Check out our special report on Cybersecurity
HID ActivID Validation Responder Software for scaling a PKI Certificate validation service
Technical Specification
- Make: HID
- Model code: ActivID Validation Responder Software
- Visitor Management: Yes
- Web-enabled software: Yes
- Operating System: Debian Linux 7.0
The ActivID Validation Responder enables organisations to scale their PKI validation throughout their network. The solution supports: Strong security: PKI validation information is digitally signed to prevent tampering, but requires no cryptography to be performed by the appliance. This eliminates the need to implement costly security measures, allowing the appliance to be optimized for network performance. Industry Standards: Fully compliant with the industry OCSP, SCVP and PKI standards, as defined in their respective RFC specifications. It can be used with any standard OCSP and SCVP client. Scalability: An effective building block for scaling an OCSP service to only where it is needed, saving IT administration and infrastructure costs.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control software |
| Model code | ActivID Validation Responder Software |
| Visitor Management | Yes |
| Web-enabled software | Yes |
| System Requirements | Operating System: Debian Linux 7.0 |
| Additional info |
The ActivID Validation Responder enables organisations to scale their PKI validation throughout their network. The solution supports:
|
More HID Access control software
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control controllers
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download