Link to home
Start Free TrialLog in
Avatar of yo_bee
yo_beeFlag for United States of America

asked on

what is Best Pratice for Domain Root CA

What is the purpose of an Offline Root CA (standalone non-member) w/ a Online Domain  member Subordinate CA?

We are in the process of decom our AD 2003 DC's and one of them holds the Root CA role.
We want to segment the roles in the newly deployed machines (running 2008 R2) so when there are future upgrades to DC's and other machines we are not worried about the roles on that machine accept the one being decom.

So my colleague proposed and Standalone non-member Offline Root CA with an Online Member Subordinate CA.  I am thinking it is overkill for our environment since we are only using the Cert for a wLAN PEP access to our IAS/NPS at the present time.
ASKER CERTIFIED SOLUTION
Avatar of arnold
arnold
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of yo_bee

ASKER

Question I have is what is the difference of a Root CA vs Subordinate CA issuing a Cert?
Not sure the context of your question.
The CA issuing certificates has to be running on a member server of a domain.
There can only be one root CA. You can have multiple subordinate certificate issuing CAs.
Avatar of yo_bee

ASKER

What's the purpose of not just having a Root CA if the requirements are very mininual.

Do you really need a root offline with a subordinate online ?
The offline provides for a security mechanism. I.e. if the ROOT CA is compromised through access, all certificates become suspect. If the subordinate issuing CA is compromised, you Would on the root CA revoke the subordinate certificate and issue a new subordinate certificate.  This way you impact will be narrower I.e. you have two issuing CAs and the CRL will cancel only a subset of certificates issued by the compromised subordinate CA.
Avatar of yo_bee

ASKER

Thanks for the details on this.