Academy

Module 3 Β· PKI Architecture πŸ”’

Manish Garg
Manish Garg Associate CISSP Β· RingSafe
April 22, 2026
5 min read

Public Key Infrastructure (PKI) is the system that issues, manages, and revokes the certificates that authenticate identities (servers, clients, code, documents). Understanding PKI is necessary for anything beyond “Let’s Encrypt this server.” This module covers Certificate Authorities, the cert lifecycle, ACME automation, internal PKI for service mesh, and the architectural decisions that matter.

The PKI components

  • Certificate Authority (CA) β€” entity that issues certificates. Trusted by relying parties
  • Registration Authority (RA) β€” verifies identity before CA issues; sometimes the same as CA
  • Subject β€” entity the certificate identifies (server, person, device)
  • Relying Party β€” the consumer that validates and trusts the certificate (browser, application)
  • Repository / Directory β€” where issued certs and revocations are published
  • Trust Store β€” list of CAs the relying party trusts (OS, browser, custom)

Public CAs β€” the major ones

  • Let’s Encrypt β€” free, automated; the default for most websites in 2026; 90-day cert lifetime
  • Sectigo (formerly Comodo) β€” commercial; longer lifetimes, EV certs
  • DigiCert β€” premium commercial; common in enterprise
  • GlobalSign, Entrust, GoDaddy β€” also widely used
  • Google Trust Services β€” Google’s own CA; free options for cloud customers
  • ZeroSSL, Buypass β€” alternative free ACME providers

Choosing matters less than it used to β€” most browsers trust the major CAs equally; Let’s Encrypt is acceptable for nearly all use cases.

Certificate types

  • DV (Domain Validation) β€” proves you control the domain. Most common; cheap or free. Issued via ACME or email/DNS challenge
  • OV (Organization Validation) β€” DV + verified organization name. Visible in cert details
  • EV (Extended Validation) β€” extensive vetting; used to show green address bar (no longer in browsers); still used in regulated sectors for high-trust signaling
  • Wildcard β€” *.example.com. Single cert covers all subdomains. Operational simplicity vs single-point-of-compromise
  • Multi-domain (SAN) β€” covers multiple specific names
  • Code signing β€” for signing executables; different EKU; different trust paths
  • Document signing β€” for signing PDFs etc
  • Client certs β€” for mTLS authentication

The ACME protocol

Automatic Certificate Management Environment (ACME) is the standard automation protocol for getting certs from a CA. Used by Let’s Encrypt, ZeroSSL, Buypass, Google Trust Services, others.

Standard flow:

  1. Client generates an account key, registers with CA
  2. Client requests a cert for example.com
  3. CA presents a challenge: “prove you control example.com”
  4. Client responds β€” HTTP-01 (file at well-known URL), DNS-01 (TXT record), or TLS-ALPN-01
  5. CA validates the challenge
  6. Client submits a CSR (Certificate Signing Request)
  7. CA issues the cert

Tools: certbot, acme.sh, lego, native integration in many web servers (Caddy auto-provisions).

πŸ” Intermediate Module Β· Basic Tier

Continue reading with Basic tier (β‚Ή499/month)

You've read 29% of this module. Unlock the remaining deep-dive, quiz, and every other Intermediate module.

99+ modulesAll levels up to this tier
20-question quizzesUnlimited retries with explanations
Completion certificatesShareable on LinkedIn
9 more sections locked below