Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:54 PM
Dark Reading
Dark Reading
Products and Releases

InCommon Introduces Certificate Service

Trust service that will offer unlimited server and personal certificates to U.S. colleges and universities

ANN ARBOR, MICHIGAN, June 03, 2010 - The InCommon Federation has today announced the launch of a new trust service that will offer unlimited server and personal certificates to U.S. colleges and universities. As the first certificate service of its kind in the U.S., Internet2, which operates InCommon, is introducing this offering to provide the U.S. higher education community with a cost-effective means of deploying and operating a more secure and authenticated online environment for their campus constituencies. Details are available at www.incommon.org/cert.

"This new service provides tangible value to the U.S. research and education community and extends a pathway for innovation on campus," said John Krienke, chief operating officer of InCommon. "By offering unlimited SSL certificates, we're providing the potential for campuses to significantly reduce their certificate-related expenses. But at least as important, later this year we will include unlimited personal certificates, setting the stage for campuses to more easily adopt important services like signed email and second-factor authentication. Economics are no longer a limitation for certificate possibilities."

InCommon is offering this service through a partnership with Comodo CA Ltd., a major certification authority and Internet2 industry member. Through the agreement, U.S. institutions of higher education can purchase unlimited numbers of certificates for SSL, personal signing, encryption, and code signing. InCommon partnered with Comodo, in part, because of the successful implementation of a similar program the company developed with TERENA (the Trans-European Research and Education Networking Association). The program launched last year has enabled its NREN members in over 30 European countries and international public sector organizations to offer certificates powered by Comodo to all education institutions throughout Europe.

"We are excited about the opportunity to join InCommon in helping millions of students in colleges and universities across the US to secure their online experience and communications," said Melih Abdulhayoglu, chief executive officer of Comodo. "Enabling students and faculty members with the personal secure certificate and second factor authentication, whether for email encryption or for secure access to the university's internal network, will prevent security breaches and leak of digital information."

Any higher education institution with its primary location in the U.S., and qualifying for an "edu" domain name, is eligible for the program. Internet2 member institutions will receive a 25 percent discount on the Certificate Service. Institutions must also participate in or join InCommon to take advantage of the Certificate Service. The service fee schedule is based on an institution's classification under the Carnegie Foundation for the Advancement of Teaching and requires an initial three-year commitment. The annual fees for the InCommon Certificate Service range from $2,000 for small or specialized institutions up to $20,000 for large research universities.

The InCommon Certificate Service is accepting applications and will test the program with a small number of institutions during June 2010. The University of California Berkeley, an InCommon member, is the first university to announce that it will take advantage of this new community-sponsored service. A full rollout is expected in late summer of 2010. Institutions with expiring certificate agreements will receive priority, allowing them to avoid service interruptions. The roots of InCommon's SSL and personal Certificate Authorities are in all of the major Internet web browsers and devices.

More information is available at www.incommon.org/cert.


InCommon facilitates collaboration through the sharing of protected network-accessible resources by means of an agreed-upon community trust fabric. The InCommon Federation, operated by Internet2, provides a privacy-preserving, secure method for higher education institutions and their partners to offer single sign-on convenience and standards-based security to their faculty, researchers, students and staff. Through InCommon, individuals no longer need to maintain multiple passwords and usernames and online service providers no longer need to maintain user accounts. The educational institution manages the level of privacy and security for its constituents. For more information, see www.incommon.org


Internet2 is an advanced networking consortium led by the research and education community. An exceptional partnership spanning U.S. and international institutions who are leaders in the worlds of research, academia, industry and government, Internet2 is developing breakthrough cyberinfrastructure technologies that support the most exacting applications of today—and spark the most essential innovations of tomorrow. Led by its members and focused on their current and future networking needs since 1996, Internet2 blends its human, IP and optical networks to develop and deploy revolutionary Internet technologies. For more information see www.internet2.edu.

About Comodo

Comodo is a leading brand in Internet security. Headquartered in the US and with offices in UK, China, India, Ukraine, and Romania, Comodo provides businesses and consumers worldwide with security and trust services, including digital certificates, PCI scanning, desktop security, and remote PC support. Securing online transactions for over 200,000 businesses, and with more than 25 million desktop security software installations, including an award-winning firewall and antivirus software, Comodo is Creating Trust Online'. To learn more, visit Comodo's website.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-05
The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.
PUBLISHED: 2021-03-05
Deutsche Post Mailoptimizer 4.3 before 2020-11-09 allows Directory Traversal via a crafted ZIP archive to the Upload feature or the MO Connect component. This can lead to remote code execution.
PUBLISHED: 2021-03-05
ssh-agent in OpenSSH before 8.5 has a double free that may be relevant in a few less-common scenarios, such as unconstrained agent-socket access on a legacy operating system, or the forwarding of an agent to an attacker-controlled host.
PUBLISHED: 2021-03-05
The npm package ansi_up converts ANSI escape codes into HTML. In ansi_up v4, ANSI escape codes can be used to create HTML hyperlinks. Due to insufficient URL sanitization, this feature is affected by a cross-site scripting (XSS) vulnerability. This issue is fixed in v5.0.0.
PUBLISHED: 2021-03-05
A flaw was found in newlib in versions prior to 4.0.0. Improper overflow validation in the memory allocation functions mEMALIGn, pvALLOc, nano_memalign, nano_valloc, nano_pvalloc could case an integer overflow, leading to an allocation of a small buffer and then to a heap-based buffer overflow.