Skip to main content

Reliable authentication with

SIGN8 Auth

The SIGN8 solution for certificate-based authentication for online and offline applications.

Trust Center Infrastruktur eIDAS TSP esignatur SIGN8 deutsch ausweis identity security authentification

Our Auth certificates

What is certificate-based authentication?

Authentication ensures that people really are who they claim to be.
Certificate-based authentication confirms identity using electronic certificates.

How certificate-based authentication works

Certificate-based authentication uses a digital certificate issued by a trusted certification authority (CA), such as SIGN8.
The user or device generates a key pair consisting of a private and public key. The public key and identity information are sent to the CA, which creates a digital certificate and digitally signs it.
The user presents their certificate during the login process.
The server checks the signature and validity of the certificate as well as the identity of the user. If everything is correct, access is granted.

Authentication certificates

SIGN8 GmbH, a qualified trust service provider and certification authority (CA), is authorized to issue certificates for the secure authentication of your employees.
Our Auth certificates ensure the highest security standards and can be flexibly stored on various local hardware devices, including smart cards, USB tokens or in a hardware security module (HSM) for our TCI customers.

Your advantages

High security

Digital certificates are difficult to forge and offer a strong authentication method through the use of cryptographic keys.

Trustworthiness

As certificates may only be issued by trustworthy certification authorities, they can serve as reliable proof of identity.

Automation

Certificates can be issued, managed and checked automatically, which reduces administrative effort and increases user-friendliness.

Phising protection

Certificate-based authentication reduces the risk of phishing attacks, as no passwords are used that could be intercepted or guessed by attackers.

Central administration

Authentication certificates can be managed centrally and revoked if necessary, allowing easy control and adjustment of access rights.

Interoperability

Certificate-based authentication is compatible with many standards and protocols, which facilitates integration into various systems and platforms.

Do you have any questions?

How do I obtain an Auth certificate?

You can request Auth certificates directly from SIGN8 GmbH.
We offer Auth certificates that can be stored on SmartCards, USB tokens or in an HSM (TCI).

What are the advantages of certificate-based authentication over password-based authentication?

Certificate-based authentication offers greater security as it is based on cryptographic keys that are difficult to forge.
It eliminates the risk of password theft and phishing attacks.
Certificates can also be managed centrally and revoked if necessary, allowing for better control.

How is the security of an Auth certificate guaranteed?

The security of a digital certificate is ensured by cryptographic procedures. The certificate contains a public key that is digitally signed by a trusted certification authority (CA). The integrity and authenticity of the certificate can be confirmed by verifying this digital signature.

What happens if an Auth certificate is compromised or lost?

If a certificate is compromised or lost, it must be revoked immediately.
This is done by entering it in a revocation list (CRL) or via the Online Certificate Status Protocol (OCSP) so that other systems know that the certificate is no longer trustworthy.
A new certificate must then be issued and distributed.