Amarjeet Shukla
Software Engineer — SSL/TLS
Amarjeet works on SSL certificate lifecycle management at QCecuring. He writes about TLS protocols, certificate automation, and PKI deployment patterns.
42 articles published
Protocols
What is EST (Enrollment over Secure Transport)EST (RFC 7030) is the modern replacement for SCEP, using HTTPS and TLS client authentication for secure certificate enrollment. Here's how it works, what it improves over SCEP, and where to use it.
24 Apr, 2026
Cryptography fundamentals
What is Asymmetric EncryptionAsymmetric encryption uses a key pair — public key encrypts, private key decrypts. Here's how it enables TLS, digital signatures, and key exchange without sharing secrets.
22 Apr, 2026
Kubernetes
TLS Certificates in KubernetesKubernetes uses TLS certificates for cluster communication, ingress termination, and service-to-service encryption. Here's where certificates live in K8s, how they're managed, and where they expire without warning.
19 Apr, 2026
Clm
Certificate Automation at ScaleCertificate automation eliminates human involvement from enrollment through renewal. Here's how organizations automate at scale, what architecture patterns work, and where automation creates new failure modes.
18 Apr, 2026
Hsm
Cloud HSM and Managed HSM ServicesCloud HSMs provide FIPS 140-2 Level 3 hardware key protection without managing physical devices. Here's how AWS CloudHSM, Azure Managed HSM, and Google Cloud HSM compare, and where cloud HSM creates operational dependencies.
12 Apr, 2026
Clm
Certificate EnrollmentCertificate enrollment is the process of requesting, validating, and receiving a signed certificate from a CA. Here's how enrollment works across protocols (ACME, EST, SCEP, manual), what differs between them, and where enrollment fails silently.
10 Apr, 2026
Devsecops
Certificate Automation in CI/CDCI/CD pipelines can automate certificate provisioning for every deployment — requesting, validating, and deploying certificates as part of the release process. Here's how to integrate certificate automation into pipelines and where it fails.
08 Apr, 2026
Code signing
What is Code SigningCode signing uses digital signatures to prove software came from a known publisher and hasn't been tampered with. Here's how it works, what it protects against, and where the signing process fails.
07 Apr, 2026
Code signing
Software Supply Chain SecuritySoftware supply chain security ensures that code, dependencies, build processes, and distribution channels haven't been compromised. Here's how attacks happen, what frameworks exist, and where code signing fits in the defense.
05 Apr, 2026
Ready to Secure Your Enterprise?
Experience how our cryptographic solutions simplify, centralize, and automate identity management for your entire organization.