Interoperability
This page summarizes Keyfactor Command's interoperability across common formats, algorithms, enrollment
Certificate enrollment refers to the process by which a user requests a digital certificate. The user must submit the request to a certificate authority (CA). protocols, HSMs, and relevant standards. It highlights what’s officially supported, what’s been validation-tested, and what is known to be compatible in customer environments. It isn’t an exhaustive list of every possible integration.
What Supported Means
-
Supported: Actively covered by product design and QA; eligible for standard support.
-
Validation-tested: Tested with specific versions or profiles; support is best-effort if you deviate.
-
Compatible: Known to work, but not in current test matrix; support limited to guidance.
Specifications
This section lists Keyfactor Command’s supported certificate formats and standards, algorithms and key types, and certificate enrollment protocols to help you verify compatibility and plan integrations.
Certificate Formats and Standards
Keyfactor Command supports the following formats and standards.
Table 1: Certificate Formats and Standards
| Supported Standard | External Reference | Documentation |
|---|---|---|
| X.509/PKIX: Certificate and CRL Profile | RFC 5280 |
|
| PEM: Textual Encodings of PKIX, PKCS, and CMS Structures | RFC 7468 |
|
| PKCS#10: Certification Request Syntax | RFC 2986 | |
| PKCS#7: Cryptographic Message Syntax | RFC 5652 |
|
| PKCS#12: Personal Information Exchange Syntax | RFC 7292 |
|
| RFC 9525: Service Identity in TLS (obsoletes RFC 6125; see also RFC 2818) |
|
Key Usage
Keyfactor Command supports the following key usages:
Table 2: Key Usages
| Function | Description |
|---|---|
| None | No key usage parameters. |
| Encipherment Only | The key can be used for encryption only. |
| CRL Signing | The key can be used to sign a certificate revocation list (CRL). |
| Key Certificate Signing | The key can be used to sign certificates. |
| Key Agreement | The key can be used to determine key agreement, such as a key created using the Diffie-Hellman key agreement algorithm. |
| Data Encipherment | The key can be used for data encryption. |
| Key Encipherment | The key can be used for key encryption. |
| Nonrepudiation | The key can be used for authentication. |
| Digital Signature | The key can be used as a digital signature. |
Extended Key Usages
The following table lists the extended key usages (EKUs) supported by Keyfactor Command. The CA column shows whether each EKU is supported by Microsoft CAs or included by default in EJBCA. EJBCA also allows the creation of custom, user-defined EKUs beyond those indicated here.
| Category | CA | OID | Friendly Name | Typical Use |
|---|---|---|---|---|
| Common and Standard | 1.3.6.1.5.2.3.4 | Kerberos Client Authentication | PKINIT client | |
| Common and Standard | 1.3.6.1.5.2.3.5 | Kerberos KDC | Domain controller (Kerberos) | |
| Common and Standard | 1.3.6.1.5.5.7.3.1 | Server Authentication | TLS/SSL server certificates | |
| Common and Standard | 1.3.6.1.5.5.7.3.2 | Client Authentication | TLS client/mutual authentication | |
| Common and Standard | 1.3.6.1.5.5.7.3.3 | Code Signing | Software signing, executables, scripts | |
| Common and Standard | 1.3.6.1.5.5.7.3.4 | Email Protection | S/MIME encryption and signing | |
| Common and Standard | 1.3.6.1.5.5.7.3.8 | Time Stamping | Timestamp Authority (TSA) | |
| Common and Standard | 1.3.6.1.5.5.7.3.9 | OCSP Signing | OCSP responder certificate | |
| Common and Standard | 2.5.29.37.0 | Any Extended Key Usage |
Universal (“any purpose”) — rarely recommended |
|
| Document and PDF Signing | 1.2.840.113583.1.1.5 | PDF Signing | Adobe/Acrobat digital signatures | |
| Document and PDF Signing | 1.3.6.1.4.1.311.10.3.12 | Document Signing | Office and document signing | |
| Document and PDF Signing | 1.3.6.1.5.5.7.3.36 | RFC 9336 Document Signing | Modern generic document signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.1 | Microsoft Trust List Signing | CTL signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.10 | Qualified Subordination | Subordinate CA chaining | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.11 | Key Recovery | Key escrow/recovery agents | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.13 | Lifetime Signing | Long-term timestamping | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.19 | Revoked List Signer | Certificate revocation list (CRL) signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.2 | Microsoft Time Stamping | Microsoft timestamp service | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.20 | Windows Kit Component | Windows SDK component signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.21 | Windows RT Verification | RT build signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.22 | Protected Process Light Verification | Protected process signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.23 | Windows TCB Component | Trusted Computing Base signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.24 | Protected Process Verification | Secure process validation | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.25 | Third Party Application Component | Third-party application signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.26 | Software Extension Verification | Windows extension signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.27 | Preview Build Signing | Insider/pre-release Windows builds | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.30 | Disallowed List | Microsoft disallowed certificate list | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.37 | Isolated User Mode | IUM process signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.39 | Hardware Driver Extended Verification | Hardware driver extended validation | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.4 | Encrypted File System (EFS) | File encryption keys | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.4.1 | EFS Recovery | Recovery agent certs | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.42 | Enclave | SGX/Enclave attestation signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.5 | Windows Hardware Driver Verification | Kernel-mode driver signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.5.1 | Attested Hardware Driver Verification | WHQL attested drivers | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.6 | Windows System Component Verification | OS component signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.7 | OEM System Component Verification | OEM system components | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.8 | Embedded System Component Verification | Embedded OS components | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.3.9 | Root List Signer | Microsoft root list | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.5.1 | Digital Rights | DRM certificate | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.6.1 | Key Pack Licenses | License distribution | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.10.6.2 | License Server Verification | RDS licensing server certs | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.20.1 | CTL Usage | Certificate Trust List | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.2.1.21 | Individual Code Signing | Personal code signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.2.1.22 | Commercial Code Signing | Vendor code signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.20.2.1 | Enrollment Agent | Allows an authorized agent to enroll on behalf of another user/device (e.g., smart-card issuance workflows). | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.20.2.2 | Smart Card Logon | Windows domain smart-card logon | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.2.6.1 | SpcRelaxedPEMarkerCheck | Internal Microsoft signing use | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.2.6.2 | SpcEncryptedDigestRetryCount | Internal Microsoft signing use | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.21.5 | CA Key Exchange | Internal CA key exchange cert | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.21.6 | Key Recovery Agent | Used for EFS/archival key recovery agents. | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.54.1.2 | Remote Desktop Authentication | RDP server certificates | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.60.3.1 | Auto Update CA Revocation | Root program update CA revocation | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.60.3.2 | Auto Update End Revocation | Root program end-entity revocation | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.60.3.3 | No OCSP Failover to CRL | Root program policy | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.61.1.1 | Kernel Mode Code Signing | Kernel-mode driver certs | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.61.4.1 | Early Launch Antimalware Driver | Boot-time AV driver signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.61.5.1 | HAL Extension | Hardware abstraction layer components | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.64.1.1 | DNS Server Trust | DNS server certificate trust | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.76.3.1 | Windows Store | Microsoft Store publisher certs | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.76.5.1 | Dynamic Code Generator | JIT or dynamic code signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.76.6.1 | Windows Update | Windows Update service signing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.76.8.1 | Microsoft Publisher | Office or Store publishing | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.80.1 | Document Encryption | RMS or document protection | |
| Microsoft Enterprise and Application | 1.3.6.1.4.1.311.92.1.1 | Windows Hello Recovery Key Encryption | Hello recovery key management | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.13 | EAP over PPP | 802.1X authentication | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.14 | EAP over LAN (EAPOL) | 802.1X authentication on wired/wireless | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.15 | SCVP Server | Server for Simple Certificate Validation Protocol | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.16 | SCVP Client | SCVP client cert | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.17 | Internet Key Exchange for IPsec | IKE/IPsec VPN gateways | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.20 | SIP Domain | VoIP / SIP domain authentication | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.21 | SSH Client | Client certificate for SSH (RFC 8709) | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.22 | SSH Server | SSH host key certification (RFC 8709) | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.5 | IP Security End System | IPsec host certificates for end systems | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.6 | IP Security Tunnel Termination | IPsec gateways or tunnel endpoints | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.7.3.7 | IP Security User | IPsec users performing key exchange (IKE) | |
| Network, VPN, and Secure Channel Use | 1.3.6.1.5.5.8.2.2 | IP Security IKE Intermediate | Intermediate cert used in IKE/IPsec authentication (RFC 4945) | |
| Regulatory / Industry-Specific |
|
0.4.0.2231.3.0 | ETSI TSL Signing | EU Trusted List signing |
| Regulatory / Industry-Specific | 1.2.203.7064.1.1.369791.1 / .2 | CSN 369791 TLS client/server | Czech national standard (CSN) | |
| Regulatory / Industry-Specific | 2.16.840.1.101.3.6.8 | PIV Card Authentication | U.S. federal PIV smart cards | |
| Regulatory / Industry-Specific | 2.16.840.1.113741.1.2.3 | Intel AMT Management | Intel Active Management Technology | |
| Regulatory / Industry-Specific | 2.23.136.1.1.3 | ICAO Master List Signing | ePassport trust list signing | |
| Regulatory / Industry-Specific | 2.23.136.1.1.8 | ICAO Deviation List Signing | ePassport deviation list signing | |
| TPM and Hardware Attestation | 2.23.133.8.1 | Endorsement Key Certificate | TPM hardware endorsement key | |
| TPM and Hardware Attestation | 2.23.133.8.2 | Platform Certificate | Hardware platform binding certificate | |
| TPM and Hardware Attestation | 2.23.133.8.3 | Attestation Identity Key Certificate | TPM attestation/AIK certificate |
Algorithms and Key Types
Keyfactor Command supports the following algorithm types, key size
The key size or key length is the number of bits in a key used by a cryptographic algorithm., curves, and parameter
A parameter or argument is a value that is passed into a function in an application. sets.
Table 3: Algorithms and Key Types
| Algorithm |
Key Size / Curve / Parameter Set |
Notes | External Reference | Documentation | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ECDSA |
|
|||||||||||||||||||||||||||||
| EdDSA |
|
|
|
|||||||||||||||||||||||||||
| ML-DSA |
|
|
FIPS 204 |
|
||||||||||||||||||||||||||
| RSA |
|
|
|
|||||||||||||||||||||||||||
| SLH-DSA |
|
|
FIPS 205 |
|
Certificate Enrollment Protocols
For specific features supported in each protocol, see the detailed documentation.
Table 4: Certificate Enrollment Protocols
| Protocol/Interface | Notes | External Reference | Documentation |
|---|---|---|---|
| Automatic Certificate Management Environment (ACME) |
|
RFC 8555 | Keyfactor ACME Documentation |
| Simple Certificate Enrollment Protocol (SCEP) |
|
SCEP draft 23 | Keyfactor SCEP Documentation |
| Microsoft Active Directory AutoEnrollment Integration |
|
The Keyfactor Cloud Gateway supports AD AutoEnrollment (see Cloud Gateway). |
Privileged Access Management and Hardware Security Modules
Keyfactor Command is vendor-neutral and interoperates with a wide range of PAM
PAM (Privileged Access Management): Controls privileged access by vaulting credentials, enforcing least-privilege/just-in-time access, rotating secrets, and auditing sessions. Across Keyfactor products, PAM protects diverse sensitive operations and secrets—for example certificate stores and CA credentials—via built-in or third-party providers; external integrations are delivered as custom PAM extensions (several published on Keyfactor’s public GitHub). solutions and HSMs through standards-based interfaces. The solutions and models listed below have been explicitly tested and validated by Keyfactor.
Table 5: Privileged Access Management and Hardware Security Modules
| Vendor/Model | Use Cases | Documentation |
|---|---|---|
| Fortanix Data Security Manager (DSM) | Application-level encryption of Keyfactor Command secrets. | Fortanix HSM |
| Keyfactor Command Local |
Used to secure credentials for, among others:
|
Privileged Access Management (PAM) |
| CyberArk Credential Provider |
Used to secure credentials for, among others:
|
|
| Delinea Secret Server (formerly Thycotic) |
Used to secure credentials for, among others:
|
|
| Hashicorp Vault |
Used to secure credentials for, among others:
|
|
| Google Cloud Secret Manager |
Used to secure credentials for, among others:
|
Was this page helpful? Provide Feedback