One of the great advantages of our certificate management tool is precisely the possibility to delegate the use of our certificate keeping the same security levels established for its use and always under our control.
On the one hand, all activity will be recorded and audited by the system, and this information will be available to the user.
In addition, through the delegation policies, we can restrict the use we want to be made of it. These policies will determine WHERE, HOW and WHEN our digital certificate can be used.
If necessary, we can even authorize a trusted person to delegate the use of our certificate to a third party, receiving a notification to authorize such delegation.