Certificate Authorities

The Unifyia platform offers the capability to configure Certificate Authorities (CAs) for your organization to enable secure authentication of your employee identity. A Certificate Authority is an entity responsible for issuing digital certificates within a Public Key Infrastructure (PKI) framework. These digital certificates serve as electronically signed documents that bind a public key to an entity, whether it's an organization or an individual, while also containing pertinent information about the entity and its corresponding public key.

The primary role of a Certificate Authority is to validate the identity of the entity requesting the certificate and to subsequently issue digital certificates that validate the authenticity of the associated public key. Additionally, it allows the lifecycle management activities such as revoke, renew, and reissue of certificates, as well as management of certificate trust chains.

With Unifyia, you gain the ability to manage and configure these Certificate Authorities tailored to your organization's needs. This facilitates robust authentication processes for your employees, ensuring secure access to systems, data, and resources. By leveraging Certificate Authorities within Unifyia, you establish a foundation for trust and security in your organization's digital ecosystem, safeguarding sensitive information and mitigating potential risks associated with unauthorized access or data breaches.

The Unifyia platform currently supports the following CAs:

  • EJBCA – EJBCA stands for Enterprise JavaBeans Certificate Authority, and it is an open-source software system used for managing Public Key Infrastructure (PKI) and providing Certificate Authority (CA) services. EJBCA is developed in Java and is widely used by organizations and enterprises to issue and manage digital certificates.
  • MSCA - The Microsoft Certificate Authority (CA) is a component of the Windows Server operating system that allows organizations to establish their own Public Key Infrastructure (PKI), to issue and manage digital certificates. These certificates are used for various purposes such as secure communication over networks (e.g., HTTPS for websites), user authentication, and data encryption.
  • Entrust - Entrust Certificate Authority (CA) is a trusted provider of digital certificates and public key infrastructure (PKI) solutions. It offers a range of certificate services to help organizations secure their online communications, transactions, and identities.

Common Configurations

Term Descriptions
AIA URL

AIA stands for "Authority Information Access," and within the framework of a Certificate Authority (CA), the AIA URL (Authority Information Access URL) denotes the specific location where supplementary details about the CA and its certificates can be accessed. Defined in the X.509 certificate standard, the AIA extension is incorporated into digital certificates issued by CAs. The AIA URL is a critical component of the certificate validation process, as it enables clients (such as web browsers, applications, or other CAs) to retrieve essential information necessary for verifying the authenticity and reliability of a certificate.

CRL URL

The CRL URL (Certificate Revocation List URL) indicates the location where the Certificate Revocation List is published, and accessible to clients and applications. The CRL comprises digital certificates that have been revoked before their expiration dates, indicating they should no longer be trusted due to reasons like compromise or expiration. Included in the digital certificates issued by the CA, the CRL URL permits clients to periodically check for updates to the CRL, ensuring they acquire the most recent list of revoked certificates.

End Entity Profile

An End Entity Profile (EEP) constitutes a setup that outlines the certificate-related attributes and constraints for a particular type of end entity or certificate requester. The term "end entity" pertains to the entity such as users, devices, or services for which the CA provides a digital certificate. The EEP functions as a framework of regulations and guidelines used by the CA during the creation and issuance of certificates for end entities. It enables the CA to enforce precise security protocols, oversee certificate properties, and regulate the scope and application of the certificates issued to distinct entity types.

Escrowed End Entity Profile (EEP) An Escrowed End Entity Profile (EEP) is a specific setup implemented in certain Certificate Authority (CA) systems, notably in specific government or regulated contexts. Its purpose is to tackle the issue of key recovery or escrow should a user's private key become lost, compromised, or inaccessible, while still maintaining security and control over critical cryptographic assets.

Fully Qualified DN

Fully Qualified DN stands for Fully Qualified Distinguished Name. In the context of computer security and identity management, especially within the realm of public key infrastructure (PKI) and X.509 digital certificates, a Fully Qualified DN refers to the complete and precise identification of an entity within a hierarchical naming structure. A Distinguished Name (DN) is a unique identifier for an entity, typically composed of various attributes such as common name (CN), organization (O), organizational unit (OU), locality (L), state (ST), and country (C). For example, a DN might look like this: CN=John Doe, OU=IT Department, O=Company XYZ, L=City, ST=State, C=Country

Mobile End Entity Profile

A Mobile End Entity Profile (EEP) is a specialized setup employed in certain Certificate Authority (CA) systems to accommodate the distinctive needs of mobile devices such as smartphones and tablets, within a Public Key Infrastructure (PKI) framework. Tailored to meet the challenges and nuances inherent to mobile platforms, the Mobile EEP ensures secure certificate management and authentication on these devices.

OCSP URL

An OCSP URL (Online Certificate Status Protocol URL) refers to the specific location where the CA's Online Certificate Status Protocol (OCSP) responder is available. OCSP serves as an alternative to Certificate Revocation Lists (CRLs) for promptly verifying the revocation status of digital certificates in real-time.

SSL Client Certificate

An SSL client certificate is a digital certificate issued by a Certificate Authority (CA) to authenticate a client (such as a user or device) to a server during SSL/TLS (Secure Sockets Layer/Transport Layer Security) communication. While SSL server certificates authenticate servers to clients, SSL client certificates authenticate clients to servers.

SSL Server Certificate

An SSL (Secure Sockets Layer) certificate is a type of digital certificate issued by a Certificate Authority (CA) that verifies the identity of a website and enables secure communication over the internet. When a user visits a website with an SSL certificate installed, their browser establishes a secure connection with the website's server, encrypting data exchanged between them.

Web Service Root URL

The Web Service Root URL denotes the base URL or endpoint where the CA's web services are hosted and accessible to clients and other systems. These web services offered by the CA typically offer a range of functionalities of certificate management, including issuance, revocation, renewal, and status checks.

Add Certificate Authority

Prerequisite: CA must be installed to be integrated with the Unifyia platform.

Follow the below steps to add a Certificate Authority.

  1. Log into the platform with administrator credentials.
  2. Navigate to Integrations > Certificate Authority.
  3. Select + Add Certificate Authority.
  4. Configure the required connection parameters by selecting an installed CA. Refer to the below sections to understand how to configure the CAs.
    1. Configure EJBCA
    2. Configure MSCA
    3. Configure Entrust CA
  5. Select Save to save the configuration.

Manage Certificate Authority

  1. Log into the platform with administrator credentials.
  2. Navigate to Integrations > Certificate Authority.
  3. A list of configured CAs is displayed.
  4. By default, the integrated certificate authority is enabled (active status). Under the Status column, move the toggle button to the left to disable it or move it to the right to enable it.
  5. To edit, select the Pencil icon at the end of the selected CA row and modify the configuration parameters as needed. Select Update to save the changes.
  6. To delete, select the Bin icon at the end of the selected CA row. Select Yes to confirm or No to exit the process.