Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Cloud PKI SaaS Designed for Google Workspace

Extend your Google Workspace policies to the rest of your network and go passwordless with our simple, managed Public Key Infrastructure. Reduce the risk of phishing attacks, multi-factor authentication (MFA) fatigue, and more. Enhance network segmentation, improve your Wi-Fi security, and improve the end-user login experience at the same time by leveraging digital certificates.

Cloud PKI SaaS Designed for Google Workspace

Everything You Need for Passwordless Authentication that Seamlessly Integrates with Your Infrastructure

Our vendor-agnostic platform has a decade of integration with all major infrastructure providers, and is the only solution that can automate the certificate lifecycle for Google-managed Chromebooks. The platform was built with a Cloud RADIUS server for turnkey certificate-based network authentication.

We’ve Helped Many Businesses Like Yours

  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
  • Brand
SecureW2 JoinNow reviews sourced by G2

Public Key Infrastructure for Google FAQs

What are the benefits of a cloud Public Key Infrastructure for my organization?

The ultimate benefit of a private PKI is passwordless, certificate-based authentication. It’s no secret that passwords are a vulnerability, with organizations like Microsoft recommending that you move away from credentials-based PEAP-MSCHAPv2 to passwordless protocols like EAP-TLS. Certificate-based authentication can be used to secure a range of resources, including your wired & wireless network, VPN, applications, desktop logins, and much more.

Additionally, there are benefits for your end-users. With digital certificates, employees no longer have to deal with frustrating password reset policies and disconnects due to password changes.

Why Can’t We Just Use Google CA Service Instead of a Managed PKI?

 

For organizations using relying heavily on Google in their environments, Google’s Certificate Authority Service seems like an obvious choice for deploying certificate-based authentication. However, certificate authorities can be challenging to set up and configure properly. What’s more, certificate-based authentication should be backed by an authentication server such as a RADIUS server for the utmost security.


SecureW2 provides everything organizations need to implement certificate-driven security. Aside from the knowledgeable support team you can rely on for smooth deployment, we provide a powerful Cloud RADIUS server designed for passwordless authentication. Get everything you need in one spot to deploy certificates, including the expertise.

Can We Just Build Our Own Private PKI for Google instead of Using a Managed PKI?

 

Many organizations see the benefits of going passwordless but think that they can reduce the cost of doing so by building their own Public Key Infrastructure. Unfortunately, this often ends up being a costlier venture in terms of finances and time spent. Building a private PKI requires expertise, space for the servers, and regular maintenance. Additionally, certificate lifecycle management - from issuance to renewal to building a certificate revocation list - is time-consuming.


Cloud-based and managed solutions like our JoinNow Connector PKI can save you the resources you would otherwise spend on building and maintaining your own. What’s more, since our PKI infrastructure is cloud-based, your administrators can access it from anywhere without having to replicate it at every office location and it integrates seamlessly with cloud infrastructure like Okta.

Can Your PKI Issue Certificates to Chromebooks?

Yes. In fact, our PKI service is the industry’s first solution to provide a unique Chromebook extension for this exact purpose.


Because managed Chromebooks are unable to download applications easily, we’ve developed an extension instead. End users can simply download and run the extension on their Chromebooks to configure their devices and enroll for certificates.

How Does Your PKI SaaS Issue Certificates to Managed Devices?

For devices that aren’t managed Chromebooks, we have gateway APIs that can integrate with all major MDMs, including Google Workspace. Certificates are then issued through these gateways using the Simple Certificate Enrollment Protocol (SCEP).


From the end-user’s perspective, there’s nothing they need to do. The enrollment process is completely automated, requiring no user input.


With Jamf and Intune, we even offer an advanced integration feature called auto-revocation. Every several minutes, our PKI service will check your MDM’s smart and static groups. Devices added to these groups will have their certificates revoked automatically.

How Does Your PKI SaaS Issue Certificates to Unmanaged Devices & BYODs?

For unmanaged devices and BYODs, our cloud service offers JoinNow MultiOS, which is a dissolvable self-service onboarding application. From start to finish, it only takes seconds to configure devices and enroll users for certificates.


Users start by navigating to the customizable onboarding page and entering in their Google cloud credentials (or their credentials from your SAML Identity Provider). SecureW2 then confirms in your Google cloud that the user is authorized for a certificate through SAML authentication.


As long as the user is authorized, MultiOS then runs, configuring their device with the proper Wi-Fi profiles and enrolling them for a certificate.

Does Your PKI Platform Provide Public or Private Certificate Authorities?

Our PKI allows you to create a private certificate authority only. However, you can create as many private certificate authorities as you need. Our customers commonly build a different certificate authority for different groups of people to enable role-based access control, such as having a separate certificate authority for their HR and DevOps teams. This makes managing certificates for different roles organized and efficient.

Can you export the certificates’ private keys and use it to authenticate another device?

Public key cryptography requires the use of both public and private keys. While the public key can be sent freely, the private key must be stored securely, and we take key storage seriously as a result. The best way to guarantee your private key won’t be removed from your device is to ensure it is stored in the proper key stores and enclaves and set to non-exportable. To increase security further, we recommend that keys are stored in a device’s Trusted Platform Module (TPM) instead of storing the keys in software.