Red Hat Certificate System

Ensure the privacy of your communications

Red Hat® Certificate System provides a powerful security framework to manage user identities and ensure communication privacy.


Handling the major functions of the identity lifecycle, Red Hat Certificate System simplifies enterprise-wide deployment and adoption of a public key infrastructure (PKI). A security infrastructure requires a scalable and manageable authentication system to ensure that only authorized users and applications have access to mission-critical resources and data.


Cryptographically strong security

Red Hat Certificate System uses Federal Information Processing Standards (FIPS) 140-2 Level 2 validated security libraries and can be used with Level 3 validated hardware. It also enables secure communication and document encryption with secure key escrow.

High availability and scalability

  • Supports distributed architecture for high availability

  • Allows for cloning of certificate authorities for scalability without creating subordinate certificate authorities

  • Integrates easily with third-party security software and existing applications through published application programming interfaces (APIs)

Multifactor authentication

Red Hat Certificate System includes a cards management system, supporting Global Platform-compliant smart cards, which greatly simplifies all key management tasks, like initial enrollment, key archival, PIN reset, and key recovery.


Contact Red Hat Sales

For more information, or to participate in a free trial evaluation of Red Hat Certificate System, contact Red Hat sales on the web or call 1-866-273-3428 x45313.


Featured datasheets

Get technical information about Red Hat Certificate System: