Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

What are the ramifications of removing a Windows PKI?

Posted on 2014-11-19
2
Medium Priority
?
165 Views
Last Modified: 2014-11-20
I inherited a Windows domain with a PKI configured.  To the best I can determine, it appears it was set up with the goal of enabling encryption on a file server but that it was never enforced and that file server has since been replaced.

I'd like to remove the PKI because it doesn't appear that we're using it and it's messing up some third party certs installed on a couple of domain controllers used for LDAP authentication for cloud services.

What possible/likely consequences are there of removing it (assuming that I follow the articles for removing it)?
0
Comment
Question by:FinServCo
2 Comments
 
LVL 65

Accepted Solution

by:
btan earned 1500 total points
ID: 40454603
If some form of PKI services are installed, it may be running Cert authority services or used to issue cert to other station or server, good to make this is not the intent and the server is not having a CA role. The certificate store will be archiving all certificate and it is good to backup all including private key in case there is need for them due to EFS or other services unknown at the point of removal. Of course ideally it is to clone another HDD before changes make and safekeep for monitoring as backup recovery if need to..also the security log from security event to backup for audit trail...but "PKI" is a big word though for a server may be just part of the PKI ecosystem

In case the below are relevant
How to decommission a Windows enterprise certification authority and remove all related objects
0
 
LVL 2

Author Closing Comment

by:FinServCo
ID: 40454987
Thanks, this gives me more of an idea to look for what it may affect.
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

963 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question