Digital signatures and S/MIME/PGP encryption are essential for KRITIS organizations, hospitals, research institutions and suppliers. But the manual certificate process creates pain points:
• Helpdesk must create CSRs, operate trust center portals, distribute PFX.
• Certificates expire → "Email could not be signed/decrypted".
• Revocation during personnel changes takes days.
• No transparency about validity, algorithms, revocation status.
mail:u secure automates the complete lifecycle of S/MIME/PGP certificates & key material - without any action from the departments.
| Module | Task | Benefit for Secure Data Transfer |
|---|---|---|
| Enrollment Service | Requests new certificates from trust centers via SCEP, ACME, REST-API | Zero-touch provisioning for employees |
| Renew Daemon | Automatically renews upcoming expirations (< 30 days) | No more "certificate expired" emails |
| Revocation Engine | Revokes keys during offboarding or incident | Quick response to theft/loss |
| Directory Sync | Reads AD / Entra ID / LDAP groups, generates CSR | Role-based certificate assignment |
| Reporting Dashboard | Live status, algorithms, runtimes, SHA fingerprints | ISO & KRITIS audit at the push of a button |
User joins MailEncrypt_Prod group.
Directory sync triggers CSR generation.
Enrollment service receives new certificate from D-TRUST.
Certificate & private key are stored in gateway keystore.
Mail client can encrypt & sign immediately.
60 days before expiration → Renew daemon initiates re-issuance, keystore is atomically replaced, old key remains valid in parallel for 30 days.
HR or SOC system calls REST endpoint /revoke/.
Blocks private key.
Reports revocation to trust center.
Updates gateway CRL & OCSP cache, notifies admin & compliance officer.
| Requirement | PKI Automation Added Value |
|---|---|
| DSGVO Art. 32 | State-of-the-art cryptography, documented key lifecycle |
| NIS2 | Key management and revocation time ≤ 24 h |
| ISO 27001 Annex 10.1 | Automated certificate issuance & renewal |
| B3S Healthcare | Protection level "high": keys in HSM, 2FA admin |
| IT-SiG 2.0 (§8a) | Demonstrable PKI process, audit trails, alarming |
Container cluster, microservice "pki-enroller", "renew-daemon", "revoker", REST gateway.
Admin portal only via MFA, role-based access (Issuer-Admin, Auditor, Viewer).
Parallel enrollment > 500 certificates/hour, renewal batch via queue, ACME support.
Seamless Integration
PKI automation supports migration of existing certificate stocks and ensures interoperability with various systems and platforms.
Migration takes place without interruption of ongoing operations and ensures that all existing certificates are seamlessly integrated.
