Device Identity
Technological Certificates Cryptographic Keys PKI and Certificate Authorities
Device Identity
Systems for the automation, distribution, and management of technological certificates
In a digitally connected world, managing technological identity is crucial for the security of IoT, industrial systems, and medical devices.
Monet+ develops advanced systems for managing technological identity, enabling secure distribution of cryptographic keys and automated digital Certificate Lifecycle Management (CLM).
Preventing unauthorized access to the organization’s infrastructure.
Securing transmitted data against eavesdropping or tampering.
Eliminating errors and operational downtime related to certificates and keys.
Our technologies ensure secure management of technological identities, enable their authentication, and protect transmitted data.
Our clients include leading energy and utility companies, whom we help secure infrastructure, automate certificate and key management, and ensure reliable authentication of their technological devices.
Crypto-Agile Approach
We design certificate management systems with built-in readiness for cryptographic change.
They enable fast adaptation to new algorithms, standards, or threats—including migration to post-quantum cryptography.
CLM: Certificate Lifecycle Management
CLM provides automated lifecycle management of digital certificates—from issuance to renewal and revocation.
Process automation eliminates manual errors, improves administrative efficiency, and reduces the risk of operational outages.
We develop systems that build trust in the digital world
Compliance with legislation and support for industry standards Datasheet
Download our datasheet to learn how to easily manage and automate digital certificates in your environment.
Technological a Device Identity
Use Cases
Our solution is ideal for organizations operating extensive infrastructures of connected devices, particularly in the following areas:
Smart Metering – secure communication between smart meters in the energy sector.
Industry 4.0 – identity protection for robotic systems, IoT, and smart industrial devices.
Healthcare – securing medical equipment and sensitive health data.
Any organization with a large number of servers or interconnected devices (meters, dispensers, OT systems…).
What You Get
- A highly scalable certificate lifecycle management system
- Enforcing security compliance throughout the certificate management process
- Ensuring the use of modern cryptographic algorithms
- Preventing unauthorized roles, devices, or users from obtaining certificates
- Defining custom issuance scenarios for certificates
- Defining user roles and security profiles tied to issuance scenarios
- Dynamic validation of applicants and the option to sign certificate requests with an authorization certificate
What You Get
- A highly scalable certificate lifecycle management system
- Enforcing security compliance throughout the certificate management process
- Ensuring the use of modern cryptographic algorithms
- Preventing unauthorized roles, devices, or users from obtaining certificates
- Defining custom issuance scenarios for certificates
- Defining user roles and security profiles tied to issuance scenarios
- Dynamic validation of applicants and the option to sign certificate requests with an authorization certificate
Supported CLM Protocols
- Implementation of a general ACME server according to RFC 8555
- Compatible with the most widely used global ACME clients
- Unique ACME External Account Binding concept – tailored for the internal ACME server model issuing certificates from an internal Certificate Authority
- Suitable for SSL certificates (Domain Validation certificates)
- Implementation of the EST protocol according to RFC 7030
- Dynamic configuration of EST endpoint authorization rules (for authentication via client certificate or username/password)
- Optional device serial number verification in the certificate request
- Suitable (but not limited) for network element certificates
- Implementation of the SCEP protocol according to RFC 8894
- Suitable (but not limited) for network element certificates
- We can develop support for a proprietary protocol tailored to the customer’s needs
- Applicable to devices or systems with custom PKI interface implementations
ACME Protocol
- Implementation of a general ACME server according to RFC 8555
- Compatible with the most widely used global ACME clients
- Unique ACME External Account Binding concept – tailored for the internal ACME server model issuing certificates from an internal Certificate Authority
- Suitable for SSL certificates (Domain Validation certificates)
EST Protocol
- Implementation of the EST protocol according to RFC 7030
- Dynamic configuration of EST endpoint authorization rules (for authentication via client certificate or username/password)
- Optional device serial number verification in the certificate request
- Suitable (but not limited) for network element certificates
SCEP Protocol
- Implementation of the SCEP protocol according to RFC 8894
- Suitable (but not limited) for network element certificates
Proprietary Protocol
- We can develop support for a proprietary protocol tailored to the customer’s needs
- Applicable to devices or systems with custom PKI interface implementations