• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 229
  • Last Modified:

PKI consulting and times questions

Hello Experts

Can someone please provide some estimate on deploying a PKI[Windows 2012 R2] infrastructure from scratch for a customer?

I need to get average times to deploy and setup a 2 or 3 tier PKI infrastructure from scratch

I have a client that will go with single tier initially – are there any gotchas that need to addressed to go 2 tier down the road (or do you simply go 2 tier from the start)?
 
Here’s a step by step link for what’s needed for W2K8 R2.  Are there any major differences with W12R2?
http://social.technet.microsoft.com/wiki/contents/articles/11750.step-by-step-guide-single-tier-pki-hierarchy-deployment.aspx

Please respond all questions

Thanks in advance
0
Jerry Seinfield
Asked:
Jerry Seinfield
2 Solutions
 
Jerry SeinfieldAuthor Commented:
Can I get an update please?
0
 
MaheshArchitectCommented:
It depends on how big the customer setup is

U can go with standalone root CA + subordinate enterprise root CA, however for most of the small organizations this is more than required.
Probably you would be better off with enterprise  root CA only

There are some new additions with 2012 CA as compared to 2008 R2, however for day to day working no problems, you can deploy 2012 R2 CA server

You can daily take CA server backup which can be restored in case if required
U can deploy CA role in failover cluster, however its not required because there are no major dependencies on CA unless you have applications looking for CA urls \ availability
0
 
David Johnson, CD, MVPOwnerCommented:
Deploying an offline root ca and a suboridinate CA  takes about 1 hour. This is for internal use only. If you need to trust other companies and they need to trust you then it takes exponentially longer. i.e. setting up your policy server. getting oid's, having your policies validated by the other companies. Setting up a HSM (hardware security module) and defining how many key cards are required to create a certificate (each certificate type can have different key card and identification requirements.  All of this is in your policy.inf

Always use a VM for the root CA and it can be turned off once the first subordinate CA is deployed. The Root CA holds the keys to the kingdom and is only used for creating subordinate CA's
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Cloud Class® Course: Python 3 Fundamentals

This course will teach participants about installing and configuring Python, syntax, importing, statements, types, strings, booleans, files, lists, tuples, comprehensions, functions, and classes.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now