Certificate uses

SimpleAuthority generates standards-compliant keys and certificates suitable for use in almost any security application. These applications include, but are not limited to:

Certificates can be used to identify people and/or computer servers. Servers can be identified based on domain name or IP address.


Certificate management

Certificate status is highlighted using colour-coded "traffic light" icons (green, orange, red). This makes it easy to identify certificates that will expire soon or have already expired.

An iCalendar file can be generated and automatically updated containing certificate expiry dates. iCalender files can be read by numerous calendar applications including Apple iCal and Mozilla Sunbird.

Certificates can be published to an LDAP directory. This is an optional way of sharing certificates between users, for encrypting data from one user to another.

Certificate revocation and Certificate Revocation List (CRL) generation is supported, as an option for managing certificates that should no longer be trusted.

Identity files can be automatically and securely backed up. This allows for recovery of keys that may otherwise be lost, so that any data encrypted using these keys can be retrieved.

Certificate types and formats

Keys and certificates can be generated using PKCS#12/DER format (used by most applications), or PEM format, without or without a password. Certificate key lengths, certificate contents and signature algorithms are fully configurable.

Certificate Signing Request (CSR) files from external applications can be processed. This allows keys to be generated by other applications and for the public key to be included in a certificate.

Multi-level CA hierarchies and self-signed certificates are supported.


SimpleAuthority is highly interoperable with security products, corporate directories and legacy CA products.

Data can be imported in formats including:

Data can be exported in formats including:

Modes of operation

SimpleAuthority can be run using: