Announcing: Pomerium & FleetDM integration.
Register for the webinar here.

Glossary

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI) is a system of digital certificates, certificate authorities (CA), and other security protocols that are used to secure communications and transactions over the internet. PKI enables users to securely exchange information and conduct transactions by providing authentication and encryption.

The core components of a PKI system include:

  1. Digital certificates: A digital certificate is an electronic document that contains a public key and other identifying information about an individual, organization, or device.

  2. Certificate Authorities (CA): A CA is a trusted third-party organization that issues digital certificates and manages the revocation of certificates.

  3. Public and private keys: Public and private keys are used for encryption and decryption of information. The public key is used to encrypt information, while the private key is used to decrypt it.

  4. Certification revocation lists (CRLs): A CRL is a list of revoked certificates that have been issued by a CA.

The main benefit of PKI is that it provides a secure and trustworthy mechanism for establishing identity and securing communications and transactions over the internet. By using digital certificates and certificate authorities, PKI helps to ensure that the information being exchanged is coming from the correct source and has not been tampered with during transmission.

PKI is widely used for a variety of applications, including secure email, secure web browsing, secure file transfers, and secure online transactions. It is also a critical component of many security and privacy standards, such as SSL/TLS, which is used to secure web transactions and communications.

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.

Pomerium logo
© 2024 Pomerium. All rights reserved