Manage PKI centrally

The solution based on Indeed CM controls the use of digital certificates and smart cards by the company’s employees and logs user’s activity

schedule demo

Introducing the solution — explained in 3 minutes

Addressing security tasks with efficient pki

Today digital signatures and digital certificates are widely used not only for meeting the internal needs of organizations, but also in interagency e-document flow, online banking, and e-tendering. In other words, proper, competent and secure use of digital signatures is critical for any organization.

PKI and asymmetric cryptography can help your company to address the following information security tasks:

  • Replace outdated password authentication with strong two-factor authentication for access to operating systems and applications (VPN, VDI, etc.)
  • Digitally sign and encrypt email
  • Use a qualified electronic signature to comply with regulatory requirements, enable legally valid document flow, interact with online banking systems, and participate in tenders and procurement
  • Encrypt files, disks, and other data

However, to properly support your PKI you have to address a number of new challenges:

  • Consistently manage different models of your tokens, as well as certificates issued by various certificate authorities.
  • Bring your certificates in line with user tasks, i.e. make sure that each smart card contains all the certificates required by the user without any redundant certificates.
  • Centrally manage policies regarding user PIN codes for tokens, i.e. establish policies for PIN code complexity and PIN change frequency.
  • Carefully monitor certificate validity and ensure their timely renewal.
  • Keep track of your tokens and assign them to specific employees and workstations to control how PKI tokens are used in your company.
  • Keep a log of cryptographic facilities.
  • Unlock the tokens that get locked when users forget their PIN codes.

As cloud computing continues to evolve and remote work gets more popular, various new technologies that do not require a hardware token for storing key data are gaining traction, such as network and virtual smart cards and electronic signature in the cloud and smartphone.

Addressing the challenges related to the operation and management of your PKI infrastructure may require a lot of time and money, not to mention the related information security threats. The optimal solution for addressing this task would be to use a specialized PKI Management product designed for centralized monitoring and management of your PKI.

The primary function of such products is to serve as a «certificate manager». These software suites can help you significantly improve the efficiency of your PKI management and enhance your information security.


If you want to boost the efficiency of your PKI management, and to reduce the related costs, your best choice is to use a comprehensive solution, Indeed Certificate Manager. This product was designed to ensure centralization and increased efficiency of all operations related to digital certificates as well as PKI tokens.

Notably, Indeed CM is completely independent from the developers of certificate authorities and hardware tokens. This is why this solution works well for a variety of PKI products.

The Indeed CM platform offers the following functional features:

  • Management policies (issue, renew, revoke) for all certificates used in your company
  • Management policies for PKI tokens
  • Integration with public key infrastructure components: certificate and registration authorities, smart card printers, etc.
  • Integration with IT infrastructure components: directory services, certificate stores, mail services, etc.
  • Integration with information security tools: authentication management systems, workstation protection tools
  • Management services for PKI administrators and operators
  • User self-service
  • Summary of managed objects (users, tokens, digital certificates)
  • APIs for integration with third-party systems

Indeed CM supports the following operations with electronic signature keys and certificates:

  • Initiate key pair generation and send certificate request to the CA
  • Issue and revoke public key certificates
  • Ensure timely renewal of certificates

Indeed CM supports the following operations with PKI tokens:

  • Initialize a token and assign it to the user
  • Lock and unlock a token
  • Set and change user and administrator PIN codes (password policies are supported)

In other words, PKI administrators and operators can use Indeed CM as a multi-purpose console for certificate and PKI token management.

All parameters in Indeed CM can be set up via relevant policies. A policy contains all the necessary data to connect to certificate authorities, a list of certificates to be issued, and additional certificate parameters (create keys backups, reuse keys when renewing expiring/expired certificates, etc.).

A policy can be applied to a specific unit in the organizational structure (for example, an OU in an Active Directory Domain), and the settings for all users located in this unit or its child objects will be aligned with the policy.

You can also define user groups to filter the policy scope. That is, you can assign several policies to a single object in your organization, and the relevant policies will be selected based on user groups.

Technical parameters

Integration with Active Directory.

Certificate authorities:

  • Microsoft CA
  • Cryptovision CAmelot

Types of operations with CAs:

  • Obtain certificate templates
  • Approve certificate requests
  • Issue and reissue certificates
  • Suspend and revoke certificates
  • Check certificate status
  • Create and update CA user data

Token types:

  • Removable hardware tokens
  • Microsoft Windows Registry
  • Trusted Platform Module (TPM)
  • Microsoft Windows Hello for Business
  • Indeed AirCard Enterprise

Removable hardware tokens:

  • ACOS (ACS)
  • HID Crescendo (HID)
  • ID-One Cosmo (Bit4id)
  • SCinterface (cryptovision GmbH)
  • TicTok V2, V3 (CRYPTAS it-Security GmbH)
  • eToken and IDPrime (Thales Group, the former SafeNet and Gemalto)
  • YubiKey (Yubico)
  • ePass (FEITIAN)

Get the budget estimation of your project

get questionnaire


Learn how multiple industries enjoy benefits from implementing our products


industry about us

Andy Woo
Regional Director of Pacific Tech

At Pacific Tech, we are continuously evolving and bringing new solutions to our partners and customers in the region. We are delighted to be partnering with Indeed Identity. With Indeed Identity, we found a comprehensive access management solution which perfectly complements the growing population of Singapore work-from-home workers. As a leading cyber security solution provider, this strategic partnership is perfect for our two companies.

read more
KC KuppingerCole Report
Executive view

Indeed Identity’s innovative approach towards designing its whole product portfolio as a highly modular open application platform allows the customers to pick and choose the modules as needed and grow in the future as their business needs expand. Even out of the box, Indeed Certificate Manager provides comprehensive yet convenient management capabilities for both administrators and end users.

read more
Michael Bürger
Founder & Sales Partner at EU-HUB Network

Since approximately 5 years now I’m working with Indeed Identity quite successfully. First as my vendor client and next as a trusted innovative software partner. Now we are re-selling Indeed Identity software as a Distributor for the EU and beyond. Often I met Indeed Identities CEOs, CTO, Product Management, Partner Managers and System Engineers, on the the phone and even in person in London and Munich and always my feeling was that this is are smart people, an excellent organized company, straight forward thinking and | don’t have any doubt that together we will be very successful this decade in the 2020s on everything we target.

Leo Querubin
Executive Director for Business Development of Pointwest Technologies Corporation

The products of Indeed Identity, like Indeed Access Manager, a software for strong and multi-factor authentication (MFA), can provide the structural changes that force everyone to follow necessary cybersecurity procedures. Customers get the best of both worlds — the world-class cybersecurity products of Indeed Identity and the experience and expertise of the local cybersecurity landscape of Pointwest.

read more
Volkan Duman
Information Technologies General Manager at vMind

As a result of the long-term laboratory tests and studies that we conducted, we believe that Indeed Identity products should certainly be on the Turkish market. Thanks to our partnership with Indeed Identity, we sought to expand the access control and certificate management market, which is located in a narrow profile in the country, as well as add value by transferring technology to our country. When we compare Indeed Identity products with similar products, we can safely say that they contain much more different features and are more inclusive.

read more
Marko Pust
Director of OSI.SI

We have a long partnership with Indeed Identity for more than 2 years already. I can confidently say that Indeed CM is one of the best and technologically enhanced products for managing digital certificates and smart cards on the EU market. This product has a number of unique features such as Client Agent and Indeed AirCard Enterprise network-attached smart card that are highly valued by our customers. One of the customers said that Indeed CM brought automation and visibility to their PKI life.

Heng Lie
Director of Synnex Metrodata Indonesia

I believe that Indeed Access Manager is an excellent solution for many of our clients. It manages access to all information systems of the enterprise and protects companies from internal and external cyber threats. It is a flexible platform combining different authentication scenarios and methods.

Sergey Yeliseyev
X–Infotech Owner, Business Development Director, Government eID solutions

Indeed Identity is the company of professionals in the field of information security. They provide top-level solutions for PKI management and access control to corporate resources. We recommend this company as a reliable partner.