ADSS SCVP Server provides a complete Validation Authority product capable of delegated path discovery and delegated path validation.

Fully conformant with IETF RFC 5055 and implemented fully in Java EE for multi-platform support, performance and high-availability. ADSS SCVP Server is the marketing name for ADSS Server when licensed for SCVP services only.

The following highlights just some of its main features.

SCVP specific features

Delegated path validation

Complete RFC 5280 based certificate path validation. Supports all standard extensions like acceptable certificate policies, policy mapping, name validation, key usage, extended key usage and many others. ADSS SCVP Server has been subjected to independent evaluation and certification against the latest NIST PKITS test suite.

Product certifications

ADSS SCVP Server is FIPS 201 certified and is on the GSA Approved Products List #682. ADSS SCVP Server is also the first product to be certified under the FPKI PD-VAL program. Core ADSS Server modules are also certified to meet the CWA 14167-1 requirements for trustworthy systems making it suitable for use by Qualified Certificate Service Providers (CSPs). Various HSMs are supported that meet Common Criteria EAL4 and FIPS 140-2 levels 2, 3 and 4.

Advanced CRL handling

Provides CRL streaming for efficient import of very large CRLs, provides flexible CRL polling including ability to detect over-issued CRLs, multiple CRL source can be monitored, with ability to have watched-dog process for high availability ensuring no CRL is missed. Indirect CRLs, Delta CRLs and Partitioned CRLs are fully supported.

CRL monitoring, alerting & re-publishing

ADSS SCVP Server comes with our sophisticated ADSS CRL Monitor module for automated monitoring of multiple CRL issuers, fully verifying and validating the imported CRLs and real-time alerting of operators on any faults, e.g. unavailability of CRLs. See the CRL Monitor page for full details. Optionally ADSS SCVP Server can also republish a retrieved CRL to a defined location, e.g. on the internal network for local users as a fallback option. Auto-archiving of old CRLs is also provided.

Client authentication

The ADSS SCVP Server access control module allows operators to restrict client access based on TLS/SSL client certificates, SCVP request signing and/or using IP address filtering. Multiple rules can be set up to detect specific client certificate fields and range of IP addresses to accept/reject.

Performance & resilience

High speed operation

ADSS Server is built using Java EE architecture to provide high performance and scalability. It supports virtualised environments where CPU and memory can be increased for performance gains.

Caching and pre-registrations

ADSS SCVP Server supports the ability to cache intermediate certificates found dynamically during the certificate path construction phase, thus allowing future path discovery operations to be faster. Known intermediate CAs can be pre-registered by operators for immediate inclusion in certificate paths. Similarly CRLs can be polled in advance for the registered CAs allowing certificate status information to be available in advance of receiving an SCVP request for the known CAs. Together such mechanisms can greatly speed up the performance of an SCVP server.

Split-processing architecture

The core services within ADSS SCVP Server can be split to allow separate back-end servers to import CRLs, thereby allowing front-end SCVP servers to focus solely on handling high SCVP transaction loads, ensuring maximum performance.

Clustering for high availability

Multiple ADSS Servers can be used in load-balanced mode to maximise availability across one or more live sites (also use DB replication/clustering and HSM replication for complete infrastructure resilience).

SCVP service reporting

Service usage reporting

ADSS SCVP Service comes with its own management reporting module. This provides the ability to create graphic and tabular reporting on all service requests within a particular date period. The management reports show the number of transactions processed, their results, who the main SCVP clients are, which end-entity (target) certificates were checked the most etc. Reports can be exported in PDF and CSV format.

Human-readable transaction viewers

All SCVP request/response transactions are securely logged in the ADSS SCVP Server database. To support an administrator’s review of these transactions, viewers are provided which automatically convert the SCVP binary transactions into human-readable form, thus allowing easy analysis of reported trust issues or interoperability checking.

Security & management

Hardware Security Module (HSM) support

FIPS and Common Criteria certified HSMs from SafeNet, Thales and Utimaco can be used to stored and protect all cryptographic keys. Support for other PKCS#11 compliant HSMs can also be provided if required. HSMs can be network, PCIe or USB connected. One or more HSMs, smart cards or USB tokens can be connected to ADSS Server. Another key feature of ADSS Server is the sophisticated auto-reconnect feature that prevents a network issue requiring operator intervention to reconnect a network HSM.

Strong crypto algorithm support

Support for the common cryptographic algorithms is provided including SHA1, SHA-2 (SHA-256, SHA-384, SHA-512), RSA keys up to 4096 bits and ECDSA up to 521 bits.

Strong operator authentication

ADSS Server operators are authenticated using certificates over mutually authenticated TLS/SSL sessions. The operator’s private key and certificates can be on a hardware token for strong multi-factor authentication. ADSS Server performs full certificate validation, including revocation checking, before allowing operators to login to the console.

Role based access control

ADSS Server enables multiple operator roles to be defined. Each operator registered within the system is assigned a role. The role-based access control system enables fine control over specific service modules that an operator can see and whether they have read, write, edit or delete capability for specific areas of functionality.

Dual control

ADSS Server implements dual control in a flexible and practical way, i.e. dual control can be applied selectively to important aspects of functionality that are considered most sensitive (such as key generation, policy change etc). When used, an operator’s actions are queued for a Security Officer role-holder to review and then approve or reject the action.

Business application client authentication and separation

Business applications are authenticated using TLS/SSL client certificates that are pre-registered in ADSS Server. The application’s access to specific profiles and/or keys is checked as part of the ADSS Server authorisation process when service requests are received.

Secure logging with automatic integrity checking

Cryptographic tamper-resistant logs are provided for all service transaction logs that contain details of requests and responses, all operator activity logs and all system event logs. Advanced reporting, reviewing including searching and filtering of log records is provided. All database log records are cryptographically protected to prevent record modification, deletions or additions.

Automatic system integrity checking

All ADSS Server configurations and settings held in the database are cryptographically protected to prevent record modification, deletion or addition. The system automatically checks these records at pre-defined intervals or on demand to ensure system integrity. A detailed report is produced for any issues that are found.

Operator and system management alerting

Selected system operators can be alerted when certain event conditions occur using email or SMS messages. Management systems can be alerted using SNMP messages or via Syslog (log4j) messages.

Easy to install, manage and upgrade

ADSS Server is feature rich to minimise IT operations time. The simple installation wizard, the automatic checking of system integrity and auto-archiving and alerting ensure the system runs without daily operator involvement. The detailed transaction logs and detailed request/response viewers reduce support desk time in resolving operational issues. ADSS CA Server is also able to run an automatic upgrade process for its settings and data to run the latest version of software.

NTP time monitoring

ADSS Server features an optional NTP Time Monitor service that regularly checks the operating system time and compares this with one or more configured NTP time servers to detect unacceptable time drift or IT operational errors. Configured time thresholds allow ADSS Server operators to be alerted to time issues and ultimately all trust services can also be stopped automatically.

Auto-archiving

To prevent database bloating ADSS Server can be configured to automatically archive database log records. As the archive log files are created and written to disk, they are digitally signed to provide authentication and integrity. The archived files can later be imported, verified and viewed within the transaction log viewer.

Ascertia is a global leader in delivering functionally rich, easy to deploy e-security solutions. We pride ourselves in being easy and efficient to deal with.
Ascertia is a global leader in delivering functionally rich, easy to deploy e-security solutions. We pride ourselves in being easy and efficient to deal with.