Certificate Services - AIA, CRL HTTP placement?


hello everyone,

i have design question regarding 2 tier pki. want build pki standalone root ca (offline), enterprise issuing ca1 (first forest), enterprise issuing ca2 (second forest).

ca1 , ca2 should separated each other.

i want have aia , crl of standalone root ca published on both ldap , http.

i have http://pki.first-domain.local/... ca1 and http://pki.second-domain.local/... ca2. somehow possible? based on extensions variables seems it's not possible. recommended approach this? safe put crl , aia root ca ldap / there consequences?

hello everyone,

i have design question regarding 2 tier pki. want build pki standalone root ca (offline), enterprise issuing ca1 (first forest), enterprise issuing ca2 (second forest).

ca1 , ca2 should separated each other.

i want have aia , crl of standalone root ca published on both ldap , http.

i have http://pki.first-domain.local/... ca1 and http://pki.second-domain.local/... ca2. somehow possible? based on extensions variables seems it's not possible. recommended approach this? safe put crl , aia root ca ldap / there consequences?

suggest check blog post outlines recent best practices on designing cdp , aia extensions: designing crl distribution points , authority information access locations

vadims podāns, aka powershell cryptoguy
weblog: www.sysadmins.lv
powershell pki module: pspki
check out new: ssl certificate verifier
check out new: powershell file checksum integrity verifier tool.



Windows Server  >  Security



Comments

Popular posts from this blog

DCOM received error "2147746132" from...

DFSR RPC replication errors 5014 1726 with large files over VPN

ADFS 3.0 Event ID 4625 | An Error occurred During Logon | Status: 0xC000035B