Who do I install a Public Key Infrastructure with Windows 2003 Server

Posted on 2005-03-30
Medium Priority
Last Modified: 2010-04-11
My new application requires a Public Key Infrastructure to be installed, I have never done this, how should I do this so that my users can access the keys as needed by this application?

Question by:rmefford
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment

Accepted Solution

graemeboro earned 1500 total points
ID: 13670894
Im not sure exactley what it is your looking for, one solution which I have been involved in implementing is digital certficates.

For this you can set up certificate services on your server and have the option of creating a certificate or purhcasing one from a well known register such as verisign.

Have a  look at :-


Let me know what your doing, and I may be able to provide some more info.

Good Luck

Featured Post

Get real performance insights from real users

Key features:
- Total Pages Views and Load times
- Top Pages Viewed and Load Times
- Real Time Site Page Build Performance
- Users’ Browser and Platform Performance
- Geographic User Breakdown
- And more

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's recap what we learned from yesterday's Skyport Systems webinar.
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses
Course of the Month9 days, 23 hours left to enroll

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question