In Windows Explorer on the root CA, locate the certificate revocation list you just published. The CRL's default location is:%systemroot%\system32\CertSrv\CertEnroll\<CAname>.crl. Right-click the CRL file and send it to a drive that has portable storage media.
↑ Return to Top
There are several considerations related to building an offline root CA. The following sections link to additional information related to PKI design, offline root CA installation, and frequently asked questions (FAQ).
Ed Price - MSFT edited Revision 24. Comment: Added whitespace below TOC. Added tags
Ed Price - MSFT edited Revision 23. Comment: Added whitespace between lines. Added tags.
Kurt L Hudson edited Revision 19. Comment: Added return to top links
Kurt L Hudson edited Revision 16. Comment: Removed the "should have IIS installed" totally not needed anymore
Douks edited Revision 14. Comment: Added a link to Vadim's useful article on Root CA Certificate Renewal.
Ed Price - MSFT edited Revision 12. Comment: Fixed TOC issues.
Kurt L Hudson edited Revision 10. Comment: Updated formatting and some titles
Kurt L Hudson edited Revision 9. Comment: Finished update of tables
Kurt L Hudson edited Revision 8. Comment: Work in progress saving table now.
Kurt L Hudson edited Revision 7. Comment: Mid-update trying to replace a TechNet document checklist by adding it here
Ed Price - MSFT edited Revision 26. Comment: Removing "(en-US)" from titles. Adding tags.
"Offline root CAs can issue certificates to removable media devices (e.g. floppy disk, USB drive, CD/DVD) and then physically transported to the subordinate CAs..."
Q: Isn't it a bigger security threat to place your certs on a portable media that can be easily lost or stolen, than to allow a secured network to communicate them across the domain?
Thanks. Also, great links...
Very good ! :)