FAQ Hero
Identity Trust

What is Internal PKI vs. Web PKI?

An internal PKI (Private PKI) is a security system used to issue and govern digital certificates that are only trusted within the organization’s network. This approach to digital trust is often used for internal use cases like authenticating employee devices to corporate applications and services or encrypting communications among servers not accessible from outside the network.

Unlike the Web PKI—designed for public-facing trust for the world wide web and operated by public certificate authorities—internal PKI is tailored to the specific policies, systems, and access controls of an enterprise or IoT device manufacturer. Strong use cases for internal PKI include secure authentication in a Zero Trust architecture or managing identities in DevOps environments. Organizations should avoid the unnecessary costs and operational complexity of using Web PKI for internal scenarios, including unintended certificate revocations due to CA/Browser Forum requirements that are irrelevant for internal systems.

Organizations using internal PKI must implement and maintain the necessary supporting systems to keep the PKI functioning properly. This can be complicated, costly, and time-consuming. Private certificates should be issued using an internal intermediate certificate authority (ICA), which itself is chained to an internal root certificate authority with an internal root certificate. These are complicated tasks  to correctly performed for anyone who isn’t proficient in PKI, and the stakes are high. Home-grown internal security systems are usually poorly secured, frequently cause outages, and end up costing more than projected.

That’s why the DigiCert ONE platform includes PKI as a Service for enterprises and connected device manufacturers who need to ensure that their internal PKI is properly set up and functioning with the highest security assurance. DigiCert creates the root certificate and secures it at a level commensurate with public trust roots, while allowing the enterprise oversight of its intermediate CA, properties, the types of certificates it can issue, the names on those certificates, and the policies that govern them.

Related Links: