Check out our special report on casino security
HID ActivID Desktop Validation Client for PKI certificate validation
Technical Specification
- Make: HID
- Model code: ActivID Desktop Validation Client
- Reader Types: Smart Card
- Central / Remote Monitoring: Yes
The HID ActivID Desktop Validation Client for Windows desktop enables real-time validation of PKI certificates. It works with the ActivID Validation Authority, or any RFC compliant OCSP responder. it enables an organisation to deploy PKI validation capability to desktop users. The ActivID Desktop Validation Client is ideally suited toward enterprises and governments deploying PKI-based smart cards and smart tokens for secure remote access, and Windows domain login.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | ActivID Desktop Validation Client |
| Reader Types | Smart Card |
| Central / Remote Monitoring | Yes |
| Additional info | The HID ActivID Desktop Validation Client for Windows desktop enables real-time validation of PKI certificates. It works with the ActivID Validation Authority, or any RFC compliant OCSP responder. it enables an organisation to deploy PKI validation capability to desktop users. The ActivID Desktop Validation Client is ideally suited toward enterprises and governments deploying PKI-based smart cards and smart tokens for secure remote access, and Windows domain login. |
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
