How does the ISA PKI Certificate work?
Question
How does the ISA PKI Certificate generation, distribution and verification work?
Answer
The working of the InstaSafe Secure Access (ISA) PKI Certificate is mentioned below:
- InstaSafe will act as Root CA for all certificates generated in/for our system
- Every customer/company which is created within the InstaSafe Secure Access (ISA) ecosystem will also have another key pair which will act as Sub CA and this SubCA certificate is signed by RootCA of InstaSafe.
- Every ISA App (ISA User Agent) key pair generated will have its certificate signed by SubCA of the company they belong to
- Each certificate generated would be unique for every user and cannot be used by anyone else as it has user specific information embedded
- Each certificate also has a revocation list, which is maintained centrally
- When the ISA App attempts to establish connection, certificate information is sent across to the InstaSafe Servers. Validation is carried out to ensure this initial signature is signed by the right party, in addition to user authentication and device authorization
- As the certificate is generated for combination of user and device, if either validation fails, the connection request will be rejected
If you are an Admin of the organization's ISA Account and have any queries in this regard, contact InstaSafe Support
Related Articles
ISA Portal Certificate Warning
This Article highlights the steps to be taken in case SSL Certificate Warnings are noticed when trying to access the ISA Portal. Issue On trying to access the ISA Portal, warning messages like "Untrusted Certificate" and "There is a problem with this ...
ISA App Connection Error "Certificate Verify Failed"
This Article highlights the steps to be taken in case users are unable to connect their ISA Apps and the Error "Certificate Verify Failed" is observed in the ISA Log File. Issue The ISA App fails to connect and might continuously prompt for ...
MacOS ISA App Connection Error "This computer is not approved for use with InstaSafe Secure Access"
This Article highlights the steps to be taken in case users are unable to connect the ISA App on macOS and the error message received is "This computer is not approved for use with InstaSafe Secure Access" Issue The ISA App on MacOS doesn't connect ...
ISA App Log File
The ISA App, once successfully installed and configured, generates Connection Logs that could be extremely helpful in troubleshooting issues that may crop up. Depending on the device OS, the Log File location is as follows: Locating the ISA App Log ...
Install the ISA iOS App
This Article provides guidance on how to install the ISA App on iOS Step 1: Login to the ISA Portal Once the Administrators of your organization provision your User Profile in the InstaSafe Secure Access (ISA) Management Console, a Welcome Email ...