Public Key Infrastructure (PKI) is the system of roles, policies, hardware, and software that creates, manages, distributes, and revokes digital certificates to bind public keys with verified identities. For marketers, PKI powers the HTTPS connections that display the padlock icon in browsers, encrypting data between your website and visitors. It authenticates your domain to customers and enables secure API connections for your marketing stack while providing the cryptographic backbone for email signing, document authentication, and IoT device security.
What is Public Key Infrastructure?
PKI governs the issuance of digital certificates to protect sensitive data and provide unique digital identities for users, devices, and applications. At its core, it is an arrangement that binds public keys with the respective identities of entities such as people and organizations through a registration and certification process.
The system relies on asymmetric encryption, which uses mathematically linked key pairs: a public key that anyone can access to encrypt messages, and a private key known only to the recipient to decrypt them. This differs from symmetric encryption, where the same key both encrypts and decrypts data, carrying significant risk if the distribution channel becomes compromised.
The primary components include:
- Certificate Authority (CA): A trusted entity that stores, issues, and signs digital certificates using its own private key. Examples include Sectigo, GoDaddy, and historically Symantec, which together once accounted for three-quarters of all issued TLS certificates on public-facing web servers (NetCraft).
- Registration Authority (RA): An entity responsible for accepting requests for digital certificates and authenticating the entity making the request. RAs do not sign or issue certificates; they manage vetting and provisioning on behalf of the CA.
- Validation Authority (VA): A third-party entity that can provide entity information on behalf of the CA for verification purposes.
- Digital Certificate (X.509): An electronic document containing the owner's distinguished name, public key, issuance dates, and the issuing CA's digital signature. These certificates are akin to a driver's license or passport for the digital world.
Why Public Key Infrastructure matters
PKI creates the trust layer that modern digital marketing requires. Without it, browsers cannot verify that your checkout page actually belongs to your brand rather than an impersonator.
Secure customer data transmission. PKI ensures confidentiality (encryption prevents eavesdropping), integrity (detection of tampering), and authenticity (verification of identity). When a customer enters a password or credit card number on your site, TLS certificates prevent plaintext data from flying across the network.
HTTP/2 performance requirements. Major browser companies have made it clear that they support HTTP/2 only over a PKI secured TLS connection (HTTP/2 FAQ). Chrome, Firefox, Opera, and Edge implement HTTP/2 using the ALPN extension of the TLS protocol, meaning website owners must deploy SSL/TLS certificates to gain the speed benefits of HTTP/2.
Conversion rate optimization. The padlock icon and "HTTPS" prefix serve as trust signals. PKI certificates verify domain ownership, preventing man-in-the-middle attacks where malicious actors intercept communications between your server and the customer's browser.
Compliance and liability protection. PKI implementations govern encryption keys through documented certificate policies that outline procedures for vetting recipients, allowing outsiders to analyze the PKI's trustworthiness and helping organizations meet regulatory requirements for data protection.
How Public Key Infrastructure works
The certificate creation process relies heavily on asymmetric encryption and follows a specific lifecycle:
- Key generation. A private key is created and the corresponding public key gets computed.
- Certificate Signing Request (CSR). The public key and identifying attributes get encoded into a CSR. The requester signs the CSR with their private key to prove possession of that key.
- Validation. The CA or RA verifies the identity of the requester and vets the information provided.
- Issuance. The CA validates the request and signs the certificate with the CA's own private key, binding the public key to the verified identity.
- Installation. The certificate is installed on the web server or device.
- Verification. When a browser connects, it verifies the certificate by checking the digital signature against the CA's public key, then follows the chain of trust up to a root certificate.
Chain of trust. CAs operate in hierarchies. Root CAs issue certificates to intermediate CAs, which then issue end-entity certificates. Root certificates are self-signed and stored in trusted root stores on devices and operating systems (such as Microsoft and Apple trust stores). Because root certificates cannot be revoked if compromised, root CAs should remain offline 99.9% of the time, stored in secure facilities, with subordinate CAs handling day-to-day issuance.
Validity periods. Starting September 2020, TLS certificate validity reduced to 13 months for publicly trusted certificates, increasing the frequency of renewal cycles that marketing and IT teams must manage.
Types of Public Key Infrastructure
Different PKI models serve different trust models:
| Type | How it works | Best for |
|---|---|---|
| Hierarchical PKI | Centralized CAs issue certificates in a tree structure (Root → Intermediate → End-entity) | Public websites, e-commerce, enterprise networks |
| Web of Trust | Self-signed certificates validated by third-party attestations (PGP, GnuPG) | Email encryption within communities, internal networks |
| Simple PKI (SPKI) | Authorization loops where the verifier is also the issuer; no third-party trust | Air-gapped networks, internal offices without external dependencies |
| Decentralized PKI (DPKI) | Uses distributed ledgers so each entity serves as its own root authority | Blockchain applications, emerging IoT ecosystems |
Most marketing technology implementations use hierarchical PKI with established CAs because browsers ship with pre-installed root certificates that automatically trust certificates tracing back to those roots.
Best practices
Automate certificate lifecycle management. Manually tracking expiration dates leads to outages. Certificate management systems should handle delivery, access control, and renewal alerts. If a Certificate Revocation List (CRL) expires, every certificate issued by that CA becomes invalid, potentially taking down the entire PKI.
Match validation levels to risk. Higher assurance levels require human supervision during registration, while automated processes suffice for lower-risk scenarios. Certificate policies should formally document vetting methods, types of certificates issued, and security procedures.
Secure your chain. Configure servers to present the complete certificate chain including intermediate certificates. Missing intermediates cause browser trust errors that block traffic.
Plan for revocation. Maintain awareness of compromised certificates. Subordinate CAs can revoke certificates by publishing CRLs or using the Online Certificate Status Protocol (OCSP), though browsers often balance revocation check frequency against connection latency and privacy concerns.
Use open-source tools for internal testing. Tools like OpenSSL, EJBCA, or Let's Encrypt (Boulder) allow you to build simple CAs for development environments before purchasing production certificates from public vendors.
Common mistakes
Letting certificates expire. You will see browser security warnings blocking access, immediate traffic drops, and lost conversions. Fix by implementing automated monitoring and renewal processes at least 30 days before expiration.
Using self-signed certificates on public properties. While acceptable for internal testing, public websites using self-signed certificates trigger browser warnings that scare visitors. Fix by obtaining certificates from a trusted CA included in major browser root stores.
Ignoring HTTP/2 TLS requirements. Attempting to implement HTTP/2 without valid PKI certificates results in protocol downgrade or connection failures in modern browsers. Fix by ensuring your TLS configuration supports the ALPN extension and uses certificates from a trusted CA.
Failing to validate certificate chains. Incomplete intermediate certificate installation causes "untrusted connection" errors on some browsers and devices. Fix by testing certificate installation across multiple browser types and verifying the full chain validates.
Overlooking private key security. Exposure of your private key allows attackers to impersonate your site or decrypt past communications. Fix by storing keys in hardware security modules (HSMs) or secure vaults with strict access controls, and immediately revoke certificates if compromise is suspected.
Examples
E-commerce checkout security. An online retailer installs a TLS certificate on its payment gateway server. When customers enter credit card data, the browser verifies the certificate chain against its trusted root store, establishes an encrypted tunnel, and displays the padlock icon, preventing network sniffers from capturing plaintext payment data.
Marketing API authentication. A marketing automation platform uses client certificate authentication to verify that API requests originate from authorized partner servers rather than unauthorized scrapers. Each partner receives a digital certificate installed on their servers that the platform validates before processing data requests.
IoT device fleets. A smart home device manufacturer embeds unique digital certificates in each thermostat and camera during manufacturing. These certificates authenticate firmware updates and encrypt communications between devices and cloud servers, preventing hackers from injecting malicious code or intercepting user data.
Document signing campaigns. A B2B company uses S/MIME certificates to digitally sign promotional emails. Recipients can verify the signature using the sender's public key to confirm the message originated from the company and was not modified in transit, improving deliverability and trust rates.
FAQ
What is the difference between a Certificate Authority and a Registration Authority?
A Certificate Authority (CA) is the trusted entity that actually signs and issues digital certificates using its private key. A Registration Authority (RA) handles the upfront work of accepting certificate requests and authenticating the identity of the requester, but does not have signing authority. The RA acts as a delegated verifier for the CA.
How long do TLS certificates remain valid?
Publicly trusted TLS certificates have seen validity periods reduced to increase security agility. Starting September 2020, TLS certificate validity reduced to 13 months, requiring annual renewal cycles compared to the previous multi-year validity periods.
Do I need PKI to use HTTP/2?
Yes, for practical implementation. While HTTP/2 theoretically allows unsecured connections, major browser companies have made it clear that they support this protocol only over a PKI secured TLS connection (HTTP/2 FAQ). Chrome, Firefox, Opera, and Edge support HTTP/2 only over TLS using the ALPN extension, meaning you must purchase and deploy SSL/TLS certificates to gain HTTP/2 performance benefits.
What happens if a Certificate Authority gets compromised?
If a subordinate CA is compromised, the organization can revoke the certificates it issued and publish a CRL. However, if a root CA is compromised, it cannot be revoked. The organization must publicly disclose the breach and transition to a new root certificate, which requires updating all trusted root stores across devices and browsers.
Should we manage PKI in-house or use a managed service?
Most organizations today struggle with legacy PKI systems. According to industry research, 98% of organizations would rebuild their PKI if they could (Keyfactor). Managed PKI services provide specialized expertise, automated renewal, and protection against turnover among PKI experts, allowing marketing and IT teams to focus on business operations rather than infrastructure maintenance.