Second Factor

Authentication and Authorization

The Second Factor team brings years of experience in Public Key Infrastructure technologies.  Our product expertise includes the Entrust product suite and Microsoft CA.  We provide expertise the the full lifecycle of PKIs, from requirements analysis, to upgrading existing infrastructure.  We hold expertise in cross-certifying with the U.S. Federal Bridge CAs.  We can create or update your existing certificate specifications to support the issuance of Personal Identity Verification (PIV) and Federal Bridge Certification Authority (FBCA) compliant certificates.  We also have experience designing and implementing many companion technologies, including Lightweight Directory Access Protocol (LDAP) and X.500, Hyper Text Transfer Protocol (HTTP) Servers (for distributing Certificate Revocation information and Authority data), and Online Certificate Status Protocol (OCSP).

Second Factor's Authentication and Authorization Services  
Our team can assist in the designing and implementing the following technologies:

  • Certification Authorities
  • X.500 and LDAP compliant directory infrastructures
  • OCSP
  • Certificate Specifications
  • Key Generation Ceremonies






Copyrights 2017 - All Rights Reserved - Second Factor, Inc.