For developers

developers meeting

National Certification Authority of the Republic of Kazakhstan is interested in provision of information systems developer`s kits (both national and private) for further usage of registration certificates of the NCA of the RoK. 

To start using NCA of the RoK registration certificates in information systems, an IS user or his/her representative should obtain an information systems developer`s kit of the NCA of the RoK containing libraries and test registration certificates. You need to do the following:

1. Send draft letter and handover and acceptnace certificate to info@pki.gov.kz to check the correctness thereof.

2. Signed, sealed letters and 2 copies of the act of acceptance and transfer (signed and sealed) are not required to be sent to JSC “National Information Technologies”, at the address: Republic of Kazakhstan, Z05H9B0, Nur-Sultan, BC “Expo”, 55/15 Mangilik El str., block C 2.3, subscriber’s mailbox for incoming letters in the lobby (office 340 room 3.16.1).

IMPORTANT!

NCA of the RoK is only responsible for the provision of systems developer`s kit of the NCA of the RoK; delivery of consultations related to   officials versions of NCA of the RoK encryption provider provided in a developer`s kit and a document describing rules for digital signature and registration certificates of NCA of the RoK verification.    

Information system owner is responsible for verification of signature.

For more details contact our specialists via e-mail: info@pki.gov.kz .
Should any technical issues arise, contact us via e-mail knca@pki.gov.kz.

Service name Address
Time stamp service tsp.pki.gov.kz
The list of revoked certificates
RSA
CRL (Live), CRL (Reserve)
Delta CRL (Live), Delta CRL (Reserve)
GOST
CRL (Live), CRL (Reserve)
Delta CRL (Live), Delta CRL (Reserve)
Online Certificate Status Protocol (RSA, GOST) ocsp.pki.gov.kz

Kalkan Crypt compliance certificate

Guidelines for information systems upon interaction with NCA of the RoK

Archival registration certificates of NCA of the RoK

Rules for verification of digital signature authenticity

Requirements to NCALayer modules development