Solved

PKI consulting and times questions

Posted on 2014-12-17
3
163 Views
Last Modified: 2014-12-18
Hello Experts

Can someone please provide some estimate on deploying a PKI[Windows 2012 R2] infrastructure from scratch for a customer?

I need to get average times to deploy and setup a 2 or 3 tier PKI infrastructure from scratch

I have a client that will go with single tier initially – are there any gotchas that need to addressed to go 2 tier down the road (or do you simply go 2 tier from the start)?
 
Here’s a step by step link for what’s needed for W2K8 R2.  Are there any major differences with W12R2?
http://social.technet.microsoft.com/wiki/contents/articles/11750.step-by-step-guide-single-tier-pki-hierarchy-deployment.aspx

Please respond all questions

Thanks in advance
0
Comment
Question by:Jerry Seinfield
3 Comments
 

Author Comment

by:Jerry Seinfield
ID: 40505473
Can I get an update please?
0
 
LVL 35

Accepted Solution

by:
Mahesh earned 250 total points
ID: 40506454
It depends on how big the customer setup is

U can go with standalone root CA + subordinate enterprise root CA, however for most of the small organizations this is more than required.
Probably you would be better off with enterprise  root CA only

There are some new additions with 2012 CA as compared to 2008 R2, however for day to day working no problems, you can deploy 2012 R2 CA server

You can daily take CA server backup which can be restored in case if required
U can deploy CA role in failover cluster, however its not required because there are no major dependencies on CA unless you have applications looking for CA urls \ availability
0
 
LVL 78

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 250 total points
ID: 40506464
Deploying an offline root ca and a suboridinate CA  takes about 1 hour. This is for internal use only. If you need to trust other companies and they need to trust you then it takes exponentially longer. i.e. setting up your policy server. getting oid's, having your policies validated by the other companies. Setting up a HSM (hardware security module) and defining how many key cards are required to create a certificate (each certificate type can have different key card and identification requirements.  All of this is in your policy.inf

Always use a VM for the root CA and it can be turned off once the first subordinate CA is deployed. The Root CA holds the keys to the kingdom and is only used for creating subordinate CA's
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Join & Write a Comment

If you want to move up through the ranks in your technology career, talent and hard work are the bare necessities. But they aren’t enough to make you stand out. Expanding your skills, actively promoting your accomplishments and using promotion st…
With the shift in today’s hiring climate (http://blog.experts-exchange.com/ee-blog/5-tips-on-succeeding-in-the-new-gig-economy/?cid=Blog_031816), many companies are choosing to hire freelancers to get projects completed efficiently and inexpensively…
In this Micro Tutorial viewers will learn how to restore their server from Bare Metal Backup image created with Windows Server Backup feature. As an example Windows 2012R2 is used.
In this Micro Tutorial viewers will learn how to restore single file or folder from Bare Metal backup image of their system. Tutorial shows how to restore files and folders from system backup. Often it is not needed to restore entire system when onl…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now