Process of governing and orchestrating digital identities – certificates and keys – of machines, devices, workloads, applications, containers, IoT, etc. It is essential for data security, integrity, and compliance, as it authenticates communicating parties and ensures all traffic is encrypted.