Section 6 - Chapter 15 Flashcards
AD CS Role Services
Certificate Authority - issues and manages certs
CA Web Enrollment - allows users to: request and renew certs, retrieve CRLs, enroll for smart card certs
Online Responder - makes cert revocation data accessible
Network Device Enrollment Service - certs for routers and other hardware
Cert Enrollment Web Services - enroll and renew certs when computer does not belong to domain or is outside security boundary
Cert Enrollment Web Policy Service - policy based auto enroll cert enroll web service users, provides policies not certs
Comparison
Publish CA config to AD DS
Stand Alone - optional
Enterprise - mandatory
Comparison
CA Cert Data Integration w/ AD DS Forests
Stand Alone - optional, manual process
Enterprise - mandatory and automatic
Comparison
CRL publication in AD DS Forest
Stand Alone - optional, manual process
Enterprise - mandatory and automatic, includes delta CRLs and cross certificates
Comparison
AD DS Forest pub assigned per template level as an attribute of the template
Stand Alone - n/a
Enterprise - supported
Comparison
Web Enrollment for cert requests and validation
Stand Alone - supported
Enterprise - supported
Comparison
Cert MMC for request and validation
Stand Alone - n/a
Enterprise - supported
Comparison
Cert requests thru http or https
Stand Alone - supported
Enterprise - supported
Comparison
Cert requests thru RPC and DCOM
Stand Alone - n/a
Enterprise - default mode
Comparison
V1 templates with custom object identifiers (OID) as source of certs
Stand Alone - Default
Enterprise - n/a
Comparison
V2 & V3 templates - can be customized and duplicated
Stand Alone - n/a
Enterprise - default
Comparison
User input during cert requests
Stand Alone - manual
Enterprise - retrieved from AD DS
Comparison
Supported enrollment methods
Stand Alone - automatic or pending for all templates
Enterprise - automatic or pending, applied on a per template basis
Comparison
Cert approval process
Stand Alone - manual
Enterprise - manual or auto thru AD DS
Comparison
Cert Publishing
Stand Alone - manually to client or CA, AD DS thru custom policy module
Enterprise - depends on cert type and setting, can be auto enrolled in clients cert store and pub’d in AD DS
Comparison
Cert Publishing and manangement thru AD DS
Stand Alone - n/a
Enterprise - supported
Deployment Options
Stand Alone - DC, Member Server or Stand Alone Server
Standard, Enterprise or Datacenter
Enterprise - DC or Member Server
Enterprise or Datacenter
CPS - Certificate Policy Statement
Clear definition of who your company is
A list of your certificate policies
A general statement of proceedures used to issue, assign and revoke certs
A description of methods used to protect CAs
Revocation policy used
AD CS New Features 2008 r2
Certificate Enrollment and Certificate Enrollment Policy Web Services
Certificate enrollment across forests
Better support for high-volume CAs
AD CS Web Services
Cert enroll over http/https
Proxy between client and CA
Direct communication unnecessary
Allows enroll over internet and across forests
Functional Levels Needed for AD CS Web Services
Forest Functional Level 2008 r2
CA running 2003 and above
Client Computers Win 7
Cross Forest Enroll - CA running Enterprise or Datacenter
Cross Forest Enrollment
Two Way Trust
Forest Functional Level 2003
Issue Certs - forest functional level 2003
Enrollment - forest functional level 2008 r2
Clients do not need an update
High Volume CAs
Windows Server Network Access Protection (NAP) may require
Non persistant cert processing
Bypasses certain CA database operations - not storing each request record and issued cert
Improves performance and reduces CA operational costs
Can no longer revoke certs or manage CRLs
AD CS Hosting Server Config
Multiple processors
Minimal RAM
Seperate disks for store on Root
Another disk for logs on Issuing
Medium key lengths
RAID balanced for reliability and performance
Stand Alone Root CA - Installation
AD CS only role needed
Create new private key or use existing
Chose CN - name will be embedded in every subordinate cert issued by the chain, cannot change once installed
Set Validity Period
Select cert db and cert db log file paths
Create a new private key
Only for internal networks
Select Cryptographic Service Provider (CSP)
Key Character Length
Hash Algorithm
Allow Admin Interaction When Private Key is Accessed by the CA
Using An Existing Key
Reinstalling Machine
Chained to 3rd Party, must be pre-installed
Roles That Can Be Installed AD CS
Certificate Authority
CA Web Enrollment
Online Responder
Network Device Enrollment Service
Certificate Enrollment Web Service
Certficate Enrollment Policy Web Service
CA Properties
General Tab
Name, cryptography, hash setting, view cert
CA Properties
Policy Module Tab
Properties - Request Handling
Pending, Admin Must Install
Follow Settings in Template or Automatic
CA Properties
Exit Module
Windows Default - publishes certs when issued
Properties - allow certs to be pub’d to file system
CA Properties
Extensions
CRL Distribution Point (CDP)
Authority Information Access (AIA)
Specify locations from which users can obtain a CRL
Publishing options
CA Properties
Storage
Shows if AD DS integrated
Paths to db and db logs
CA Properties
Certificate Managers
Can restrict Administrators, Domain Admins and Enterprise Admin rights or others who have been added thru the Security Tab
Allow or Deny
CA Properties
Auditing Options
Back up and Restore Changes to Configuration Changes to Security Settings Issue and Manage Cert Requests Revoke Certs and Publish CRLs Store and Retrieve Archive Keys Start and Stop AD CS