Provides a complete range of Web services for integrating the e-signature in applications. Designed to centrally incorporate e-signature generation, verification and complete mechanisms in accordance with the standards of ETSI CAdES, XAdES and PAdES.
- Support for advanced e-signature standards and formats.
- Batch signatures and batch verification.
- Trust management for multiple CAs, both public and corporate.
- Signature mechanisms are isolated from the applications to provide the centralized management of e-signatures.
- Extendable and centralized logging that can be easily integrated with SIEM tools.
- Advanced e-signature integration
TrustedX acts as a centralized repository, which means the applications can remotely use the keys and certificates stored by TrustedX without having to store them locally. This approach provides greater, audited control over the use of keys and simplifies deploying, maintaining and using the PKI through centralized management. The authentication and access control provides a range of mechanisms and trust levels, and the system can be easily integrated with other repositories for managing identities.
- Semantic interpretation of electronic signatures
TrustedX is the most complete digital signature platform of its kind. Multiple CAs can be managed, all electronic signature formats are supported and all complexity related to managing trust is removed from the applications. The incorporated semantic services support obtaining all signer/signature data along with a trust level indicated using discrete values (4 levels) and labels (i.e., government, corporate, finance, etc.).
- Cost saving and flexible integration
The product can be quickly deployed thanks to its standardization and multiple integration options. It can be used (i) in user applications through plug-ins, (ii) as a Web service and (iii) via watched folders. The product incorporates an integration gateway that uses pipelines for the straightforward integration of data and common-task processing.
- Centralized management, auditing and non-repudiation
TrustedX provides the centralized management of all digital signature policies, the preservation of electronic signatures, and logging and auditing functionality. This allows control at the corporate level over the use of the cryptography, the effective management of recognized CAs/VAs, and the transparent maintenance of electronic signatures when required owing to the expiration of certificates or renewal of cryptographic material.
Signature Services: TrustedX incorporates functions that provide a set of security and trust mechanisms as services. These services can be used in different formats as they support different integration strategies:
- Java or .NET APIs: Allows easily integrating electronic signature services in native Java applications and .NET (**).
- SOAP/WS: Using the OASIS DSS standard as an access protocol for Web services.
- REST/WS, SOAP/WS: Using TrustedX's integration gateway, which supports configuring traffic and data processing with an XML pipeline language.
Integration with other components: TrustedX can incorporate external repositories and mechanisms to support integration with other corporate tools.
- LDAP/AD, RADIUS and databases for authentication, authorization and information retrieval.
- Databases and SIEM tools for centralized logging.
- HSMs for protecting the private keys of the applications.
- OCSP/CRL and customized mechanisms for certificate validation.
The following service can also be added:
- Module that allows users and applications to use network folders to start unattended signature processes of one or more files.
- TrustedX monitors the contents of a network folder, executing a series of actions on the files that are stored in this.
- Once processed, TrustedX stored firms in an output folder, also accessible by network, including a report of the results.
- TrustedX is known for supporting multiple watched folders and allow the definition of chained actions.
- Appropriate for both users and applications. Signing entails simply copying and pasting to a folder.
(**) Please, check for availability.
The following figure illustrates the possible TrustedX architectures. The TrustedX functions can be used as a (i) trusted Web service, (ii) a trusted gateway between applications (iii) or a combination of (i) and (ii) (not shown in the figure).