Chapter 13: Active Directory Certificate Services Flashcards

(38 cards)

1
Q

Define a symmetric key

A

A single “key”, or password/shared secret is used to encrypt/decrypt the information or to provide access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define an asymmetric key

A

Uses public/private key pair to encrypt/decrypt data or provide access; A key can only perform one operation - either encrypt or decrypt. Public keys are always distributed to the public via TLS certificate to encrypt data and the private key is installed on the internal webserver to decrypt data or vise versa when webserver is communicating back to client. Private keys are distributed to users during authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is data signed as a means of verification and encrypted together to improve security of the data during transfer/receipt?

A
  1. A hashing algorithm is applied to the original data to create a message digest (hash value; it that represents the data in its original state to verify integrity of data) which is encrypted using the senders private key to digitally sign the data; this package will also include the senders public key so that the message digest can be verified by the recipient
  2. Generate a one-time symmetric key to encrypt the data, message digest, and digital signature; Then encrypt the symmetric key with recipients public key so that only the recipient can decrypt the symmetric key with their private key to then decrypt the data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When receiving signed/encrypted data, how is it decrypted?

A

Decrypting the symmetric key with the (your) private key; then symmetric key can then be used to decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When receiving singed/encrypted data, how is the digital signature verified?

A

Decrypt the message digest with the senders public key; Calculate the hash using the original algorithm, that hash/digest should match the one you decrypted with the public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What data is included in an SSL/TLS certificate?

A
  • Version: X.509 standards define the format of the certificate. It was first introduced in 1988, and currently, it uses version 3.
  • Serial number: A unique identifier used by the CA to identify the certificate.
  • Signature algorithm: The type of algorithm used by the CA to sign the digital certificate.
  • Signature hash algorithm: The type of hash algorithm used by the CA.
  • Issuer: The name of the CA who issued the certificate.
  • Valid from: The day the certificate was issued by the CA.
  • Valid to: The day the certificate will expire.
  • Subject: The individual to whom the certificate was issued.
  • Public key: The public key of the certificate owner. This will be the object or the service it was issued to.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is best practice when configuring CAs in an environment?

A

Bring the root CA online only when required. By considering the security and hierarchy of the PKI, it is recommended to use the root CA only to issue certificates to subordinate CAs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the responsibilities of the subordinate CA in a best practice environment?

A

Subordinate CAs are responsible for issuing, storing, managing, and revoking certificates for users, devices, or services; also known as issuing CAs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the responsibilities of the intermediate CA in a best practice environment?

A

Subordinate CAs can have more subordinate CAs under them. In such situations, subordinate CAs are also responsible for issuing certificates for their own subordinate CAs. The parent subordinate CAs are called intermediate CAs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a certificate enrollment web service?

A

Allows users, computers, or services to request a certificate or renew a certificate via a web browser, even if it is not domain-joined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is “Certificate Enrollment Policy Web Service”

A

Similar to Certificate Enrollment Web Service; When a client requests policy information, the Enrollment Policy Web Service queries the AD DS using LDAP ; Once the user has the policy, they can request a certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is “Certification Authority Web Enrollment”

A

Users, computers, or services can request certificates using a web interface. Using the interface, users can also download the root certificates and intermediate certificates to validate a certificate. This can be used to request the certificate revocation list (CRL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of Certificate Authorities (CAs)?

A

Standalone and Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the functions/features of a standalone CA?

A
  • Does not depend on AD DS; can be installed on a member server or standalone server in a workgroup
  • Can stay offline
  • Only supports standard templates
  • Manual or web enrollment
  • Manual cert approval process
  • Cert issuance and managing using AD DS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the functions/features of an enterprise CA?

A
  • Can only be installed on a member server
  • Cannot be offline
  • Customized certificate templates supported
  • Auto, manual, or web enrollment
  • Cert approval process is manual or automatic based on the policy
  • User input fields for cert fields are retrieved from AD DS
  • Certificate issuing and managing using AD DS is supported
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the best use case for a standalone CA?

A

Standalone CAs are mostly used as the root CA as they can switch between online/offline

17
Q

What is the purpose of a root certificate authority (CA)?

A

Root CAs are only used to issue certificates to a subordinate/intermediate CA

18
Q

What is the benefit/advantage that an enterprise CA has in terms of cert management?

A

Enterprise CAs allow engineers to create certificate templates with specific
requirements and publish those via AD DS. End users can request certificates based
on these templates

19
Q

Are there any licensing requirements to utilize and enterprise CA?

A

Enterprise CAs can only be installed on the Windows Server Enterprise Edition or the Datacenter Edition

20
Q

What are the different PKI deployment models?

A
  1. Single-tier
  2. Two-tier
  3. Three-tier
21
Q

Describe a “single-tier” PKI deployment model

A
  • The simplest deployment model for a PKI; not recommended for use in any production network as it’s a single point of failure
  • A single CA will act as a root CA and issuing CA
22
Q

What are the advantages of a single-tier PKI deployment?

A
  • Fewer resources are needed to
    manage it
  • Deployment is faster and it is
    possible to get the CA running in a
    short timeframe
23
Q

What are the disadvantages of a single-tier PKI deployment?

A
  • There is a high possibility of being compromised as the root CA is online and running all the PKI-related roles from one single server. If someone gets access to a private key of the root CA, they have complete ownership over the PKI
  • There is a lack of redundancy, as certificate issuing and management all depend on a single server
  • It is not scalable, and the hierarchy will need to be
    restructured if more role servers need to be added
24
Q

Describe a “two-tier” PKI deployment model

A
  • In this design, the root CA is kept offline. It will help to protect the private key of the
    root certificate from being compromised
  • Root CAs will issue certificates for subordinate CAs, and subordinate CAs are
    responsible for issuing certificates for objects and services
25
What is best practice for managing a two-tier PKI deployment model?
- If a subordinate CA's certificate expires, the offline root CA will need to be brought online to renew the certificate. - The root CA doesn't need to be a domain member, and it should be operating at the workgroup level (a standalone CA). Therefore, certificate enrollment, approval, and renewal will be a manual process.
26
What are the advantages of a two-tier PKI deployment?
- A scalable solution and the number of issuing CAs can be increased based on the organization's requirements. This allows us to extend the CA boundaries to multiple sites, too - You can restrict the issuing CA's impact on the CA hierarchy by controlling the scope of the certificate. It will prevent the issuing of rogue certificates - Improved performance, as workloads can be shared among multiple subordinate CAs - Flexible maintenance capabilities/high availability
27
What are the disadvantages of a two-tier PKI deployment?
- Cost -High maintenance - The manual certificate renewal process between the root CA and subordinate CAs adds more risks
28
Describe a "three-tier" PKI deployment model
- Has an offline root CA and online issuing CAs and offline intermediate CAs, which operate between the root and subordinate CAs -
29
What is the purpose of an intermediate CA in a three-tier PKI deployment model?
The role of the intermediate CAs is to operate as policy CAs; In larger organizations, different departments, different sites, and different operation units can have different intermediate CAs to control policy for the issuing CAs in that unit - Both the root CA and intermediate CAs operate as standalone CAs. The root CA will only issue certificates to intermediate CAs, and those will only issue certificates to issuing CAs
30
What are the advantages of a three-tier PKI deployment?
- In the event of the compromise of the issuing CA, the intermediate CA can revoke the compromised CA with minimum impact to the existing setup - Improved control over certificate policies, allowing enterprises to have tailored certificates
31
What are the disadvantages of a three-tier PKI deployment?
- Cost - High maintenance - Complexity
32
What are the main considerations when planning disaster recovery for AD certificate services?
- Role of the CA; What is it used for, does it receive frequent requests or is it offline mainly? - If the CA is mission-critical, we need to maintain lower RTO and RPO values
33
What is the key to maintaining low RTO and RPO values?
To maintain lower RPO and RTO values most of the time, we have to use replication services
34
Define "Recovery Point Objective (RPO)"
The RPO value explains the frequency of the backup; What increment of time for allowable data loss; In the event of failure, how much data can we afford to lose? Is it 5 minutes or a few hours?
35
Define "Recovery Time Objective (RTO)"
The RTO value explains how long it will take to recover from a disaster
36
What details about the PKI deployment/setup should be documented in case of failure?
1. The purpose of the CA 2. Topology 3. Certificate template details 4. CA permissions
37
To recover a CA using a backup, what is required of the backup?
1. A certificate database 2. Certificate database log files 3. A CA certificate and private key 4. CA registry configuration
38
What are the main 3 methods to backup a windows CA?
1. System state backup 2. The certutil command utility + Registry Export 3. The Backup-CARoleService PowerShell cmdlet + Registry Export