Digital Certificates and PKI

Digital shaking hands representing digital trust with certificates
Author

Author

Piotr Kaluzny

Head Instructor

Sep 6, 2025

Every time you connect securely to a corporate VPN, log in to a banking site, or sign an important email, there’s a hidden foundation of trust making it possible: digital certificates and Public Key Infrastructure (PKI). These two elements form the backbone of modern secure communication – they enable trust and authentication in online environments by verifying identities and encrypting data. This article explains what digital certificates are, why they exist (with a focus on VPN applications) and how PKI ties everything together.

digital certificates pki

What are Digital Certificates?

A digital certificate (or just “certificate”) is like an electronic passport for a computer, user, or service. It’s a cryptographic document that proves an entity is who it claims to be (technically it proves the ownership of a special cryptographic element – public key – that represents the entity).

Before certificates, verifying the identity of someone on a network was a huge challenge. Passwords could be guessed, IP addresses could be spoofed, and trust was hard to establish across untrusted networks like the Internet. Certificates solve this by binding an identity to a public key using advanced cryptography and a trusted authority.

By using digital certificates, parties in an online exchange – whether connecting to a VPN, sharing documents, or establishing a secure session – can verify each other’s identities without ever meeting physically/in person. This mechanism works very well and offers protection against impersonation and man-in-the-middle attacks.

Digital Certificate Use Cases

Digital certificates appear in many contexts:

  • VPNs: they authenticate users and devices connecting to Virtual Private Networks, ensuring only authorized parties gain access. As a result certificates prevent unauthorized access, reduce reliance on passwords (less phishing risk) and scale better than managing shared secrets
  • Web Browsing: HTTPS websites use certificates to prove authenticity to browsers and encrypt data (the “lock” icon in the URL)
  • Email Security: certificates can sign and encrypt emails
  • Code Signing: developers sign software to assure users the code is legitimate
  • IoT Devices: certificates authenticate devices to networks ensuring secure operation

Digital Certificate Structure

Digital certificates follow standards such as X.509. Key fields include:

  • Serial Number: unique identifier of the certificate assigned by the Issuer
  • Issuer: the entity that issued the certificate (so-called Certificate Authority or “CA”)
  • Subject: the entity that the certificate represents (user, device, or server)
  • Public Key:  the cryptographic key bound to the Subject
  • Signature Algorithm: algorithm used by the CA to sign the certificate
  • Signature: the Issuer’s (CA’s) digital signature that validates the certificate’s authenticity
  • Validity Period: start and expiration dates
  • Extensions: additional information such as usage restrictions, alternative names, and policies

Public Key Infrastructure (PKI): The Bigger Picture

PKI is a comprehensive framework that creates, manages, distributes, and revokes digital certificates. If certificates are passports, PKI is the passport system. It’s makes certificates usable, scalable and trustworthy. PKI consists of the following elements:

  • Certificate Authority (CA) is a trusted entity that issues and signs certificates
  • Registration Authority (RA) verifies the identity of entities requesting certificates
  • Certificate Repository publishes and stores certificates and revocation lists are published
  • Certificate Revocation List (CRL) is a document that includes revoked (no longer trustworthy) certificates

Note that digital certificates only work if everyone agrees to trust the authorities that issue them (the certificate “Issuer” field). Without PKI, anyone could issue a certificate claiming to be “cybrec.com,” and no one would know if it was legitimate. So how does it work?

  1. PKI supports trust by establishing chains between certificates through digital signatures, enabling verification back to a known trusted root. At the core of PKI is the Certificate Authority (CA) – a trusted third party that verifies identities before issuing certificates. When your system sees a certificate for “cybrec.com,” it doesn’t just take the certificate at face value – it checks whether the certificate was issued and signed by a CA it already trusts
  2. This trust is built into operating systems, browsers, and VPN clients through trusted Root CA lists. If the certificate chains back to one of these recognized roots (or to your company’s internal PKI root, in the case of enterprise VPNs), the certificate is accepted as valid

In short, PKI acts as the trust framework that prevents anyone from simply creating a fake certificate and claiming to be someone else. It ensures that:

  • Certificates can be validated against trusted authorities
  • Compromised or expired certificates can be revoked
  • The entire system operates according to consistent policies and standards

PKI Architecture

Different organizations structure their PKI differently, depending on needs:

  • Flat Model – it involves a single CA that issues all certificates. This model is simple to deploy, but it comes with a single point of failure: if the CA is compromised, all trust collapses
  • Hierarchical Model – this approach involves two types of CAs – Root CA and at least one Intermediate (or Subordinate) CA. The idea is that Root CA simply delegates its functions to intermediate CAs. This architecture is more secure and flexible, because if one intermediate CA is compromised, only its branch is affected. This is the most common model for large enterprises and VPN deployments. An example is when a company keeps a Root CA offline and Intermediate CAs issue certificates (e.g. one for users, one for devices)

Conclusion

Digital certificates and PKI form the invisible infrastructure that keeps modern networks secure. In VPN scenarios, they provide strong, scalable authentication while reducing the risks of password-only systems. Beyond VPNs, they underpin everything from secure web browsing to signed software.

Relevant Training

Check out our CCIE Security video series to learn more about digital certificates and PKI.

0 Comments

Digital shaking hands representing digital trust with certificates
Author

Author

Piotr Kaluzny

Head Instructor

Sep 6, 2025