PKI and Credential Management Introduction
Controlling access is the heart of any enterprise security environment—making sure only those who have the appropriate permissions can access your data, enter your facilities, print a secure document, etc. Public Key Infrastructure (PKI) uses key pairs and certificates to verify the identity of users and systems. The digital certificate links the name of an individual to their public key. In addition to the public key, certificates contains additional information, such as issuer, what it's supposed to be used for, and any other type of metadata.
A PKI environment assigns a digital identity for all your employees and machines, allowing for secure access to data, networks and physical locations. The PKI environment includes Credential Management solutions for complete lifecycle administration of certificates and permissions.