Functions
-
You can create and manage private root CAs and subordinate CAs. You can also manage CAs from third parties. You can create and manage private root CAs and subordinate CAs. You can also manage CAs from third parties. -
You can manage SSL and private certificates through their entire lifecycle, including issuing, querying, and revoking certificates. You can manage SSL and private certificates through their entire lifecycle, including issuing, querying, and revoking certificates.
-
You can use SSL to encrypt connections between your website, applications, or applets and your customers. Your customers will no longer see warning messages indicating that their connections are not secure. You can use SSL to encrypt connections between your website, applications, or applets and your customers. Your customers will no longer see warning messages indicating that their connections are not secure. -
Private certificates identify and protect internal resources, such as applications, servers, IoT devices, and user details. Private certificates identify and protect internal resources, such as applications, servers, IoT devices, and user details.
Certificate Differences
Application Scenarios
Product Advantages
-
You can easily manage CAs and private certificates on a pay-per-use basis. This frees you from having to build or maintain complex CA infrastructures. You can easily manage CAs and private certificates on a pay-per-use basis. This frees you from having to build or maintain complex CA infrastructures. -
You can create a flexible CA hierarchy that covers root CAs, subordinate CAs, and external CAs. This allows you to deploy as many applications as you want. You can create a flexible CA hierarchy that covers root CAs, subordinate CAs, and external CAs. This allows you to deploy as many applications as you want. -
You can centrally manage up to millions of certificates and keys. You can revoke certificates using certificate revocation lists and receive notices before and when a certificate expires. You can centrally manage up to millions of certificates and keys. You can revoke certificates using certificate revocation lists and receive notices before and when a certificate expires.
-
PCA uses a wide range of key algorithms, such as RSA2048, RSA4096, ECC256, and ECC384. PCA supports X.509 v3 certificate format and complies with international PKI and CA standards. PCA uses a wide range of key algorithms, such as RSA2048, RSA4096, ECC256, and ECC384. PCA supports X.509 v3 certificate format and complies with international PKI and CA standards. -
PCA provides you with great flexibility through abundant APIs that allow you to efficiently integrate and deploy products in the development environment. PCA provides you with great flexibility through abundant APIs that allow you to efficiently integrate and deploy products in the development environment. -
CCM uses Huawei Key Management Service (KMS) and hardware security modules (HSMs) to store keys securely. CCM uses Huawei Key Management Service (KMS) and hardware security modules (HSMs) to store keys securely.