Solved

Certificate Services in 2003...how do I get the certificates 'tied to a real, root certifying authority?

Posted on 2004-04-28
4
266 Views
Last Modified: 2010-04-19
In lab I've been able to set up Certificate Services, and issue the certs to users.  I've been able to use them to sign email (their main purpose for me).....but I would really like to have the certificates fully trusted beyond my own domain.  I'd like the certificates to be tied to a real, root Certifying Authority such as a Verisign or GeoTrust, so that the certs are fully functional and can be fully trusted by those beyond my enterprise.

Am I nuts?  I can't find any documentation in the reams and reams I've read from Microsoft that tells me how to do this...which tells me it's probably incredibly simple.
0
Comment
Question by:strangefrogg
4 Comments
 
LVL 1

Expert Comment

by:wrsinclair
ID: 10943775
You have to obtain your certificates from an authority in order for them to be trusted beyond your domain.  Or you have to pay Microsoft big bucks to be listed as an authority!
0
 
LVL 7

Accepted Solution

by:
msice earned 35 total points
ID: 10943782
There is a wizzard to do this useing the Certificate Services basicly the same as with 2000.
http://www.microsoft.com/technet/prodtechnol/windows2000serv/technologies/iis/maintain/featusability/c06iis.mspx#XSLTsection124121120120
Look under the "Submitting Certificate Requests to Third-Party Authorities" Section.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
I've always wanted to allow a user to have a printer no matter where they login. The steps below will show you how to achieve just that. In this Article I'll show how to deploy printers automatically with group policy and then using security fil…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…

828 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question