CertifyID Universal Registration Authority
CertifyID URA is WISeKey’s solution for the management of digital certificates,
enabling seamless identity provisioning and management
for persons, applications and objects

URA : Identity Management

  • Trust begins with the adoption and practice of recognised and accepted policies and procedures. Before an eID is issued to an identity, whether an individual or a machine, that identity must be verified by a Trusted Party of the CertifyID network, referred to as a Registration Agent.
  • An identity, and the validation of an identity remains the most important element of the process, whether it be for enterprise, government or public consumer use.
  • The URA is designed to ensure eID verification and management is done in accordance with approved policies and processes.
  • The URA is a secure web-based registration authority that interfaces with the CertifyID Microsoft based Windows CA
  • URA communications are web-based (SOAP/WS-Services) avoiding firewall traversal problems URA access and communications are secured by certificates, using SSL with certificate authentication.
  • It enables the creation and management of different eID templates, and policies, for flexibility in different scenarios.
  • eIDs are used within wider business frameworks and it is designed to be configurable, and integrate readily with other systems.


URA : Identity Management : is essential for

  • Digital ID lifecycle management
    • Establishing the identity of the individual and providing its eID;
    • Managing the eID, revoking or suspending its use when conditions determine;
    • Renewing the eID, so that the identity holder has continued access to systems and features
  • User friendly and designed for end users, not technical
  • Focuses on business processes, not technicalities
  • Easy eID status/revocation information access and functionality
  • Implements features required by policy
    • Public Key Uniqueness
    • Entity <-> DN Uniqueness

URA offers different management models that can be flexibly chosen and mixed:

  • Centralised management and reporting for greater security
  • Delegated and distributed management responsibilities
  • End user self-service