Entrust Inc., is extending its public key infrastructure technology to provide the Entrust Credentialing Service, an end-to-end hosted solution for organizations to issue unified smart card credentials. This system is tailored for enterprise, citizen or government environments that want to secure physical and logical access, virtual private networks (VPN) and other enterprise functions and capabilities.
Based on Entrust Managed Services PKI, the credentialing service includes all necessary components including identity vetting, data capture, personalization, printing, issuance and revocation. The credential facilitates mobility, interoperability and security of end-user access by employing one credential for building access, computer/logical access and a range of applications, including secure e-mail, document-signing and more.
In advanced deployments, the multipurpose smart cards can also include the electronic machine-readable travel document (eMRTD) data identical to an e-passport. This capability helps extend the value of the service, particularly for law enforcement organizations and government departments.
Entrust’s multipurpose smart cards that include eMRTD credentials are compliant with all ICAO standards, including Basic Access Control and Extended Access Control.
As a hosted service, Entrust credentials can even be scaled to take advantage of future biometric standards, including fingerprints, iris scans or facial recognition — all on the same smart card.
An additional layer of security can be implemented for organizations that require strong authentication for user access to VPNs or sensitive applications. Entrust’s grid authenticator can be embedded on the reverse side of the smart card. The easy-to-use grid consists of numbers and characters in a row-column format. Upon login, users are presented with a coordinate challenge and must respond with the information in the corresponding cells from the unique grid tied to their identity.
Entrust Managed Services PKI enables organizations to establish and maintain a trustworthy environment by providing certificates that secure many off-the-shelf applications using encryption, digital signatures and strong certificate authentication. This enables organizations to control access to resources, prevent theft of information, and comply with privacy and digital signature regulations.