Skip to the main content.

Did you know?

 

RTI is the world’s largest DDS supplier and Connext is the most trusted software framework for critical systems.

Success-Plan-Services-DSSuccess-Plan Services

Our Professional Services and Customer Success teams bring extensive experience to train, problem-solve, mentor, and accelerate customer success.

Learn more

Developers

From downloads to Hello World, we've got you covered. Find all of the tutorials, documentation, peer conversations and inspiration you need to get started using Connext today.

Try the Connectivity Selection Tool ⇢

Resources

RTI provides a broad range of technical and high-level resources designed to assist in understanding industry applications, the RTI Connext product line and its underlying data-centric technology.

Company

RTI is the infrastructure software company for smart-world systems. The company’s RTI Connext product is the world's leading software framework for intelligent distributed systems.

Contact Us

News & Events
Cooperation

Certificate Lifecycle Management with RTI Security Extensions

Certificate Expiration and Revocation

⇠ All Case + Code Examples

Case-Code-hero

Introduction

It isn’t enough to simply secure your system. You also need to plan for when system elements are compromised, whether through accident or by the actions of a malicious actor. When this happens (and it will), it is necessary to be able to quarantine those system elements until the problem is resolved.

For critical applications that cannot be brought down due to a security issue, you need to be able to perform this action dynamically, without reconfiguring and restarting the entire system. Simply revoking certificates of compromised elements isn’t enough. You need to make sure that all communication channels created using those certificates are closed down as well.

Multiple parts of your system have to work together to do this well, from threat detection to certificate management to the actual communication between devices. This type of integration can be challenging and it is important to do it right, as mistakes here can keep security issues from being handled on time and properly.