CloudGate Certificate Icon

CloudGate Certificate

CloudGate Certificate

Device certificates provide robust security for both system administrators and users without sacrificing the convenience of SSO.

CloudGate Certicate Hero
Home CloudGate Certificate

What is a Certificate?

Certificates used on the Internet are called “digital certificates”. A digital certificate acts like an identification card on the Internet.

A client certificate, which is a type of digital certificate, is used to identify the client from which the connection originates.There are two types of client certificates: device certificates, which validate devices, and user certificates, which validate users. The CloudGate certificate belongs to the "device certificate".

The CloudGate Certificate are more secure because they are issued using a special chip (SE, TPM) that protects and stores confidential data such as private keys and biometric information, which is installed in most terminals these days.

This function allows you to add certificate authentication to CloudGate UNO, which allows access only to company-designated devices. Customers can select the certificate to be used according to their operation method.

device restriction
CloudGate Certificate based on Secure Element

Private keys are stored in a secure area of the device, enabling strict device restrictions.

cybertrust
Remote Terminal Designation Cybertrust Certificates

Certificates can be issued in association with device IDs (MAC addresses, UDIDs, etc.), enabling strict device restrictions.

CloudGate UNO can issue Cybertrust’s “Cybertrust Device ID” (device certificate). This certificate is called “Cybertrust Certificate” in CloudGate UNO.

Is “that” device you are accessing for remote work secure?

Due to the spread of remote work, there are more opportunities to work outside the office such as at home, and it is difficult to ensure security only by restricting access based on conventional IP addresses.

In addition, although the shift to the cloud in business has made it more convenient, it has the potential to cause security incidents that were previously unforeseen.

If you do not limit the devices that access the system and cloud services used for business, the following risks could exist:

Hacker Icon
Unauthorized Access

If ID's and passwords are compromised and unauthorized access is gained to systems and cloud services, there is a risk of stored data leakage, system destruction or shutdown, backdoor, etc.

Hacker Icon
Access from Shadow IT

Accessing systems and cloud services from unauthorized device means that unsecured device are connecting to information assets. There is also a risk of information leakage due to the possibility of infection with malware.

Hacker Icon

These risks can be prevented by limiting the devices that can access the systems and cloud services used for business to “Certified Devices”

Device limit Icon

Allow access only to company-owned devices

Access to cloud services can be allowed only from PCs and smart devices owned and provided by the company. By installing a device certificate on the device in advance, CloudGate UNO checks whether the accessing device holds the device certificate and blocks access from devices that do not. Even if the login ID and password are known to a malicious third party, unauthorized access from a device that does not hold a device certificate can be prevented. In addition, if a device is lost, the administrator can revoke the certificate to deny access from that device.

Device cert
Device restriction

Certificate management functions according to your needs

You can choose from two types of device certificates, each with its own characteristics, to select the certificate issuance and installation method best suited to your company’s operations.

CloudGate Certificate

based on Secure Element

Manager Icon

• Certificates can be issued and installed by administrator authentication on the device to be authorized.

• The risk of unauthorized copying or exporting of certificates is dramatically reduced by keeping the private key outside the device and out of the network path.

Remote Terminal Designation

Cybertrust Certificate

(formerly secured by Cybertrust)

User Icon

• Strict control of which device are allowed to install certificates by specifying unique device identifiers such as MAC addresses and UDIDs in advance.

• Send the certificate installation method to the user’s e-mail address and download it by the user himself/herself. The certificate is tied to the unique identifier of the device, so it can be strictly identified.

Security profile Icon

Flexible access rule settings

CloudGate UNO’s security profile function allows security rules to be applied to individual users, departments, and positions. For example, if a department needs access from outside the company, or if a user needs access only from a specific device, flexible access rules can be set by combining other security rules and device authentication using device certificates.

Device cert
SSO Icon

Multiple SSO Support

CloudGate UNO supports multiple cloud services. Device certificates can limit the devices that can be used, but they can also be used for cloud services such as the ones you see here, and the same policy can be applied to each cloud service as well as improving convenience with single sign-on.

*When using a smartphone, some services do not allow the use of certificates.

SSO Logos

FAQ about CloudGate Certificate Option

To which plans is it added?

Available with the purchase of a Smart Pack plan or the Device Certificate Option.

Do I need to specify the number of CloudGate certificates and Cybertrust certificates to use?

There is no need to specify the number of certificates to be used for each. If you purchase a device certificate, CloudGate certificates and Cybertrust certificates can be issued for the number of licenses you have purchased. For example, if you purchase 100 device certificates, 50 CloudGate certificates and 50 Cybertrust certificates can be issued.

Please let us know about future updates to CloudGate certificates.

CloudGate certificates will be expanded to support a variety of operating systems in the future. In addition, we plan to update the CloudGate certificate with features that will make it easier to use, such as a certificate reissue flow and certificate registration by the user.

CloudGate UNO helps organizations implement a Zero Trust approach to security.

Contact us
CG Logo

A trademarked single sign-on service solution of International Systems Research Co. (ISR) that provides reliable and affordable strong authentication service for cloud services.

google partner badgegoogle partner badge
ISR LOGO

©1993 - 2024 International Systems Research Co. All Rights Reserved.