Skip to main content

Red Hat

Red Hat logo

Red Hat

Red Hat provides open source software solutions using a community-powered approach to deliver reliable and high-performing Cloud, Linux, middleware, storage, and virtualization technologies. Red Hat also offers support, training, and consulting services. As a connective hub in a global network of enterprises, partners, and open source communities, Red Hat helps create relevant, innovative technologies that liberate resources for growth and prepare customers for the future.

Solution Description

Entrust nShield hardware security modules (HSMs), deployed on-premises or as a service, integrate with Red Hat OpenShift, OpenStack, and Certificate System platforms to deliver enhanced security.

OpenShift container platform: nShield offers enhanced key generation, signing, and encryption. For the first time, as part of the DevOps process, developers can use industry-proven nShield HSMs to protect sensitive container data and transactions.

OpenStack cloud platform: nShield HSMs provide enhanced security and compliance, as well as a certified source of entropy for generating keys. nShield protects the master key used to secure the storage, transport, and service keys managed by the Barbican key management system.

Certificate System: nShield HSMs secure the critical private keys that underpin the security that bind people, devices, and services. nShield increase the assurance level of the Certificate System PKI by protecting the private root and signing CA keys.

PAN‑OS®, the software that runs all Palo Alto Networks® next-generation firewalls has integrated IdentityGuard, IntelliTrust and Authority as authentication methods for protecting services and applications.

Administrators or end users can authenticate using Palo Alto's GlobalProtect (VPN) to access various services and applications using Entrust's Multi-Factor Authentication methods. This protects your network and accommodates your existing security infrastructure while ensuring a smooth user experience.

Using Entrust's Authority PKI, you can deploy certificates to enable authentication without users having to manually respond to login challenges. Alternatively, or in addition to certificates, you can implement interactive authentication using IdentityGuard or IntelliTrust, which requires users to authenticate using one or more methods.





United States

Entrust Ready Technology Partner Program



  • Cloud, DevOps
  • PKI, Key & Certificate Management, IoT


Red Hat OpenShift Solution Brief

Solution Briefs

open folder icon
September 14, 2021
Red Hat OpenShift and Entrust CloudControl


directional sign icon
February 12, 2024
Red Hat Certificate System Solution Brief

Solution Briefs

open folder icon
September 14, 2021
Red Hat OpenStack Solution Brief

Solution Briefs

open folder icon
September 14, 2021
Entrust nShield Connect HSMs Data Sheet

Data Sheets

file icon
March 11, 2022
Talk to an expert

Our experts will contact you to discuss how our partnerships and solutions can meet your needs.