Check out our special report on casino security
HID ActivID Path Builder for PKI certifcate path validation
Technical Specification
- Make: HID
- Model code: ActivID Path Builder
- Integration: ActivID Path Builder SerVE
- Web-enabled software: Yes
The HID ActivID Path Builder is ideal for organisations including government agencies and partner networks participating in a federated Public Key Infrastructure (PKI) comprising multiple Certificate Authorities (CAs,) in which each party requires the ability to validate the status and authenticity of others’ credentials. It validates the status and authenticity of certificates issued by a third-party Certificate Authority (CA). It provides a real-time validation of the certificate revocation status and confirms the authenticity of the issuing Certificate Authority by checking the complete chain of trust.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | ActivID Path Builder |
| Integration | ActivID Path Builder SerVE |
| Web-enabled software | Yes |
| Additional info | The HID ActivID Path Builder is ideal for organisations including government agencies and partner networks participating in a federated Public Key Infrastructure (PKI) comprising multiple Certificate Authorities (CAs,) in which each party requires the ability to validate the status and authenticity of others’ credentials. It validates the status and authenticity of certificates issued by a third-party Certificate Authority (CA). It provides a real-time validation of the certificate revocation status and confirms the authenticity of the issuing Certificate Authority by checking the complete chain of trust. |
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
