PKI Automation

Certificates without Admin Effort

Back to Overview

Why PKI Automation is Mandatory Today

Digital signatures and S/MIME/PGP encryption are essential for KRITIS organizations, hospitals, research institutions and suppliers. But the manual certificate process creates pain points:

• Helpdesk must create CSRs, operate trust center portals, distribute PFX.
• Certificates expire → "Email could not be signed/decrypted".
• Revocation during personnel changes takes days.
• No transparency about validity, algorithms, revocation status.

mail:u secure automates the complete lifecycle of S/MIME/PGP certificates & key material - without any action from the departments.

Functional Scope Overview

ModuleTaskBenefit for Secure Data Transfer
Enrollment ServiceRequests new certificates from trust centers via SCEP, ACME, REST-APIZero-touch provisioning for employees
Renew DaemonAutomatically renews upcoming expirations (< 30 days)No more "certificate expired" emails
Revocation EngineRevokes keys during offboarding or incidentQuick response to theft/loss
Directory SyncReads AD / Entra ID / LDAP groups, generates CSRRole-based certificate assignment
Reporting DashboardLive status, algorithms, runtimes, SHA fingerprintsISO & KRITIS audit at the push of a button

Supported Trust Centers & Algorithms

D-TRUST

SwissSign

Sectigo

Telekom Trust Center

Own CA / Microsoft ADCS

Typical PKI Workflows

Auto-Enrollment via Entra ID

1.

User joins MailEncrypt_Prod group.

2.

Directory sync triggers CSR generation.

3.

Enrollment service receives new certificate from D-TRUST.

4.

Certificate & private key are stored in gateway keystore.

5.

Mail client can encrypt & sign immediately.

Renewal without Interruption

60 days before expiration → Renew daemon initiates re-issuance, keystore is atomically replaced, old key remains valid in parallel for 30 days.

Immediate Revocation on Incident

1.

HR or SOC system calls REST endpoint /revoke/.

2.

Blocks private key.

3.

Reports revocation to trust center.

4.

Updates gateway CRL & OCSP cache, notifies admin & compliance officer.

Compliance Mapping

RequirementPKI Automation Added Value
DSGVO Art. 32State-of-the-art cryptography, documented key lifecycle
NIS2Key management and revocation time ≤ 24 h
ISO 27001 Annex 10.1Automated certificate issuance & renewal
B3S HealthcareProtection level "high": keys in HSM, 2FA admin
IT-SiG 2.0 (§8a)Demonstrable PKI process, audit trails, alarming

Technical Deep Dive

Service Architecture

Container cluster, microservice "pki-enroller", "renew-daemon", "revoker", REST gateway.

Security

Admin portal only via MFA, role-based access (Issuer-Admin, Auditor, Viewer).

Performance

Parallel enrollment > 500 certificates/hour, renewal batch via queue, ACME support.

Seamless Integration

Migration & Interoperability

PKI automation supports migration of existing certificate stocks and ensures interoperability with various systems and platforms.

PFX/PEM Takeover: Existing certificate stocks from other gateway products
Migration Script: Converts passphrase-protected PFX to Gateway keystore
CRL Cache Sync: Synchronization with existing mail appliances for hybrid operation

Migration takes place without interruption of ongoing operations and ensures that all existing certificates are seamlessly integrated.

PKI migration and interoperability - Migration & Interoperabilität
Decorative gradient background

Test PKI Automation in Your Environment

30-day pilot, including D-Trust sandbox.