EASILY DEPLOY AND MANAGE
PUBLIC KEY INFRASTRUCTURE
Our software gives your company all necessary tools to manage and control the variety of certificate authorities, issued certificates and smart cards at hands of employees
Indeed CM allows for bringing the PKI usage processes into compliance with needs of business units, IT department, security service and external regulatory authorities.
Indeed Certificate Manager is intended to reduce company expenditures for routine PKI maintenance operations.
- Indeed CM can send email notifications of certain system events to the Indeed CM system administrators and users: Say, administrator and/or user receives a notification of the certificate being about to expire. This allows for timely update of the latter, thus avoiding of downtime.
- Indeed CM also allows for unlocking of locked media without addressing to administrator. Such unlocking can be performed either before or after user logon, as well as with or without explicit participation of administrator.
- The Indeed CM provides for software interface (API) to integrate to third party systems. The integration expands the Indeed CM capabilities in the sphere of automation of certificate and key media usage processes. For example, Indeed CM can revoke the certificate of dismissed employee upon event from Identity Management class system.
- Accounting of certificates issued by third parties. If the organisation uses certificates issued by third party certification authorities, the Indeed CM allows for adding those certificates to database and provide for timely reminder to administrator and user of certificate being about to expire. This allows to avoid of downtime when working with banks and trade platforms.
Indeed Certificate Manager increases the overall information security level of a company due to the following:
- Centralized application of PIN code policies When a key media is issued, it has PIN requirements written to it: complexity, change interval, history depth etc. The available parameters depend on the device model. The policies are stored and distributed centrally. The administrators do not need to configure policies for every single media.
- Key media accounting. Each device - smart card or USB token - is assigned to an employee responsible for it. Only Indeed CM administrator or the device owner can issue or update certificates for the device.
- Timely revocation of dismissed employees’ certificates. In order to disallow access of dismissed employees to corporate resources promptly, the Indeed CM contains a special service that checks the user directory through at defined intervals and revokes certificates of users marked as dismissed.
- Flexible configuration of privileges Indeed CM allows the companies to define their own security roles with configurable list of allowed operations. It makes it possible for administrators to bring the Indeed CM role model into compliance with the company business processes.
- Control of key media usage at users’ PCs. Indeed CM allows for tracking of what key media are connected to company computers and by whom. Administrator can assign a certain key media to certain user or PC. If the system discovers a discrepancy (say, a media is connected within a session of another user or to disallowed PC), then the key media might be locked.
Indeed Certificate Manager composition
The Indeed Certificate Manager architecture is based on the modular concept. Each of the modules implements a certain set of functions to solve a certain task. You can install all modules or select only required ones. It depends on the company business needs. Indeed CM consists of the following software and functional modules:
Indeed CM Server
The server is the main component of Indeed CM infrastructure that links all the system modules together.
It is an ASP.Net application, operating on Internet Information Services (IIS) server. The Indeed CM server provides for centralized management of system users, card repository and security policies. The server also provides for performing card unlock operations, as well as event logging.
The Administrator console is implemented as web application that provides administrators and operators with interface to perform all PKI maintenance operations: edit key media and certificate usage policies, perform registration and issue of devices, view logs and device registry, configure role model and control key media usage via client agents.
Self service tools
Self service tools include:
- Self service - a web application that is available to system users. This application allows to perform operations with certificates and key media on user’s own: issue, revocation, update, PIN code change etc. The set of available operations is defined by the system administrator.
- Credential Provider is a module installed to PC. It allows for unlocking of key media at user workplace in online or offline mode without logging in to operating system.
The log registers all the events associated with smart card life cycle, operation of agents and Card Monitor service, as well as system parameters’ modification. The log can be viewed in the Indeed CM administrator console. Reports can also be generated in the console.
Indeed CM data storage
Indeed CM data (information about devices, certificates, system settings) can be stored in SQL database or in Active Directory. In the latter case no scheme expansion is required. All the data is localized in a separate container. The data in the storage is encrypted with server key.
The Card Monitor service is intended for operations of controlling smart card and USB token usage.
The service performs the following operations:
- Revocation of key media and certificates of dismissed employees
- Revocation of expired temporary media
- Deactivation (optional) of devices and revocation of certificates for the users, whose Active Directory accounts are disabled
- Status setting for certificates stored on key media (about to expire/expired)
- Update of key media contents
- Sending of email notifications to the system administrators and users:
- User certificate expiration
- Key media issue approval / rejection
- Approval or rejection of renewal for certificates
- Approval or rejection of key media replacement
- Change of Indeed CM policy applying to user
Connectors to certification authorities
The Indeed CM has special connectors to communicate with certification authorities (CA).
Indeed CM performs the following operations using these connectors:
- Receiving certificate templates
- Creation and sending of certificate requests
- Certificate request approval
- Certificate issue
- Certificate suspension and revocation
- Certificate status checking
Indeed Certificate Manager supports the following certification authorities and digital signature services:
- Microsoft CA
Connectors to user directories
Indeed Certificate Manager receives information about users from external directory. Microsoft Active Directory or CryptoPro CA user database can be used as user directory.
Indeed CM API is used to manage key media and certificates of users from external systems, such as Identity Management (IDM).
API provides for functionality required for the following scenarios:
- Automatic assignment of PKI usage policy to a user (what certificates are to be issued, what operations with key media are available to user etc.)
- Automatic revocation, suspension and reactivation of user certificates (say, in case of dismissal, leave or change of position).
Connector to Indeed AM
The connector to Indeed Access Manager (Indeed AM) access management system automatically registers the media issued in Indeed CM in the Indeed AM database. After that the user can immediately use the smart card or USB token not only for digital signature operations, but also to access the informational systems using Indeed AM Enterprise SSO.
Connector to smart card printer
Connеctor to special smart card printer allows for significant reducing of time spent on personalization and issue of large number of smart cards for employees. The Indeed CM makes it possible to issue the certificates and write them to smart cards, as well as personalize the cards by printing the card owner data on the card within a single operation.
The client agent is installed onto user PCs and is used to control usage of smart cards, USB tokens and certificates on workplaces.
The agent performs the following operations:
- Sends the data on the key media used to the Indeed CM server - what PC the token or smart card is connected to and who exactly is working on the PC.
- Locks Windows session or key media, if usage rules are violated. E.g., a smart card might be assigned to user account or PC. If the user or PC does not correspond to the preset one, the agent might lock the smart card.
- Change user PIN code upon administrator request
- Media lock upon the administrator request
- Media unlock
- Update of certificates on the media.
- Deleting of data from the key media.
Thus, the agent allows the administrators to audit smart card and token usage, as well as to perform operations with key media remotely on user PC. The agent also can prevent unauthorised use of the media.
Indeed AirKey Enterprise
Indeed AirKey Enterprise is the software implementation of a smart card, that lets a user to perform the same operations as the hardware smart card does.
- digital signing of documents;
- data encryption and decryption;
- two-factor user authentication (operating system logon is also supported);
- operations according PKCS#11 and Microsoft CryptoAPI standards;
- provision of access in Single Sign-On mode.
Indeed AK Enterprise simulates a hardware smart card behaviour completely. For operational system of PC and for target applications the user works with, the Indeed AirKey Enterprise is indistinguishable from a traditional smart card. The Indeed AirKey Enterprise operation is based on correspondence to standard protocols, interfaces and mechanisms of PKI infrastructure. The private keys are not sent to user PC but stored in the database of Indeed AK Enterprise server in encrypted form. Cryptographic operations are performed at the server within system processes of Indeed AK Enterprise server. To provide for security, the communication channels between user PC and the server are encrypted using asymmetric encryption algorithms. The encryption protocol is TLS. Only the result of cryptographic operation is sent to user PC (public key, signed or decrypted data).
The Indeed AK Enterprise has the following advantages as software implementation of smart card:
- No hardware components. Plastic smart cards or USB tokens can be broken, lost or left behind. They also require periodic replacement. Virtual smart card has none of the mentioned disadvantages.
- Execution of cryptographic operations at server. The private key is not stored at the client side. Therefore it cannot be compromised by malware or intruder.
- Full control of usage by informational security specialists. All operations of issue, revocation and connection of virtual smart card to a user PC are logged in the system log. Informational security specialists can stop usage of Indeed AK Enterprise smart card by revoking the card remotely and deleting the private keys.
- Remote delivery of smart card to a user. Virtual smart card is delivered to a user PC remotely without his or her participation. A user does not have to obtain the card in person from the system operator. The Indeed AK Enterprise card appears in operating system of user PC as soon as the operator issues it at his/her workplace.