Trust Management

Connected objects identity management

Metapki for your certificate lifecycle management and data integrity

Ensure data confidentiality, data integrity and data reliability through certificate lifecycle management with metapki

Atos, a European actor in IS security, provides metapki, a complete solution to create electronic certificates and manage their life cycle.

Information system security is an essential issue for organisations moving to paperless exchanges, whether for internal communications or for relationships with partners and customers. Electronic certificates respond to this need as they allow applications to support security services such as user authentication, non-repudiation of transactions, and confidentiality of data exchanges.

Managing security and trust

From strong authentication to access to all metapki functional entities to recording of all actions, enciphered sensitive information and private and public keys protected using Hardware Security Modules (HSM), metapki ensures data security.

Bull cyber Trust compliance


Metapki is EAL 3+ Common Criteria Certified and is also RGS basic level certified

Accompanying growth

As a European security leader, Atos has metapki’s modularity and sales conditions enable the smooth deployment of a solution tailored to the organisation’s needs: new types of certificate, new management processes, new organisational units and new Certification Authorities may be added as required.

System requirements

►  Linux Platform (e.g. Red Hat or SUSE)
►  Open source international components delivered with metapki: Apache, OpenSSL, PostgreSQL and PHP
►  LDAP Server: when the CA publishes certificates and/or LCR in a directory
►  SMTP Mail Server: when metapki sends notifications related to the management of certificates

Norms and standards

►  Certificate compliance with ITU-T X.509v3 and RFC 5280
►  Certificate enrolment protocols: SCEP, CMP (RFC 2510 et RFC4210), CCEP
►  Certificate profile compliance with ETSI TS 101 862, Netscape and Microsoft
►  Revocation information compliance with ITU-T X.509v2 LCR and OCSP Protocol (RFC 2560)

►  Certification request format: PKCS#10, SPKAC
►  Key exchange format: PKCS#12
►  Connectivity: LDAP, HTTPS, SMTP
►  HSM interface: PKCS#11


Hardware & Software for metapki hosting
►  Physical Servers: 32/64 bits platform with at least 4 Go of RAM, 10 Go of available disc memory, 2 Ethernet ports
►  Virtual Machines: VMWare, HyperV
►  Operating System: Red Hat 5 and 6 (32 or 64 bits) / SUSE SLES 10 and 11 (32 or 64 bits)
►  LDAP Server: CAs publish the certificates and/or the LCR in a LDAP directory

►  Mail Server: Email sending is possible for each step of certificates life cycle

Working station for metapki users
►  Navigator: Internet Explorer 8 version and later, Firefox, Chrome
►  Java Runtime Environment: 1.6 (superior to update 19), 1.7 et 1.8

Smart Card
►  All smart cards with PKCS#11 interface and particularly: CardOS, Gemalto ID PRIME MD840, Gemalto IAS TPC, Gemalto Classic TPC IM, Gemalto Cyberflex Access 64k v2, Morpho vpsID SmartCard Ux, ActivIdentity ActivCard 64K V2C

►  All HSM with PKCS#11 interface and particularly: Trustway Crypt2pay profil Protect, Trustway Proteccio®

Electronic certificates may be used to support:
Strong authentication for users with smart cards or USB tokens (two factor authentication)
Strong authentication for web servers (SSL/TLS)
Strong authentication for VPNs (Virtual Private Networks)
Electronic signatures to provide integrity and non-repudiation of transactions
Data confidentiality for data in transit or in storage.
Users and applications are provided with one or more key pairs (a public key and a private key) and public key certificates, generated by a Certification Authority (CA), that associate the registered user or application with the public key.
Metapki supports one or more Certification Authorities that may be independent, or subordinate CAs.
A whole range of security profiles for public certificates is supported by metapki. For each profile, the registration process may be tailored to the specific needs of the organisation and integrated with the existing IS.
A workflow manager handles the registration process in order to minimise the time to produce and manage the certificates through the use of one or more Local Registration Authorities (LRA).
A Card Management System (GesCard) for managing smart cards: customisation, PIN unblocking…
A validation authority (VeriCert) for checking the validity of a certificate against a validation policy

The eIDAS regulation allows the European Union to provide a legal framework for transnational digital transactions. It  is aiming for the enhancement of electronic exchanges’ trust. It establishes a framework for electronic identification and trust services, including the topic of the electronic signature. Thus, the eIDAS regulation enhances the transparency and reliability of transactions.

Discover how we can help you being compliant with our solutions.

Learn more about it

Related resources and news

Factsheet PKI for IoT – metapki

For managing certificates creating and managing secure identities

Information system security is an essential issue for organisations moving to paperless exchanges, whether for internal communications or for relationships with partners and customers…


Atos releases the Horus security suite for Intelligent Transportation Systems to secure communications in connected vehicles

Atos launches Horus security appliances to make the deployment of trust infrastructures easier

Partners program


Atos provides products in the field of embedded device security in the context of Infineon Security Partner Network with a solution for connected cars.

Partnership cyber security products

Atos support consists of an international team of experts who will help you get optimal use out of our products in your specific environment every day.


Other Trust Management solutions

Device Security CardOS

Secure authentication and trusted identity delivering assurance and efficiency to every sector.
Visit product page >


Creating and verifying secure transactions.
Visit product page >


A reliable time-stamping solution for transactions and archives generating time-stamp tokens (TSTs).
Visit product page >


Protecting sensible data by supporting the encryption and decryption of electronic documents.
Visit product page >


Centralizing the validation of public key certificates.
Visit product page >

Cryptographic Data Preparation Device

Managing the creation and security of EMV smart card personalization elements.
Visit product page >

Interested in our metapki solution?