Skip to main content

Registered values

Registered values are a sophisticated feature designed to enhance the security and integrity of certificate issuance processes.

Registered values are used to define and enforce strict rules on the values that can be included in certificate requests. By setting lists of allowed values and conditions for certificate fields, registered values ensure that only validated and authorized information is incorporated into certificates.

How registered values work

When a certificate is requested–whether for a device, a user, or an application—certain information, such as device IDs or organizational details, must be provided. Registered values act as a gatekeeper by using a set of lists to evaluate incoming certificate requests. Requests that do not align with these registered values are rejected, ensuring adherence to security protocols.

Key features of registered values

  • Validation control Allows precise validation of certificate request fields against predefined allowed values.

  • Dynamic management Offers capabilities for adding, removing, and replacing defined registered values for flexibility in certificate issuance.

  • Selective visibility Provides the ability to assign registered values to specific divisions, enabling focused management and controlled visibility.

Benefits of using registered values

  • Targeted security Directly prevents unauthorized certificate issuance, bolstering the security of digital identities.

  • Operational efficiency Streamlines certificate issuance processes by automating the validation of certificate request values.

  • Customizable compliance Supports compliance with industry standards and internal policies by ensuring all certificate requests meet established criteria.

Why use registered values

Registered values are particularly useful when the authenticity and integrity of certificate requests are needed. For example, in industries adhering to the Matter standard, where certificates must contain registered vendor and product IDs, or in environments where the inventory of devices is predetermined.

Using registered values can significantly mitigate the risks associated with unauthorized certificate issuance, thereby enhancing the overall security posture of you digital ecosystem.

Managing registered values

The management interface for registered values allows you to control the following:

  • Adding values Add new allowed values to registerd value datasets.

  • Removing values Remove outdated or unnecessary values to maintain current security standards.

  • Replacing datasets Entire datasets can be replaced to update the registered values based on new criteria or organizational changes.

  • Enabling/disabling datasets Datasets can be temporarily disabled without deletion, allowing for flexible management.

Best practices

  • Regular updates Keep your lists of registered values up-to-date to reflect changes in your device inventory or organizational structure.

  • Division-specific management Utilize division-specific management to delegate control over registered values, ensuring only authorized personnel can make changes.

  • Comprehensive validation Use comprehensive conditions and lists to cover all necessary certificate fields, enhancing security measures.

Registered values are an essential tool for maintaining the integrity and security of digital certificates. By enabling precise control over certificate issuance, organizations can prevent unauthorized access, ensuring that digital identities are protected.