New Features, Upcoming Releases & everything else you need to know

The ADSS CA server supports mass key generation protected with an HSM.

Posted by Wahaj Khan on Sep 23, 2014 2:29:00 PM

Hardware Security Modules (HSMs) are a fundamental part of a high trust solution. They offer fast, secure processing of private keys, which ensures that keys cannot be created, copied, changed or deleted without appropriate permission or stolen without being noticed. They also off-load the processing cost of digital signatures for high performance systems such as time stamping servers or certificate validation servers.

Read More

Timestamp authority server - the must have features!

Posted by Liaquat Khan on Jun 10, 2014 1:10:00 PM

This article describes why RFC3161 compliant Time Stamp Authority (TSA) servers are needed and what to look for when choosing a Timestamp Authority (TSA) server. ETSI TS 101 861 and TS 102 023 also places important requirements for TSA services providers and these are also considered in this hot topic.

Read More

ADSS Server now integrates with MS active directory

Posted by Wahaj Khan on Sep 18, 2013 2:28:00 PM

ADSS Server v4.8+ supports clever integration with Active Directory and other LDAP compliant directories to enable seamless and automatic management of each user’s digital certificate, including generation, revocation and re-issuance.

Read More

Certificate transparency – The quick detection of fraudulent digital certificates

Posted by Liaquat Khan on Aug 29, 2013 2:25:00 PM

SSL Trust Issues

India's National Informatics Centre (NIC) has now joined the infamous Dutch CA DigiNotar in issuing fake and unauthorized digital certificates, yet again damaging the faith we place in Certification Authorities to provide high trust identity assurance.

Read More

Importance of certificate whitelist checking

Posted by Liaquat Khan on Aug 3, 2013 2:24:00 PM

Using PKI-based digital certificates has become a widely accepted means of electronic identity authentication for all kinds of purposes, from logical/physical access control to document signing, server authentication for e-commerce sites and software code authentication.

Read More

PDF signatures - using them to advantage

Posted by Liaquat Khan on Jul 2, 2013 1:48:00 PM

PDF documents have been common use within business for many years. Protecting PDFs against change is fast becoming a hot topic. Digitally signing PDFs with a certifying signature protects the content and also shows who signed or approved the document. This article explains how you can easily digitally sign PDFs, it covers what is needed to electronically sign PDF documents and the different types of PDF signatures.

Read More

Online document signing - the must have features

Posted by Liaquat Khan on May 16, 2013 1:08:00 PM

Getting a document approved and signed-off is a crucial part of any business, be it an order, sales contract, claim forms, internal HR documents or any other type of document that needs to be clearly agreed and approved preferably with a clear audit trail.

Read More

PEPPOL quality trust ratings - explained

Posted by Liaquat Khan on Apr 15, 2013 1:03:00 PM

PEPPOL is a large-scale European Commission project, working on allowing any company in the EU to be able to communicate electronically with any EU governmental institution for all procurement processes.

Read More

ETSI PAdES - explored and explained

Posted by Liaquat Khan on Apr 10, 2013 12:59:00 PM

Within Europe a new digital signature format “PAdES” is gaining traction. PAdES stands for “PDF Advanced Electronic Signatures” and is a set of standards published by ETSI (TS 102 778 parts 1 to 5) to support European requirements for electronic signatures. The purpose is specifically for creation of long-term signatures that are verifiable for years or even decades.

Read More

Recent Posts

Popular Reads

Download this essential eBook

Download your eBook

Choosing the right type of e-signature
for your business