Deployment Models (On-Prem, Cloud)

CertiNext supports flexible deployment models to meet varying requirements around security, compliance, data residency, and operational control. Organizations can choose between a fully on-premises deployment or a SaaS multi-tenant deployment, with consistent lifecycle management capabilities across both models.

1) On-Premises Deployment

In an on-premises deployment, all CertiNext components are installed and operated within the customer’s infrastructure.

What is deployed on-premises

  • CertiNext platform (application and services)

  • Automation bots for discovery, enrollment, renewal, and provisioning

  • emCA for private PKI

  • Integration with customer-managed HSMs or cloud HSMs, where applicable

Key characteristics

  • Full control over infrastructure, data, and cryptographic material

  • Certificates, keys, and metadata remain entirely within the customer environment

  • Suitable for regulated, high-assurance, or air-gapped deployments

  • Complete control over PKI hierarchy design, key custody, and lifecycle policies

This model is typically chosen by organizations with strict regulatory mandates, sovereign data requirements, or deep PKI customization needs.


2) SaaS Multi-Tenant Deployment

In the SaaS multi-tenant deployment, CertiNext and emCA are hosted and operated as a managed cloud service, while automation bots are deployed within the customer’s environment.

What runs where

  • CertiNext platform: Hosted and managed as SaaS

  • emCA (Private PKI): Hosted within the SaaS environment

  • Automation bots: Installed in the customer’s environment to perform discovery, enrollment, renewal, and provisioning against local systems

  • Secure APIs: Used for all communication between bots and the CertiNext SaaS platform

This hybrid architecture combines centralized management with local execution and control.


Data Isolation and Tenant Design

CertiNext’s SaaS deployment supports tenant isolation with separate databases per customer, when requested.

  • Each customer can be provisioned with a dedicated database to ensure strong data isolation

  • Certificate metadata, configurations, audit logs, and lifecycle records are segregated

  • Enhances security posture and simplifies compliance assessments

Important: Requests for dedicated databases must be made at the time of onboarding. If not specified, customer data will be provisioned within a common multi-tenant environment using logical isolation controls.


Key Management and HSM Model (SaaS)

In the SaaS deployment model:

  • CertiNext uses FIPS 140-2 Level 3 compliant HSMs

  • HSMs are hosted and operated by eMudhra within its secure data centers

  • Customer-approved HSMs or external key management services are not supported in the SaaS model

To ensure cryptographic isolation:

  • HSM partitioning can be enabled on request

  • Each customer’s keys and certificates are isolated within dedicated HSM partitions

  • Key access is strictly controlled and auditable

This model provides strong security guarantees while maintaining the operational simplicity of a managed SaaS service.


Automation Bots and Local Control

Even in the SaaS model:

  • Automation bots run inside the customer’s environment

  • Bots handle sensitive operations such as certificate discovery and deployment locally

  • No inbound connectivity is required from the SaaS platform into customer systems

This minimizes exposure while enabling full lifecycle automation.


Termination and Exit Readiness

The SaaS model is designed with clear termination and exit planning:

  • Customer data is logically isolated and, where requested, physically segregated at the database level

  • HSM partitioning ensures cryptographic separation throughout the lifecycle

  • Certificate metadata, audit logs, and reports can be exported as part of termination

  • Customer-side bots ensure no persistent dependencies remain within customer environments

This allows customers to exit the service cleanly without loss of visibility or operational continuity.


Choosing the Right Deployment Model

Organizations typically choose:

  • On-Premises for maximum control over infrastructure, keys, and PKI design

  • SaaS Multi-Tenant for faster onboarding, reduced operational overhead, managed HSM security, and scalable automation

Both models deliver the same core capabilities across discovery, renewal, enrollment, auto-provisioning, governance, and reporting.


Summary

CertiNext’s deployment models are designed to balance security, control, and operational efficiency. Whether deployed fully on-premises or consumed as a SaaS platform with customer-side automation and managed HSMs, CertiNext ensures strong data isolation, cryptographic protection, and enterprise-grade certificate lifecycle management—without compromising governance or exit readiness.

Last updated