SWS : BLUE PRIVATE MANAGED PKI

Outsource your own PKI to the certified SwissSign environment

With BlueCerts Private Managed PKI powered by SwissSign operates your public key infrastructure (PKI) for you in accordance with your specifications.
If you prefer certificates will be issued from your own root certificate (root CA).
You obtain and manage your certificates in a simple manner via our Managed PKI interfaces and web user interfaces.
You benefit from maximum flexibility, low costs and a high level of security by outsourcing your PKI to the secure, certified and specialised SwissSign environment.

You define the scope and parameters of the Private Managed PKI service when placing your order. It is also possible to have your own CP/CPS. Among other things, you determine whether :

  • a complete self-signed certification authority (CA) of your own is created,
  • you use an issuing certification authority (sub-CA) or
  • you exclusively obtain individual certificates directly from our internal not publicly trusted SwissSign CA.

You choose whether you only want to use your self-signed certificates internally or you want to use the same Managed PKI interface also for standard publicly trusted SwissSign certificates.

If you want to use your own CA or Sub-CA, you can request a quotation from us.

Description

With Private Managed PKI, we offer the following standard products. Other products are possible and are set up on a customer-specific basis.

SSL / device certificates

  • Use : Certificates on network-compatible devices for the encrypted exchange of data and for client authentication.

Characteristics: Entry of domain name or several domain names (multi-domain). The domain names must be FQDN; no internal names or IP addresses. These certificates are also optionally available with an organisation entry.

E-mail certificates

  • Use : Certificates for signing and encrypting e-mails

Characteristics: Issued to e-mail addresses – the certificate can also optionally include a last name, first name and organisation entry.

Authentication certificates

  • Use : Certificates for authentication on systems

Characteristics: Contain a user ID or e-mail address, optionally also available with a last name, first name and organisation entry.

Certificates in the Microsoft environment

  • Use : Certificates which require the Microsoft V2 template, for authentication or server operation

Characteristics : Contain specific OIDs.

Additional information

Techno Partner