Solved

CA in a Multi-forest AD Environment

Posted on 2008-10-15
1
421 Views
Last Modified: 2013-12-04
We are thinking about bringing up a CA within our organization for issuing certs to computers,  and I have a question about Microsoft CA Service.  We have a total of 7 AD forests in our organization and there are no trusts established among them.  After reading through Microsoft whitepaper, it seems to me the best approch (for us) is setting up one offline standalone CA and one to two enterprise subordinate CA's for each forest in our environment. Can this work?  Would I be able to publish the root CA's CDP and AIA and set up subordination to multiple AD forests?   I was not able to find anything regarding how CA should be set up in a multi-forest AD environment.  Please help.
0
Comment
Question by:shong1997
1 Comment
 
LVL 19

Accepted Solution

by:
CoccoBill earned 500 total points
ID: 22739840
Enterprise CAs are tied to a forest, but standalone CAs can span multiple forests. Create a standalone offline root CA and one or more enterprise subordinate issuing CAs per forest. The offline root should be standalone anyway, since a domain member will be removed from the domain after 90 days offline, which would essentially irreparably kill it.

From the client's point of view the Sub/Issuing CA is the only one they care about, they never need to access the root. CDPs and AIAs can be set on a per server basis, so it shouldn't be a problem to point the certs issued on each CA to look for them in the local forest. The offline root only issues the CA certs to the sub-CA's, and CDP/AIA will point to the offline server. This isn't a problem, and you'll be updating the CRLs and renewing CA certs manually anyway. Trust relationships are not required, but as you probably know, cersvc uses RPC so 135/tcp and high ports over 1024 need to be open.

Here's a couple good links for additional information:
http://technet.microsoft.com/en-us/library/cc737834.aspx
http://technet.microsoft.com/en-us/library/cc728390.aspx
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

Suggested Solutions

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now