Jellyfish – All of Government PKI as a Service – Case Study
Public Key Infrastructure (PKI) is a system of cryptographic technologies, standards, management processes and controls governing the use of digital certificates. It is an enabling technology. This means it enables users of an insecure public network (such as the internet) to securely and privately exchange data through the use of a public/private cryptographic key pair that is obtained and shared through a trusted authority.
The PKI was expected to support a large number of users, devices, software applications, business systems and organisations acting for or on behalf of the New Zealand (NZ) Government across complex eco systems.
Contact us for more
Jellyfish – Identity Brokerage – Case Study
Cogito Group’s identity brokerage offering allows for a shared network and services infrastructure. It enables users in multi-tenanted government buildings to consume services without the need to duplicate the infrastructure. It is one- trust point. Basically, it shares the one connection idea of the network service with an ‘all of government’ directory or identity store of users, devices and other resources (even down to meeting rooms).
There are a number of business drivers pushing the adoption of identity brokerage, these include:
• Reducing duplication of services through shared services among building tenants
• Removing the need to implement trusts between agency identity stores
• Reducing the cost of managing credentials,
• Reducing the difficulties in complying with regulations and
• Reducing the interoperability complexities associated with supporting multiple identity protocols.
Jellyfish – Integrated PKI & CMS – Case Study
Our client wanted to address the issue of many stove-piped security systems that didn’t talk to one another, specifically in regards to its Public Key Infrastructure (PKI) and Card Management Solution. The goal was to develop linkages and workflows to centrally manage all of their security platforms in one place. Specifically:
• Provide a holistic view of connected security systems
• Search across multiple CA’s (and CA vendors)
• Each CA has its own interface to request certificates
• Register soft certificates in an anonymous portal
• Registration from CMS portal