SecureSME streamlines the process of setting up a Public Key Infrastructure (PKI) for small and medium enterprises (SMEs) with an intuitive self-service sign-up and automated provisioning system. Customers can quickly register through a simple web-based interface, providing basic business details and selecting their desired PKI configuration. Once registered, organisations can establish their own Certificate Authority (CA) within minutes, eliminating the complexity traditionally associated with PKI deployment. The automated setup ensures that security best practices are followed, with predefined templates that can be customized to meet specific business needs.

Figure 1 – SecureSME Dashboard
Once the CA is established, secureSME offers a comprehensive set of certificate lifecycle management (CLM) features, including automated certificate issuance, renewal, and revocation. SMEs can define role-based access controls, integrate with enterprise identity providers (SSO), and configure automated workflows to align with their security and compliance requirements. secureSME supports automated certificate issuance using ACME, SCEP, Auto-Enrollment and a REST-based API. Additionally, secureSME provides real-time monitoring, reporting, and alerting to ensure visibility into certificate usage and potential security risks. Through its user-friendly dashboard, SMEs can manage their PKI with minimal operational overhead, enabling them to focus on their core business while ensuring robust security for their digital assets.
Registration – Self-Service Sign-up
Customers can select the bundle that suits their needs.
The onboarding process is straightforward: customers begin by entering their business name, choosing a username (email address) and selecting a custom login subdomain (e.g., mybusiness.securesme.com). This ensures that each organisation has a dedicated, separate environment.

Figure 2 – SecureSME Account Registration
Once payment method has been added and customer is logged in, you will be greeted with the dashboard, and can create their first CA.

Figure 3 – Jellyfish Dashboard after initial login
Creating a Certificate Authority
Navigating to the “Manage CAs” page shows options for creating a certificate authority.

Figure 4 – Create CA Form
The Create CA form in Jellyfish lets you provide options for your new CA. You can choose between a software-backed or an HSM (hardware security module)-backed signing key. You can select a display name, distinguished name, key usages, certificate policies and revocation information (via Certificate Revocation Lists and/or using the Online Certificate Status Protocol).
You also have the option of choosing templates to license for your CA. We provide several default templates (e.g. a TLS Web Server template), or you can create your own. Once you have a CA you can issue certificates by selecting “Register” > “User Certificate” or “Device Certificate”.
Navigating to Subscriptions > Subscriptions Portal shows your current certificate count as well as a list of invoices. Invoices are generated monthly and will be charged to your payment method automatically. You can view and update your payment methods via the Subscriptions > Payment Methods page.

Figure 5 – Subscriptions Portal
SecureSME, our PKI as a Service (PKIaaS) and Key Management as a Service solution, is tailored for small and medium-sized enterprises (SMEs), but is also a great solution for large enterprises. It offers a cost-effective, scalable, and secure solution for managing digital certificates as well as other key types. This cloud-based service enables SMEs to simplify the issuance, renewal, and revocation of certificates and keys without the need for extensive in-house expertise or infrastructure. By leveraging a secure Hardware Security Module (HSM) environment, PKIaaS and KMaaS ensures that private or other critical keys are generated, stored, and managed with the highest level of protection, adhering to strict compliance standards such as FIPS 140-2 and FIPS 140-3. This service supports diverse use cases, including email encryption, digital signatures, device authentication, and secure communications, empowering SMEs to enhance their cybersecurity posture while maintaining operational efficiency.