IDnomic PKI products

Secure and trusted digital identities

How to ensure to your company a high level of trust?

Digital transformation is more than a mere change in the way we traditionally use digital devices. It’s a revolution that’s shaking up the world as we know it, radically altering our personal and professional lives, generating new needs and facilitating synergies between intelligent entities, should they be humans or machines.
By placing data at the core of our strategic assets and major growth projects, by developing ultra-mobility, paperless, business process automation and the ability to better manage company performance, digital technologies urge us to become more agile, innovative and quick to react while ensuring a high level of trust when sharing data.

This requires establishing a technological link between a real, physical identity and its digital representation. This link is the digital identity. The challenge is for this identity to be capable of working while trusting the environment with which it interacts, and to be guaranteed absolute protection. This is what digital trust is all about.

Download IDnomic PKI solution brochure

Atos cybersecurity IDnomic offer

Each day, IDnomic PKI solutions allows millions of people to authenticate and securely access IT resources and to exchange data from their PC, tablet or mobile. Our solutions also help to protect electronic documents and enable digital trusted public services for citizens. IDnomic solutions protects them wherever and whenever they need it.

To follow or contact us:
Linkedin | Twitter

PKI solutions for trusted digital identities – IDnomic

What is a Public Key Infrastructure (PKI)?

 

Atos cybersecurity Trusted digital Identities

PKI is a set of policies, processes, and technologies used to issue trusted identities and secure communications.

PKI uses public key cryptography and electronic certificates to verify, enroll, and certify users and machines.

With PKI, organizations establish and maintain a trustworthy networking environment by using strong authentication, data encryption and digital signature.

What are the key components of a PKI?

The Public key Infrastructure (PKI) includes various components that work together to deliver and manage digital identities in the form of certificates. The key components are described below:

  • Certificate Authority Module: ID CA
    ID CA is a trust entity that enables secure, centralized management (creation, organization and maintenance) of Certificate Authority lifecycles and the production of digital certificates. ID CA guarantees certificate integrity and the authenticity of the data contained in the certificates that are issued.
  • Registration authority module for objects and machines: ID RA
    ID RA is a Registration Authority in charge of checking the credentials of a certificate requester. It also offers an easy way to manage the workflow of certificates.
  • Credential management system module for users: CMS
    The CMS enables complete management of user certificate lifecycles and facilitates the global administration of cryptographic media, providing administrators with a single and secure system to manage all user identities. The CMS covers all security needs and integrates with third party software solutions such as mobile device management (MDM) and Single Sign-on (SSO) >>.

Why choosing IDnomic solutions

Atos cybersecurity IDnomic PKI solution

*Hardware and software components including Trustway HSM >>

What are electronic certificates used for?

Strong Authentication for users (smart cards/USB token based), web servers (SSL/TLS), Virtual Private Networks (VPN)

Electronic signatures to provide integrity and non-repudiation of transactions

Data confidentiality for data at rest, in use and in transit

Document and code signing.

IDnomic PKI certifications

Certifications

Digital identity partners

Atos with its extended ecosystem of technology partners guarantees the security of the digital identities while ensuring compliance to increasing regulations.

Partners

Digital identities solutions: use cases

 

Increase the level of trust of your information system with an effectively managed environment that support all your use cases and digital identities: users, objects, machines and documents.

IDnomic for users

IDnomic for users provides physical person authentication for access to information technology systems and e-Services as well as for exchanging information in complete security.

IDnomic for documents

IDnomic for documents delivers the trusted infrastructure required to ensure the integrity of identity documents like passports and electronic identification (eID). The solution also enables systems to validate the authenticity and integrity of electronic messages.

IDnomic for objects

IDnomic for objects delivers digital identities to machines and connected objects. A highly diverse range of equipments is covered, ranging from IT servers to objects with limited memory, capacity and secure data space.

Related resources

Atos cybersecurity IDnomic solutions brochure

Brochure

IDnomic – Digital identity solutions

With IDnomic solutions, discover four digital identity solutions based on our PKI technologies are available to secure all your digital practices.

Brochure

IDnomic ID PKI Suite – Digital identity platform

ID PKI suite, the digital identity platform by IDnomic, helps you protect digital data transfers and manage credentials stored in any type of cryptographic device, while meeting the highest criteria when it comes to security, quality and robustness.

Atos cybersecurity IDnomic Services brochure

Brochure

IDnomic – Services for your digital trust

To help you place digital trust at the very heart of your business, IDnomic teams are at your service at each stage of your project to fulfi ll your strategic choices and ambitions and to help you place digital trust at the very heart of your business.

Interested in our PKI solutions?