SlideShare a Scribd company logo
CA
emCA Certificate Lifecycle
Management Suite
AATLAccredited
40 million trusted public signatures issued,
WebTrust accredited, EAL 4+ CC compliant,
ISO/CMMI certified. Experience you can trust.
End-to-end Consulting
PKI is our bread and butter. Having done it every day
for 10 years at a retail level and a B2B level, we’re quite
aware of how it works, what the typical issues are, and
how best the processes can be streamlined. Leverag-
ing the same expertise and experience, we offer
end-to-end consulting services—from deploying PKI
infrastructure to enabling successful WebTrust audits,
planning Data Centers, determining levels of Assur-
ance, creating bespoke scenarios and implementing
custom built solutions.
Superior Product Capability
emCA has been built keeping in mind our needs as a
public CA, and our learning from venturing out into the
Enterprise, IoT, and Blockchain world. As a result, our
CA system is robust, scalable, and works in IoT, Block-
chain, and network security ecosystems quite effective-
ly in addition to conventional use cases.
Support for a Wide Variety of Use Cases
Out of the box emCA supports issuance of Digital
Signature Certificates to user, server, network device,
mobile phone, TPM (Trusted Platform Module), Trust-
ed Execution Environment (Strong Box), IoT device, etc.
Cost effective solution
Faster deployment
Better management of RA's
Superior support
Easy migration
Ability to provide managed services
Used in Webtrust compliant deployments
Aadhaar eSign - eMudhra developed and
deployed at scale national ID based signing
emCA is used extensively in the world’s second
largest armed forces
Mauritius Root PKI - eMudhra set up the Root
PKI and issuing CA for Mauritius
eMudhra Public CA - eMudhra’s Public CA runs
on emCA Suite and supports a 13,000 large
re-seller network
World's largest outsourcing company used
emCA for signing and management of Employ-
ment Eligibility (I-9) Forms in the US
emCA is used to issue Digital Signature Certifi-
cates to electronic voting machines
emCA supported IoT deployment for a large
diesel generator manufacturing company
Key ProjectsBenefits
CA
Today, companies are deploying billions of
Internet-connected devices into mission-critical
systems. Such kind of mass deployments are
resulting in security risks with implications that
grow with the number of deployed devices.
Gartner touts PKI as a leading choice for providing
information and communication security in such a
challenging environment. Hence why not make PKI a part
of your IT infrastructure by utilizing emCA — eMudhra’s
PKI powered digital certificate issuance and management
solution. Built exclusively to provide trust and control,
emCA is a robust, standards compliant, fully scalable,
policy driven PKI solution designed to provide unparal-
leled security services, which include authentication of
user and device, data security, integrity and verification.
10 Years as a Public Certifying Authority
eMudhra just completed its 10th year as a Public Certify-
ing Authority under the Indian Root. eMudhra is also a CA
under the Mauritian root and is currently gearing up to
become a global trust provider. That’s a lot of audits,
documentation, and compliance which we manage on a
regular basis.
A Pioneer, Not a Follower
We take pride in being a thought leader in our space.
From National ID based one-time-use eSign, to Cloud PKI
for mobility, we are constantly thinking what’s next. We
ensure that we focus equally on convenience of PKI as we
do on security to ensure quick adoption and effective
Digital Transformation
Technical Details
Recommended hardware
Protocols
SCEP, CMP, OWASP, HTTP, HTTPS, SMTP,
FTP, WSS, LDAP
RFC’s
RFC 6960, RFC 6962, RFC 5273, RFC 4210,
RFC 3161, RFC 4998 ERS, RFC 4810
Web Services
SOAP, REST
Signature Algorithms
SHA1WithRSA
SHA256WithRSA
SHA384WithRSA
SHA512WithRSA
SHA1WithECDSA
SHA256WithECDSA
SHA384WithECDSA
SHA512WithECDSA
Key Algorithms
RSA- 1024
RSA- 2048
RSA- 4096
RSA- 8192
ECDSA- 256
ECDSA- 384
ECDSA- 521
Key Modules
CA
Certificate Lifecycle Management
Online Certificate Status Protocol Responder
Timestamping Authority
Validation Server
API Gateway
Web Sockets
CRL Manager
Key Archival
Processor: 2 * Quad core Processors
RAM: 32 GB
HDD: 1 TB SAS HDD
(Integrated App & DB Server)
OS Compatibility
Windows Server 2008+ Enterprise,
RHEL 5+, AIX 7+, Suse 12+ and
Solaris 10+
Application Server
Apache Tomcat 7+, JBoss 7+,
Web Sphere 8+, Web Logic 12+
DB Compatibility
Oracle 10g+, SQL Server 2008+, MySQL 5+,
DB2 9+, Postgre 9+
Algorithms & Standards
MAC, HMAC, Triple DES, AES 256
X.509 v3, PKIX, XAdES, PAdES, CRL v2
Java
Oracle JDK 1.7+
Security Compliance
EAL 4+ CC Protection Profile 1.5 compliant
WebTrust Compliant
Management and Monitoring
Uses m out of n authentication
Support segregation of duties
Secure Audit Logging
Support for HSM
Thales
Safenet
Cavium
Ultimaco
Tamper Proof Logging
emClick Certificate Download App
Auto Enrollment
Subscriber Portal
Inventory Management Portal
Registration Management Portal
Certifying Authority Portal
OSCP and Timestamping Client
US
About eMudhra:
© eMudhra. All Rights Reserved.eservices@emudhra.com
Much like the name, which is an embodiment of the seal of
authenticity in the electronic or digital world, eMudhra is a cyber
security solutions company and a trust service provider that is
focused on accelerating the world’s transition to a secure integrated
digital society. With presence in 5 continents and a global delivery
center in Bengaluru, India, eMudhra is empowering secure digital
transformation of over 45 global banks, several Fortune 100
customers and thousands of SMEs.

More Related Content

PDF
bcs_sb_TechPartner_SSLVisibility_Venafi_EN_v1e
PPTX
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
PPTX
From Cisco ACS to ISE
PDF
Identiverse - Microservices Security
PDF
Demystifying TrustSec, Identity, NAC and ISE
PDF
Cisco Trustsec & Security Group Tagging
PPSX
ISE_Pub
PDF
Brochure stonegate sslvpn-x_a4x
bcs_sb_TechPartner_SSLVisibility_Venafi_EN_v1e
MTLS - Securing Microservice Architecture with Mutual TLS Authentication
From Cisco ACS to ISE
Identiverse - Microservices Security
Demystifying TrustSec, Identity, NAC and ISE
Cisco Trustsec & Security Group Tagging
ISE_Pub
Brochure stonegate sslvpn-x_a4x

What's hot (20)

PDF
Rsa two factorauthentication
PDF
Paul hobbs @ Verzon Digital Media Services
PPTX
Safenet Authentication Service, SAS
PDF
CISCO ACS 5.6 Migration Guide
PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PDF
Cisco Study: State of Web Security
PDF
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
PPTX
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
PDF
Blockchain Spain - Ramón Abruña
PPTX
Cisco Identity Services Engine (ISE)
PDF
Sangfor SSL VPN Brochure
PDF
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
PDF
Guide: Security and Compliance
PDF
Sangfor SSL VPN Datasheet
PPTX
Ping Identity
PDF
Technical considerations for Blockchain networks with AWS
PDF
SDP Glossary v2.0
PPTX
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
PDF
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
PPTX
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Rsa two factorauthentication
Paul hobbs @ Verzon Digital Media Services
Safenet Authentication Service, SAS
CISCO ACS 5.6 Migration Guide
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Cisco Study: State of Web Security
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
Blockchain Spain - Ramón Abruña
Cisco Identity Services Engine (ISE)
Sangfor SSL VPN Brochure
WSO2 Guest Webinar: FIDO Universal Second Factor (U2F) for WSO2 Identity Server
Guide: Security and Compliance
Sangfor SSL VPN Datasheet
Ping Identity
Technical considerations for Blockchain networks with AWS
SDP Glossary v2.0
apidays LIVE New York 2021 - Securing access to high performing API in a regu...
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
Operational Complexity: The Biggest Security Threat to Your AWS Environment
Ad

Similar to eMCA Suite (20)

PDF
How EverTrust Horizon PKI Automation can help your business?
PDF
App viewx cert+
PDF
COMODO Certificate Manager
PDF
Oracle Blockchain Platform
PDF
CCM_WP-9-8-16-v10__MT_GP_Final
PDF
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
PDF
CERT_ver-1.4
PPTX
Symantec Web Security Solutions
PDF
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
PDF
eMAS Multifactor Authentication
PDF
Bloombase Spitfire SOA Security Server Brochure
PDF
Cisco Connect Halifax 2018 Cisco dna - network intuitive
PDF
eSmartLock CER 2005 show Brussels
PPTX
Impact of digital certificate in network security
PPTX
Impact of digital certificate in network security
DOCX
Mohammad Fahim Complete CV 26sep2015
PPT
Cartes Asia Dem 2010 V2
PDF
SD-WAN - comSpark 2019
PDF
Adopting the Right Architecture for IoT Implementation
PDF
Understanding CCIE Data Center: A Comprehensive Guide
How EverTrust Horizon PKI Automation can help your business?
App viewx cert+
COMODO Certificate Manager
Oracle Blockchain Platform
CCM_WP-9-8-16-v10__MT_GP_Final
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
CERT_ver-1.4
Symantec Web Security Solutions
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
eMAS Multifactor Authentication
Bloombase Spitfire SOA Security Server Brochure
Cisco Connect Halifax 2018 Cisco dna - network intuitive
eSmartLock CER 2005 show Brussels
Impact of digital certificate in network security
Impact of digital certificate in network security
Mohammad Fahim Complete CV 26sep2015
Cartes Asia Dem 2010 V2
SD-WAN - comSpark 2019
Adopting the Right Architecture for IoT Implementation
Understanding CCIE Data Center: A Comprehensive Guide
Ad

More from Kalyana Sundaram (6)

PDF
PDF
PDF
PDF
PDF
eMAS Indentity and Access Management
PDF
Krish IT Profile
eMAS Indentity and Access Management
Krish IT Profile

Recently uploaded (20)

PPTX
Transform Your Business with a Software ERP System
PDF
Nekopoi APK 2025 free lastest update
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PPTX
history of c programming in notes for students .pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
ai tools demonstartion for schools and inter college
PPTX
ISO 45001 Occupational Health and Safety Management System
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
System and Network Administration Chapter 2
Transform Your Business with a Software ERP System
Nekopoi APK 2025 free lastest update
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
history of c programming in notes for students .pptx
Odoo POS Development Services by CandidRoot Solutions
Upgrade and Innovation Strategies for SAP ERP Customers
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
ai tools demonstartion for schools and inter college
ISO 45001 Occupational Health and Safety Management System
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
CHAPTER 2 - PM Management and IT Context
How to Choose the Right IT Partner for Your Business in Malaysia
VVF-Customer-Presentation2025-Ver1.9.pptx
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Design an Analysis of Algorithms I-SECS-1021-03
System and Network Administration Chapter 2

eMCA Suite

  • 2. 40 million trusted public signatures issued, WebTrust accredited, EAL 4+ CC compliant, ISO/CMMI certified. Experience you can trust. End-to-end Consulting PKI is our bread and butter. Having done it every day for 10 years at a retail level and a B2B level, we’re quite aware of how it works, what the typical issues are, and how best the processes can be streamlined. Leverag- ing the same expertise and experience, we offer end-to-end consulting services—from deploying PKI infrastructure to enabling successful WebTrust audits, planning Data Centers, determining levels of Assur- ance, creating bespoke scenarios and implementing custom built solutions. Superior Product Capability emCA has been built keeping in mind our needs as a public CA, and our learning from venturing out into the Enterprise, IoT, and Blockchain world. As a result, our CA system is robust, scalable, and works in IoT, Block- chain, and network security ecosystems quite effective- ly in addition to conventional use cases. Support for a Wide Variety of Use Cases Out of the box emCA supports issuance of Digital Signature Certificates to user, server, network device, mobile phone, TPM (Trusted Platform Module), Trust- ed Execution Environment (Strong Box), IoT device, etc. Cost effective solution Faster deployment Better management of RA's Superior support Easy migration Ability to provide managed services Used in Webtrust compliant deployments Aadhaar eSign - eMudhra developed and deployed at scale national ID based signing emCA is used extensively in the world’s second largest armed forces Mauritius Root PKI - eMudhra set up the Root PKI and issuing CA for Mauritius eMudhra Public CA - eMudhra’s Public CA runs on emCA Suite and supports a 13,000 large re-seller network World's largest outsourcing company used emCA for signing and management of Employ- ment Eligibility (I-9) Forms in the US emCA is used to issue Digital Signature Certifi- cates to electronic voting machines emCA supported IoT deployment for a large diesel generator manufacturing company Key ProjectsBenefits CA Today, companies are deploying billions of Internet-connected devices into mission-critical systems. Such kind of mass deployments are resulting in security risks with implications that grow with the number of deployed devices. Gartner touts PKI as a leading choice for providing information and communication security in such a challenging environment. Hence why not make PKI a part of your IT infrastructure by utilizing emCA — eMudhra’s PKI powered digital certificate issuance and management solution. Built exclusively to provide trust and control, emCA is a robust, standards compliant, fully scalable, policy driven PKI solution designed to provide unparal- leled security services, which include authentication of user and device, data security, integrity and verification. 10 Years as a Public Certifying Authority eMudhra just completed its 10th year as a Public Certify- ing Authority under the Indian Root. eMudhra is also a CA under the Mauritian root and is currently gearing up to become a global trust provider. That’s a lot of audits, documentation, and compliance which we manage on a regular basis. A Pioneer, Not a Follower We take pride in being a thought leader in our space. From National ID based one-time-use eSign, to Cloud PKI for mobility, we are constantly thinking what’s next. We ensure that we focus equally on convenience of PKI as we do on security to ensure quick adoption and effective Digital Transformation
  • 3. Technical Details Recommended hardware Protocols SCEP, CMP, OWASP, HTTP, HTTPS, SMTP, FTP, WSS, LDAP RFC’s RFC 6960, RFC 6962, RFC 5273, RFC 4210, RFC 3161, RFC 4998 ERS, RFC 4810 Web Services SOAP, REST Signature Algorithms SHA1WithRSA SHA256WithRSA SHA384WithRSA SHA512WithRSA SHA1WithECDSA SHA256WithECDSA SHA384WithECDSA SHA512WithECDSA Key Algorithms RSA- 1024 RSA- 2048 RSA- 4096 RSA- 8192 ECDSA- 256 ECDSA- 384 ECDSA- 521 Key Modules CA Certificate Lifecycle Management Online Certificate Status Protocol Responder Timestamping Authority Validation Server API Gateway Web Sockets CRL Manager Key Archival Processor: 2 * Quad core Processors RAM: 32 GB HDD: 1 TB SAS HDD (Integrated App & DB Server) OS Compatibility Windows Server 2008+ Enterprise, RHEL 5+, AIX 7+, Suse 12+ and Solaris 10+ Application Server Apache Tomcat 7+, JBoss 7+, Web Sphere 8+, Web Logic 12+ DB Compatibility Oracle 10g+, SQL Server 2008+, MySQL 5+, DB2 9+, Postgre 9+ Algorithms & Standards MAC, HMAC, Triple DES, AES 256 X.509 v3, PKIX, XAdES, PAdES, CRL v2 Java Oracle JDK 1.7+ Security Compliance EAL 4+ CC Protection Profile 1.5 compliant WebTrust Compliant Management and Monitoring Uses m out of n authentication Support segregation of duties Secure Audit Logging Support for HSM Thales Safenet Cavium Ultimaco Tamper Proof Logging emClick Certificate Download App Auto Enrollment Subscriber Portal Inventory Management Portal Registration Management Portal Certifying Authority Portal OSCP and Timestamping Client
  • 4. US About eMudhra: © eMudhra. All Rights Reserved.eservices@emudhra.com Much like the name, which is an embodiment of the seal of authenticity in the electronic or digital world, eMudhra is a cyber security solutions company and a trust service provider that is focused on accelerating the world’s transition to a secure integrated digital society. With presence in 5 continents and a global delivery center in Bengaluru, India, eMudhra is empowering secure digital transformation of over 45 global banks, several Fortune 100 customers and thousands of SMEs.