continue
An efficient and secure way to manage access using trusted credentials. Get your own dedicated Microsoft PKI delivered as PKI As A Service, hosted in Azure.
Customers will have a two-tier PKI CA hierarchy. All CAs within this CA hierarchy will only issue CA and end-entity certificates for internal usage. Customer PKI CA hierarchy consists of a single PKI Root CA and two or more PKI Issuing CAs as per their requirement.
Deployed to industry best practice, with supporting policy and procedures tailored to your own organization’s compliance requirements, the Encryption Consulting Managed PKI Service will provide you with a robust infrastructure to provide a solid foundation for your corporate PKI requirements.
The trust anchor of a PKI is a high-assurance Root CA. If you choose to use our Root Service, your Root will be hosted securely in our SOC2-certified datacenter in Dallas, Texas. If required, we can support customers participation in the Root CA build,and will undertake a Key Signing Ceremony (KSC) with you for this purpose. This is the event where the protected key material for the CA is created and implemented according to your policy.
As this is your PKI, you are the only one who has access to the Root CA private keys; these are protected by a quorum of HSM control keys of which you hold the majority share. This means that no one can initialize the Root to create additional Sub-CAs or revoke Sub-CAs without your presence. After the KSC, Encryption Consulting will facilitate Root CRL signings as often as required. Signings will be undertaken under the accreditation and compliance requirements for the specific Root CA, according to its policy.
Encryption Consulting can also offer further services related to the Root CA such as:
Encryption Consulting assisted a Retail institution to implement a new PKI Infrastructure.
Validating and trusting an identity is one of the most important aspects of Cyber Security.
According to the findings, the rapid growth in the use of IoT devices is having an impact on the use of PKI technologies
Please submit your
Please submit your
You're one step away
Please submit your details to
Please submit your details to
Please submit your details to
Get in Touch
Please submit your details to
Please submit your details to
Please submit your details to
Please submit your details to