Public Key Infrastructure

Digital Key Management

Digital Certificates

TLS/SSL Certificates

Certificate Management

Certificate Authority

Certificate Scanning

Encryption Standards, Regulations, and Algorithms

Certificate Request

Chain of Trust

Certificate Provisioning

Certificate Renewal and Revocation

Crypto Agility

Buying a Certificate from CA

PKI for IoT

Gartner Hype Cycle for IAM Technologies 2020


Control Your Certificates Before They Go Rogue!


Spending too much on PKI Management?

With AppViewX you could save up to $30/certificate! Use our free Savings Calculator to find out how much you could save by automating certificate lifecycle management.

Calculate Savings

Other than TLS/SSL certificates signed by a CA, there’s also something called self-signed certificates. These certificates are signed by the owner of the server themselves. Though they offer the same level of encryption as a CA-issued certificate, they are usually not trusted by clients which are configured to recognize only certificates issued by a known CA. In case a connection does get established between a self-signed certificate server and the browser, the owner of the server remains anonymous. Self-signed certificates can be created by hijackers as well.

Because of the security threats that they pose, these certificates are to be deployed only in the local environment for testing or troubleshooting purposes and not for public use.

Related Articles:   What is TLS Handshake?