Development |
You pay all the development costs, including hardware, software, licenses, policy creation, auditing, and vulnerability testing.
|
Everything is already developed, implemented, tested, and refined based on feedback from real users over the years.
|
Dashboard |
You’ll have to design your own interfaces and figure out how to tie it in with your CA.
|
All the information you need can be accessed via a single portal with a comprehensive dashboard view.
|
Integrations |
It’s on you to figure out how to integrate with your existing systems and applications, then develop integrations accoringly. Most integrations will have to be built from scratch.
|
Pre-built integrations make it easy to start using your managed private CA in conjunction with your current systems.
|
Root Generation |
Generate your own root and intermediate certificates, including key ceremonies, offline secure storage, etc.
|
Root and intermediate certificates are automatically and securely generated using audited systems and standards.
|
Certificate Profiles |
Create your own certificate profiles from scratch, risking incorrect or missing extended key usages (EKUs) and certificate attributes.
|
Best practice certificate profiles have already been created for all the most common applications. Custom profiles can be quickly configured (with support assistance available if needed).
|
Access Control |
Manage user access control and create your own system for requests and approvals.
|
Certificate management functionality includes access controls and systems for requests and approvals
|
Infrastructure |
Create and deploy your own revocation infrastructure, which can be difficult to deploy, maintain, and scale.
|
Provider will deploy and manage the revocation infrastructure such as CRLs, OCSP server, etc.
|
Notifications |
Create your own notification system if you want to be alerted for reissuances, expirations, or revocations.
|
Alerts and notifications are included – all you have to do is configure who to send them to.
|