PKI & CertificatesAlso called: "pki", "certificate infrastructure"
PKI enables secure communications and digital signatures through certificate-based trust.
PKI components
- Certificate Authority (CA): Issues and signs certificates.
- Registration Authority (RA): Verifies certificate requests.
- Certificate Revocation List (CRL): Lists revoked certificates.
- OCSP: Online Certificate Status Protocol for real-time checking.
Certificate lifecycle
- Generation: Create key pair (public/private).
- Enrollment: Submit certificate signing request (CSR).
- Issuance: CA verifies identity and issues certificate.
- Deployment: Install certificate on servers/devices.
- Renewal: Replace before expiration.
- Revocation: Invalidate if compromised.
Use cases
- HTTPS/TLS for encrypted web traffic.
- Code signing for software authenticity.
- Email encryption (S/MIME, PGP).
- Document signing for legal validity.
- VPN and network authentication.
Trust hierarchy
- Root CA (self-signed, trusted by OS/browsers).
- Intermediate CAs (signed by root).
- End-entity certificates (signed by intermediate).
Related Tools
Explore More PKI & Certificates
View all termsCertificate Transparency (CT)
A public logging system that records all SSL/TLS certificates, enabling detection of misissued or malicious certificates.
Read more →X.509 Certificate
A digital certificate standard that binds a public key to an identity, enabling encrypted connections and authentication.
Read more →