Solved

What are the ramifications of removing a Windows PKI?

Posted on 2014-11-19
2
151 Views
Last Modified: 2014-11-20
I inherited a Windows domain with a PKI configured.  To the best I can determine, it appears it was set up with the goal of enabling encryption on a file server but that it was never enforced and that file server has since been replaced.

I'd like to remove the PKI because it doesn't appear that we're using it and it's messing up some third party certs installed on a couple of domain controllers used for LDAP authentication for cloud services.

What possible/likely consequences are there of removing it (assuming that I follow the articles for removing it)?
0
Comment
Question by:FinServCo
2 Comments
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 40454603
If some form of PKI services are installed, it may be running Cert authority services or used to issue cert to other station or server, good to make this is not the intent and the server is not having a CA role. The certificate store will be archiving all certificate and it is good to backup all including private key in case there is need for them due to EFS or other services unknown at the point of removal. Of course ideally it is to clone another HDD before changes make and safekeep for monitoring as backup recovery if need to..also the security log from security event to backup for audit trail...but "PKI" is a big word though for a server may be just part of the PKI ecosystem

In case the below are relevant
How to decommission a Windows enterprise certification authority and remove all related objects
0
 
LVL 2

Author Closing Comment

by:FinServCo
ID: 40454987
Thanks, this gives me more of an idea to look for what it may affect.
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

#SSL #TLS #Citrix #HTTPS #PKI #Compliance #Certificate #Encryption #StoreFront #Web Interface #Citrix XenApp
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question