (DevOps)
Secure cloud application access
Provide passwordless shell access to machines (SSH)
Protect access to corporate network and WiFi
Initiate mutual authentication for secure web applications (mTLS)
Roll out email signing and encryption
Secure communication  between microservices and containers
Manage keys in public cloud

Adopt true end-to-end security

The Smart ID PKI issues certificate-based, cryptographically secure, unforgeable identities that enable,

Strong authentication: Certificate-based authentication ensures only authorized users, devices, or servers can connect to a network or application. Revocation of certificates instantly blocks access in case of compromise or emergency.

Encryption and privacy: Certificates guarantee encrypted communication between devices and services to securely transmit data over TLS.

Integrity: Digitally signed messages based on certificates prove the origin of data and detect data manipulation. Signed firmware ensures secure software updates from verified sources.

Complete, compliant, and feature-rich

  • Securely issue certificate-based identities
  • Complete certificate lifecycle management
  • Store certificates on multiple devices - mobile phones, smartcards, corporate devices, IoT devices, etc.
  • Ensure high performance and scalability 
  • Manage multiple CAs and tenants
  • Common Criteria EAL4+ certified 
  • TISAX and ISO 27001 compliant

Enhance interoperability

The Smart ID PKI supports a wide range of enrolment protocols and interfaces which makes it easily extensible to various use cases while keeping it secure and compliant with global industry standards.

  • ACME
  • CMC
  • CMP
  • EST
  • EST-coaps
  • SCEP
  • WinEP


The only complete PKI platform




Certificate Factory

Responsible for control mechanisms and data preparation in the issuance process.

Distribution Agent

Responsible for distributing certificates, CRLs, and CILs to different services

Certificate Issuing System

Creates, uses, and deletes CA keys on demand from the Certificate Factory, in addition to certificate and CRL signing

OCSP Responder

Answers queries on behalf of one or several CAs, enabling multi-tenant hosting, about the revocation and issuance status of certificates

Support for HSMs

Connect with several HSMs over the PKCS#11 cryptographic interface, to manage CA keys, TLS keys, key archiving, PIN protection, and user keys

Key Generation System

Performs key generation and smart card pre-personalization functions

SNMP Protocol

Allows for the CF and CIS-managed services to forward notifications over the SNMP protocol

Protocol Gateway

Handles standard protocols and functionalities for enrolling certificates to different kinds of devices




Explore more technical details, tutorials, and updates



Scalable platform that promotes trust in every interaction

Deploy Smart ID PKI in your preferred mode


  • We develop, install, and operate - You use
  • Quickly deploy a scalable service with fast onboarding 
  • Benefit from using the most up-to-date software based on standard services
  • Avoid system and application downtime due to expired certificates  


  • Customized set-up aligned to your needs 
  • Combine services and on-premise deployment
  • For example, Nexus will manage the online Certificate Authority while you manage identities in a local Smart ID system

Start your FREE trial for our GO IoT services today!


Evaluating PKI solutions?

Are you researching a new PKI solution to set up a private CA? Or do you wish to migrate to a comprehensive, modular, and future-forward solution?

We have put together a guide that compares the Nexus Smart ID PKI with Microsoft Active Directory Certificate Services to help you decide. 



Further PKI resources



PKI explained in 4 mins
PKI enables organizations to secure IoT communication, enable digital document signing, and everything in between! Martin Furuhed, the PKI expert at Nexus, explains what PKI really is - in 4 minutes.

Know more


Is public key infrastructure (PKI) giving you a false sense of security?
Do you think you have secured your organization and solved your issues with strong authentication, data encryption, and digital signatures just because you are using the public key infrastructure (PKI) security method?

Read now


A brief history of PKI
Encryption techniques have been used for millennia to protect communication – first on Mesopotamian clay tablets and most recently in the internet of things (IoT). Discover how PKI evolved into the most sophisticated security technology developed by mankind. 

Discover now

Research project collaborations

Connected vehicles Research

Nexus secures V2X communication in SECREDAS project

Nexus secures V2X communication in SECREDAS project The Electronic Components and Systems for European Leadership (ECSEL) SECREDAS project, launched in 2018, has been completed successfully. The project which has funding of €50+ million is aimed at devel...
Blog Research

SecureCare: IoT research project aims to provide trusted high-quality elderly care

“We have initiated a new research project that we hope will result in a truly secure smart-healthcare system for elderly as well as younger and healthier people,” says Helen Holst, CIO at the Swedish municipality City of Solna.
Blog Research

SecureIoT: Making PKI security available for resource-constrained IoT devices

The internet of things (IoT) applications have started to hit the market in big numbers – but security is lagging behind.

Why Nexus

Backed by teams with unparalleled expertise, Nexus Smart ID PKI is the only complete PKI solution in the market

High performance

Guaranteed high performance with a proven capacity to issue 10,000 certificates per second. Offered as a service, guaranteed SLA and capacity as you grow. 

High security

Proven security in compliance with Common Criteria EAL4+, TISAX, and ISO 27001

Smoother migration

Easily migrate to our future-compatible, multi-tenant PKI platform and increase operational efficiency with automation, notifications, and self-service.

Explore our latest resources

Authentication Customer Cases PKI Workforce

Bavaria chooses Nexus to modernize its state PKI

30 May, 2023
The Free State of Bavaria has selected Nexus, in collaboration with Atos, to update its Public Key Infrastructure (PKI) services. This project aims to issue and manage hundreds of thousands of certificates in the future, ensuring compliance, improving usab...
Authentication Blog Online services PKI Workforce Zero Trust

The importance of eIDAS compliance and modern workforce identities for governments

4 May, 2023
As governments around the world increasingly rely on digital services, it is essential to ensure secure and reliable identification and authentication for the employees. At Nexus, we understand the importance of this need, and our solutions are designed to...
Customer Cases Workforce

Sigtuna Municipality secures digital identities for their politicians and employees

26 April, 2023
The municipality of Sigtuna has upgraded to Nexus service GO Workforce to issue and handle secure identities for its politicians and employees. GO Workforce enables users to seamlessly authenticate themselves with two-factor authentication (2FA) to securel...
Blog MDM PKI Workplace

Why should you use PKI with your MDM solution?

18 April, 2023
Mobile devices are vital for remote working and accessing corporate resources. While many MDM solutions exist, management capabilities alone may not provide sufficient security. Learn how PKI can boost MDM security in our blog post.
Authentication Blog Zero Trust

Embracing Zero Trust: Why Europe is prioritizing identity-based approach to security

23 March, 2023
Zero Trust is becoming a mainstream solution in Europe. Discover the growing importance of Zero Trust as a comprehensive approach to protect against cyber threats.