Browse by Tags

Tagged Content List
  • Wiki Page: Test Lab Guide Mini-Module: Cross-Forest Certificate Enrollment using Certificate Enrollment Web Services

    Applies to Windows Server 2012 and Windows 8 Table of Contents Prerequisites Configuration Install and configure Litwareinc.com Install the operating system on Litwareinc-DC1 Configure the TCP/IP properties on Litwareinc-DC1 Configure Litwareinc-DC1 as a domain controller and DNS server Create a user...
  • Wiki Page: AD CS Step by Step Guide: Two Tier PKI Hierarchy Deployment

    This step-by-step guide describes the steps needed to set up a basic configuration of Active Directory® Certificate Services (AD CS) in a lab environment. AD CS in Windows Server® 2008 R2 provides customizable services for creating and managing public key certificates used in software security systems...
  • Wiki Page: Active Directory Certificate Services (AD CS) Clustering

    Table of Contents Applies To: Scope Windows Versions That Support Certificate Services Clustering Cluster Requirements Supported Deployment Scenarios Preparing the CA Cluster Environment Installing the Operating System on Cluster Nodes Setting Up a Shared Storage Configuring a Network HSM Installing...
  • Wiki Page: Public Key Infrastructure Design Guidance

    Before you configure a Public Key Infrastructure (PKI) and certification authority (CA) hierarchy, you should be aware of your organizations security policy and certificate practice statement (CPS). If your organization does not have such policy statements, you should consider creating them. For more...
  • Wiki Page: AD CS and PKI Step-by-Steps, Labs, Walkthroughs, HowTo, and Examples

    This article is an evolving collection of Active Directory Certificate Services (AD CS) and Public Key Infrastructure (PKI) step-by-step information. The links in this article should take you to places where you can perform or see the actual steps for deploying or administering a PKI using AD CS. ...
  • Wiki Page: Reduce the Operational Risk When Defending the Open Network with Microsoft PKI

    Table of Contents Introduction Protecting an Open Network Limitations of Traditional Network Security Security Solution Requirements Solution: Microsoft PKI How Microsoft PKI Works Certificate services IPSec support Encrypted e-mail communication Wireless security Centralized management features Scenarios...
  • Wiki Page: Large CRLs: What is Added to a Certificate Revocation List (CRL)?

    This article discusses the reasons a certificate revocation list (CRL) can become large. The contents of this article include the following: Table of Contents What makes large CRL? Additional References What makes large CRL? There is really one item that makes the CRL grow: revoked certificates...
  • Wiki Page: Hardware Security Module (HSM)

    A hardware security module (HSM) is a hardware encryption device that's connected to a server at the device level, typically using PCI, SCSI, serial, or USB interfaces. An HSM is a dedicated hardware device that is managed separately from the operating system. These modules provide a secure hardware...
  • Wiki Page: AD CS PKI Design

    Active Directory Certificate Services (AD CS) Public Key Infrastructure (PKI) Design Guide The Windows Server® product line provides a variety of secure applications and business scenarios based on the use of digital certificates. Before you can use digital certificates, however, you need to design...
  • Wiki Page: Offline Root Certification Authority (CA)

    A root certification authority (CA) is the top of a public key infrastructure (PKI) and generates a self-signed certificate. This means that the root CA is validating itself (self-validating). This root CA could then have subordinate CAs that effectively trust it. The subordinate CAs receive a certificate...
  • Wiki Page: Step by Step Guide – Clustering an Existing Certification Authority

    Table of Contents Clustering the certification authority Lab environment Prerequisites specific to Contoso Understanding naming conventions in certification authority clustering Action Items Move the certification authority database to shared disk Verify the certification authority’s new database ...
  • Wiki Page: Securing wireless networks using an Active Directory Certificate Services PKI

    <<< Authoring in progress >>> Table of Contents Introduction Design Decisions Introduction Many organizations have tested the use of wireless LANs (WLANs) but have shied away from large deployments or banned their use altogether. Despite the many productivity and technology...
Page 1 of 1 (12 items)
Can't find it? Write it!