Skip to main content

Help us improve the Digital Marketplace - send your feedback

UNSUNG LIMITED

Keyfactor EJBCA SaaS

Keyfactor EJBCA SaaS provides the full power of
EJBCA Enterprise without the need for managing
the underlying infrastructure. Keyfactor will
manage your PKI infrastructure according to best
practices and highest assurance.

Features

  • SaaS Based PKI
  • SaaS Issuing CA
  • Bring your own Root CA
  • Protocol support for ACME, SCEP, CMP, EST
  • Highly-scalable PKI
  • Highly-resilient PKI
  • Real-time PKI updates
  • Real-time PKI monitoring
  • Self-service portal
  • Dedicated Offline Root CA

Benefits

  • Issue certificates to every end entity, device, use cases
  • Native integrations with all certificate use cases
  • 24x7x365 support to ensure minimal operational risk

Pricing

£82,086 to £202,438 a licence a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@unsungltd.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

1 3 2 4 5 3 7 4 2 9 0 5 4 1 6

Contact

UNSUNG LIMITED Richard Warwick-Smith
Telephone: 07961166249
Email: info@unsungltd.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Certificate Lifecycle Management (SaaS or OnPremises) Signum SignServe
Cloud deployment model
Public cloud
Service constraints
N/A
System requirements
N/A

User support

Email or online ticketing support
Email or online ticketing
Support response times
EJBCA SaaS provides Premium Support
Responses. Severity Level 1 - 30 Minutes
Severity Level 2 - 1 Hour Severity Level 3 - 4
Hours Severity Level 4 - 8 Hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Standard Support 8-5 / Premium Support 24x7
(optional)
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Users can get started with EJBCA SaaS using
our extensive online documentation
https://doc.primekey.com/ejbca-saas, and online
training videos
https://www.youtube.com/@KeyfactorSecure.
Instructor led virtual and onsite training is
available upon request
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Support request can be opened at
https://support.keyfactor.com/hc/en-us to provide
any and all data, including private keys.
End-of-contract process
The dedicated SaaS environment that was
provisioned for the customer is stopped and
enters a data retention period. During this period,
a customer can request any and all data,
including access to private keys.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
API allows users to request or renew certificates,
and allows administrators to revoke certificates
as well as make configuration changes such as
creating certificate authorities. Complete
documentation can be found here:
https://doc.primekey.com/ejbca/ejbcaoperations/ejbca-ca-conceptguide/protocols/ejbca-rest-interface
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The administrator at the customer has full access
to the EJBCA platform to fully customize the
configuration.

Scaling

Independence of resources
Each EJBCA SaaS customer is provisioned a
cloud provider dedicated environment for their
contracted service. Customers are siloed with
dedicated virtual private networks, dedicated
cloud managed database and cloud HSMs, and
application containers. One customer does not
affect another customer from a load, operations
or security perspective.

Analytics

Service usage metrics
Yes
Metrics types
Customers can access health check APIs, and
application APIs to gather statistics. Our SaaS
portal provides a real time dashboard with
metrics. Additional reports can be provided by
our Customer Success team on a recurring basis
and upon request.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Keyfactor

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • Other locations
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
Other data at rest protection approach
We inherit data at rest security from cloud
provider managed database services such as
RDS in AWS and Managed SQL by Azure.
Data sanitisation process
No
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data can be exported a number of different ways.
The EJBCA application provides CMS exports,
and key recovery can be enabled, all being self
service. Ultimately, a customer can open a
service request for a full data base dump and
transferring of Cloud HSM or Keyvaulted private
key material to the customer's cloud account
https://support.keyfactor.com/hc/en-us.
Data export formats
Other
Other data export formats
  • CMS
  • P12
  • SQL
  • Cloud HSM, AKV, KMS
  • YAML (ConfigDump)
Data import formats
Other
Other data import formats
  • P12
  • YAML (ConfigDump)

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
EJBCA SaaS is offered in various sizes and SLA
guarantees. EJBCA SaaS XSmall - 99% EJBCA
SaaS Small and Medium - 99.95% EJBCA SaaS
Large and XLarge - Custom service based on
customer design Customers receive service
credits defined by our terms and conditions.
Approach to resilience
EJBCA SaaS is completely hosted in AWS and
Azure, and commonly understood multi
availability zone (AZ) resiliency is fully leveraged
by EJBCA SaaS.
Outage reporting
Scheduled and unscheduled outages are
communicated by Email and announcements in
the customer SaaS portal.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Keyfactor uses NSGs and MFA to limit access of
support personnel to proper channels while
maintaining RBAC.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • ISO27001 is forecast for July 2024
  • Cyber Essentials Plus is forecast for July 2024

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Compliance answers to the SVP, Cloud
Operations & IT Compliance which falls into the
CTO's organizational structure. All policies
required by ISO27001:2013 are covered.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
All cloud components within EJBCA are tracked
for configuration changes. Alerting and
monitoring are in place for security configuration
reviews. Any changes to configuration and
conducted after change management.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Threats, patches, and evolving threats are
managed monthly per the Keyfactor patching
schedule. Current threats are reviewed by our SOC and SIEM alerting, threat hunting, or
security teams.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Alerting and reviews. Compromises are
managed by stopping the current process,
quarantining the affected system, and ticket
creation for management processes.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
All events are managed by our standard
remediation process. Users can send an email to
the compliance or information security teams to
notify the teams to open a ticket and
investigation. Incident reports are kept internally
and not released.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Wellbeing

Fighting climate change

Unsung have the majority of our staff working remotely which reduces our climate impact. We also book all of our business travel through Travel Perk which allows us to offset corporate travel emissions.

Tackling economic inequality

Unsung are committed to collaboration, innovation and responsibility. We prioritise developing a diverse supply chain and work with startups and SMEs to foster inclusivity and economic growth.
Our solutions emphasise innovation and disruptive technologies to enhance cost effectiveness and quality. We are focused on developing scalable, future-proof delivery methods.
We prioritise collaboration and responsible practices to ensure operational continuity. We engage with our stakeholders to build support for resilience and capacity building, creating a collaborative ecosystem focused on sustainable growth and mutual success.

Wellbeing

Unsung are committed to improving health and wellbeing for our staff. We offer flexible working and remote working options allowing for a work-life balance that allows and supports physical and mental health.
Additionally, we provide subscriptions to the meditation app Calm which promotes mental wellness.
These initiatives enhance the wellbeing of our workforce and set a positive example.

Pricing

Price
£82,086 to £202,438 a licence a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Multiple options: Community edition (limited
functionality, not advised for governments).
POC/test licenses: 1 month time cap for a VM for
testing purposes.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at info@unsungltd.com. Tell them what format you need. It will help if you say what assistive technology you use.