yo_bee
asked on
what is Best Pratice for Domain Root CA
What is the purpose of an Offline Root CA (standalone non-member) w/ a Online Domain member Subordinate CA?
We are in the process of decom our AD 2003 DC's and one of them holds the Root CA role.
We want to segment the roles in the newly deployed machines (running 2008 R2) so when there are future upgrades to DC's and other machines we are not worried about the roles on that machine accept the one being decom.
So my colleague proposed and Standalone non-member Offline Root CA with an Online Member Subordinate CA. I am thinking it is overkill for our environment since we are only using the Cert for a wLAN PEP access to our IAS/NPS at the present time.
We are in the process of decom our AD 2003 DC's and one of them holds the Root CA role.
We want to segment the roles in the newly deployed machines (running 2008 R2) so when there are future upgrades to DC's and other machines we are not worried about the roles on that machine accept the one being decom.
So my colleague proposed and Standalone non-member Offline Root CA with an Online Member Subordinate CA. I am thinking it is overkill for our environment since we are only using the Cert for a wLAN PEP access to our IAS/NPS at the present time.
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Not sure the context of your question.
The CA issuing certificates has to be running on a member server of a domain.
There can only be one root CA. You can have multiple subordinate certificate issuing CAs.
The CA issuing certificates has to be running on a member server of a domain.
There can only be one root CA. You can have multiple subordinate certificate issuing CAs.
ASKER
What's the purpose of not just having a Root CA if the requirements are very mininual.
Do you really need a root offline with a subordinate online ?
Do you really need a root offline with a subordinate online ?
The offline provides for a security mechanism. I.e. if the ROOT CA is compromised through access, all certificates become suspect. If the subordinate issuing CA is compromised, you Would on the root CA revoke the subordinate certificate and issue a new subordinate certificate. This way you impact will be narrower I.e. you have two issuing CAs and the CRL will cancel only a subset of certificates issued by the compromised subordinate CA.
ASKER
Thanks for the details on this.
ASKER