Certification Authority instantiation

PKIaaS provides the following CA instantiation capabilities.

CA types

Each customer may have one or more subordinate issuing CAs. You can:

  • Create an online root CA and add issuing CAs subordinate to this root CA.

  • Add an issuing CA signed by an external root CA – for example, your on-premise Microsoft root CA.

CA key and signature algorithms

The following CA key and signature algorithm pairs are supported.

Key algorithm

Signature algorithm

ECDSA P-256

ecdsa-with-SHA256

ECDSA P-384

ecdsa-with-SHA384

ECDSA P-521

ecdsa-with-SHA512

RSA 2048

sha256WithRSAEncryption

RSA 3072

sha256WithRSAEncryption

RSA 4096

sha512WithRSAEncryption

The NIST recommends not using RSA2048 after Dec 31, 2030. See https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf

Secure CA key management

All CA private keys are stored in Entrust nShield Connect XC high HSMs FIPS140-2 level 3.

CA creation time

CAs are automatically provisioned in ~60 seconds after submitting your request.

CA validity period

CA certificates have a default validity period of 20 years for root CAs and 10 years for subordinate issuing CAs. You can select a different period when creating each CA.

An issuing CA should have a minimum lifespan of 3 years to support some features. For example, to automate Intune/MDM enrollment using an Entrust Hosted Certificate Enrollment Gateway, an issuing CA must have at least 3 years of remaining lifespan when the Enrollment Gateway is created.