John Adams rozebírá stav dnešních aplikací PKI v organizacích. Mj. uvádí následující p?íklady:
- Web Server Authentication through Secure Socket Layer (SSL)
- Virtual Private Network (VPN) Server Authentication (IPSec and SSL)
- Client Authentication to Web Servers (Internet/Intranet/Extranet) and VPNs
- Digital signing of e-mails, forms, documents and invoices
- Encryption of e-mails, documents, forms, transactions and files in transit
- Encryption of data at rest on laptops, thumb drives, mobile phones, etc.
- Code signing / mobile phone code signing