Certificate Services Processing PKI components, both those on clients such as certificate stores and certificates and those on the CA, interoperate to provide public key technologies as part of network operations. Many operating system processes and applications use these services. Many of these processes, such as the use of certificates by IPSec policies and VPNs, are detailed in other chapters. Others, such as certificate enrollment and revocation, that are part of the certificate lifecycle and certificate chaining, which is key to certificate validation, are described in this section.Certificate Lifecycle The certificate lifecycle consists of several events:EnrollmentRenewalUsageRecoveryRevocationExpiration
Certificate Enrollment The Certificate Enrollment function consists of a request, approval, and distribution or rejection. Requests may be made either manually or automatically. The process for requests made to an Enterprise CA follows these steps:
1. | The request is made for a specific certificate type and is sent to the CA. | 2. | The user must be authenticated or the request is denied. | 3. | The requesting identity must have the Enroll permission on the certificate template or the request is denied. | 4. | If the requesting identity is both authenticated and has Enroll permission on the template, the process continues. | 5. | The requesting computer generates the encryption keys. | 6. | The public key of the key pair is transferred to the CA. | 7. | The private key is stored in the user's profile. | 8. | The public key and the credentials of the user along with specific template information are combined to create a certificate. | 9. | If the CA or the certificate type is configured to automatically approve the request, the certificate is issued and can be downloaded to the certificate store of the computer from which the request was received. | 10. | If the CA or the certificate type is configured to require approval, the certificate is held by the CA until approved, rejected, or expired. | 11. | If approved, the requesting identity can download the certificate to the certificate store. |
TIP: Use Web Enrollment to Obtain V2 CertificatesA Windows 2000 computer cannot request a V2 certificate using the Certificates console. However, any computer using IE 5.01 or later can use web-enrollment methods and an ActiveX control to request and download V2 certificates. The ActiveX control can only be downloaded to the computer by a member of the Administrators or Power Users group. V2 certificates downloaded to a Windows XP Professional or a Windows Server 2003 computer can also be exported and then imported to a Windows 2000 computer.Using the Certificates Console to Request a Certificate Use of the Certificates console to request a certificate does not require any special permission if the certificate request is for a certificate for the current user. If the request is for a different entity, such as a computer or a service, administrative privileges are necessary.The Certificates console cannot be used in the following circumstances:A standalone CA is the issuing CA.You cannot select options you need from the Certificate Console Certificate Request Wizard. Some options are not available from this wizard, such as the following:Marking keys as exportable.Choosing the hash algorithm.Saving the request as a PKCS# 10 file.Windows does not generate the certificate subject name.You are requesting a CA certificate from a Windows 2000 CA. In these circumstances, you must use the certificate enrollment pages. These pages are located at http://servername/certsrv. These pages must also be used to download certificates that require approval.TIP: DSS CertificatesIf you require a Digital Signature Standard (DSS) certificate from an enterprise CA, select the User Signature Only certificate template from the wizard certificate page. This certificate uses the Digital Signature Algorithm (DSA) standard for its signature algorithm and the SHA-1 message hash algorithm. DSA can be used only for signatures, not for encryption.To request a personal certificate, follow these steps:
1. | Open a Certificates console by adding the Certificates snap-in to an MMC, or by opening a console created earlier and saved. | 2. | Right-click the Certificates, Personal folder, select All Tasks, and then select Request New Certificate and then click Next. | 3. | In the Certificate Request Wizard, as shown in Figure 12-17, check the type of certificate required.
 | 4. | If an Advanced option or certificate type is required, click the Advanced button and enter information, as shown in Figure 12-18, for the following optional items:The CSP.A key strength.Check the Enable strong private key protection box. Checking this box will require that a password be entered each time the private key is used. Do not select this unless necessary, and do not select this for computer certificates. Computers have no way to respond to a request for a password before the private key can be used.Figure 12-18. Use the Advanced Options page to change defaults for some items.
 | 5. | Click Next, and if more than one CA exists, choose the CA that you are required to use. | 6. | Click Next, enter a friendly name for the certificate, and then click Next. Click Finish. | 7. | Click OK when the popup The certificate request was successful appears. |
Using the Web Enrollment Pages to Request a Certificate Web enrollment pages are located at http://servername/certsrv, where servername is the name of the Windows Server 2003 computer that is hosting web enrollment. This can be either the CA or the RA. Web enrollment pages must be used when the CA is a standalone CA. Additionally, you can also use the web enrollment pages toCheck the status of a pending certificate requestDownload a CRLRetrieve a CA certificate from a CASubmit a request using a PKCS #10 or PKCS #7 fileRequest a smart card certificate on behalf of another user To request a certificate, follow these steps:
1. | Enter the http://servername/certsrv.com address in the browser. | 2. | When prompted, enter your user name and password. | 3. | Click Request A Certificate. | 4. | Click User Certificate or click Advanced Certificate Request, as shown in Figure 12-19. Selecting an advanced certificate request allows you to select- a. Certificate Template (enterprise CAs).
- b. Intended purpose (standalone CA).
- c. Cryptographic Service Provider (CSP). (The code that performs authentication, encryption, decryption, and other cryptographic processing through CryptoAPI. They create keys, destroy them, and use them to provide different cryptographic operations. Different CSPs exist to provide different types of key strength or to fit the requirements of a specific hardware vendor.)
- d. Key size.
- e. Hash algorithm.
- f. Key use, such as exchange, signature, or both. The exchange usage means the key can be used to encrypt data. The signature key usage means the key can be used to digitally sign. If both usages are required, both selections should be made.
- g. Use an existing key set or create a new key set.
- h. Enable strong private key protection.
- i. Mark keys as exportable.
- j. Use the local machine store. This should be selected when the key must be available to other users or when the key is provided for the use of the computer.
- k. Save the request to a PKCS #10 file. Use this option if the CA is not available online.
Figure 12-19. Check the certificate type required. [View full size image] | 5. | If the Advanced request Create and submit a request to this CA is selected, use the Certificate Template drop-down list to select the type of certificate required. Complete any other information required and then click Submit, followed by Yes twice to confirm your request. | 6. | If you are an authenticated user and this is an enterprise CA, the statement No further identifying information is required. To complete your certificate, press submit, as shown in Figure 12-20, may be present. Click the Submit button or click More Options to complete the request. If you click More Options, enter the information for optional items:- a. Enter the CSP.
- b. Enable the use of strong private key protection.
Figure 12-20. Submit the request when prompted. [View full size image] | 7. | If the CA is online, the certificate may be immediately issued. If this is the case, click the Install this certificate link and then click Yes to agree to let the web site install it. A confirmation should appear. | 8. | If the certificate requires approval, the Certificate Pending page appears. You have to return to the web site to check status and, if the request is approved, retrieve the certificate. If the certificate can be automatically approved and is, click OK to download the certificate. |
If certificates must be approved, you may be asked to return later to obtain the certificate. To check on a pending certificate, follow these steps:
1. | Enter the http://servername/certsrv address in the browser. | 2. | Click View the Status Of a Pending Certificate Request. | 3. | If there are no pending requests, a message will state so. | 4. | If there are requests, the certificates will be listed. | 5. | Click a certificate to see its status. Its status may be one of the following:- a. Still pending. Your only choice here is to remove the request or continue to wait.
- b. Issued.
- c. Denied.
| 6. | If the status is approved, select Install This Certificate. |
Request a Certificate Using a PKCS #7 or PKCS #10 File If the CA is offline or is online but unreachable from the client, a certificate request may be saved in a file. To complete the request and obtain the certificate, you must take the request and access the CA either from its console or from a computer that can reach it online. To do so, follow these steps:
1. | Enter the CA's address in Internet Explorer: http://servername/certsrv. | 2. | Click Request a Certificate, and then click Advanced Certificate Request. | 3. | Check Submit a certificate request using a base-64-encoded CMC or PKCS #10 file, or submit a renewal request by using a base-64-encoded PKCS #7 file, as shown in Figure 12-21. [View full size image] | 4. | Click Browse For A File To Insert. | 5. | Browse for the file. When you locate it, click Open. | 6. | On the web page, click Read! to paste the contents of the file into the scroll box. | 7. | If necessary, select the template for the certificate type required. The subordinate CA certificate is the default template type. | 8. | Add additional information into the Additional Attributes section as necessary. | 9. | Click Submit. | 10. | If approval is required, you have to check the pending request later. | 11. | If approval is automatic, download the certificate chain to a removable disk. | 12. | Use the certificate import function to import the certificate into the certificate store. |
Command-Line Options for Requesting Certificates The certreq command can be used to request a certificate. This tool is part of the support tools available on the Windows Server 2003 installation CD-ROM. To use the tool, use the syntax as described at http://www.microsoft.com/resources/documentation/WindowsServ/2003/standard/proddocs/en-us/Default.asp?url=/resources/documentation/windowsserv/2003/standard/proddocs/en-us/sag_cs_certreq2.asp.For example, request a certificate from the regalinn CA installed on the server regalinn by using this command: Certreq config regalinn\regalinn
Then, enter the name of the certificate request file you have prepared.Certificate Distribution and Automatic EnrollmentReading about and requesting a single certificate makes the distribution part of the enrollment process seem effortless, as indeed it can be. When large numbers of users must individually request certificates, and when certificates must be manually requested for computers, however, the process is not so easily accomplished. Many users will have difficulty with the procedure, and the time that might be spent helping them or requesting certificates for them can be substantial. In addition, if an administrator must manually request every computer certificate, this too can become tedious.Automatic enrollment can be used to solve these problems. Windows 2000 can be configured to automatically enroll computers, but not to provide automatic enrollment for user certificates. Windows Server 2003 offers automatic enrollment for user and computer certificates. Autoenrollment can reduce the cost of implementing and managing PKI. Certificate renewal, superseding of certificates, and multiple signature requirement certificate requests can also be automatically enrolled. In some cases, the process may require some user intervention and may provide user notification. For example, when smart card certificates are required, the user will be prompted to insert a smart card. Examples of the types of certificates that can be automatically enrolled include the following:Smart card logonEFSSecure Sockets Layer (SSL)Secure/Multipurpose Internet Mail Extension (S/MIME)UserComputer Certificate autoenrollment is based on Group Policy settings and the use of V2 certificates. V2 certificates can use autoenrollment or can require a request. Autoenrollment is only possible if the requestor is registered and authenticated as a user or computer in Active Directory. In addition, the following operating systemspecific requirements must be met:Windows Server 2003 schema and Group Policy updatesWindows Server 2000 Service Pack 3 or later domain controllersWindows XP or Windows Server 2003 clientsWindows Server 2003 Enterprise Edition or Datacenter Edition Enterprise CA TIP: V2 Certificate Client EnrollmentOnly Windows XP and Windows Server 2003 computers can participate in the V2 certificate client enrollment process, and only a Windows Server 2003 Enterprise Edition or Datacenter Edition CA can develop the V2 certificate templates.NOTE: Auto DownloadAuto download of CA certificates and CTL can also be provided by the autoenrollment service.The NTAuth store is created during the setup of Enterprise CA. The store designates CAs that can issue certificates for use in smart card logon and use the enroll on behalf of right. It can be added to using the DSSTORE command in Windows 2000 and the certutil command for Windows XP and Windows Server 2003.Group Policy is used to manage autoenrollment. The user configuration container is used for user certificates, and the computer configuration container for computer certificates. Once configured, autoenrollment is triggered by logon, at boot for computers, and at logon for users. Policy is refreshed every eight hours, and this timeframe can be configured in Group Policy. Once configured, the autoenrollment process proceeds as follows:
1. | Autoenrollment is triggered by winlogon or by Group Policy refresh. | 2. | The client OS requests any components necessary from Active Directory, such as the root CA certificate, the CTL, cross-certification certificates, NTAuth container, or certificate temples. | 3. | The list of certificate templates is cached in the registry. | 4. | If the user certificate attribute is set, expired certificates (present in the AD) are removed if a new certificate for the same purpose is present. | 5. | If the user certificate attribute is set, revoked and superceded (obsoleted) certificates (present in the AD) are removed automatically. | 6. | The list of templates is processed, looking for the Autoenroll and Read ACEs set for the current user or computer on the certificate. | 7. | The user's personal store is reviewed, looking for expired certificates, revoked certificates, or certificates without private keys. If any are found, they are added to the request list. | 8. | If a valid certificate is found in the certificate store, the certificate name is removed from the list. | 9. | If required and configured, the Active Directory will be searched for valid copies of the user certificates on the request list. | 10. | Pending requests can be retrieved, if approved, from the CA. | 11. | Template supercede requests are evaluated and, if found, are added to the request list. | 12. | The AD is searched for a CA that can supply the certificates requested. (Only Windows Server 2003 Enterprise Edition or DataCenter Edition CAs may issue V2 certificates.) | 13. | A security context for authentication is provided through the Distributed Component Object Model (DCOM). The CA enforces certificate profile and enrollment security as identified in the certificate. | 14. | A certificates revocation check for the issuing CA's entire certificate chain is done to ensure that the certificates have not been revoked. If revoked, the CA will not be used. Revocation will not occur if the CDP for the CRL is not in the certificate or if the certificate revocation status is offline. | 15. | If certificates are issued, they are stored in the user or computer personal store. | 16. | If certificates are pending, the request is stored in the Request store. | 17. | If user action is required, the UI balloon appears to notify the user. |
TIP: Certificate Requests via Terminal ServerMany certificate requests, including autoenrollment requests, can be made through a Windows Server 2003 terminal server if the Windows Remote Display Protocol (RDP) 5.1 client is used. Enrollment agent requests cannot be made through a terminal server session.Certificate Renewal A certificate renewal request can be made from the web enrollment pages, or it can be configured to occur automatically by configuring a V2 certificate template. The information on the current certificate creates the renewal certificate. New keys can be generated or the existing keys can be renewed. Automatic certificate renewal can occur when the autoenrollment process is triggered and when the certificate has reached 80 percent of its lifetime, or by the certificate renewal period set on the certificate. (The default is six weeks, but it can be changed.) Revoked certificates cannot be automatically renewed. A new manual request is required after a certificate is revoked.Enrollment can be forced for all V2 autoenrollment certificates by updating the version number of the certificates. The version number is checked during the autoenrollment process, and if the number has changed, the certificate is added to the request list. To force autoenrollment, follow these steps:
1. | Add the Certificates Templates snap-in to an MMC or open a Certificates Template console saved previously. | 2. | Right-click the template. | 3. | Choose Reenroll All Certificate Holders. It may take 10 minutes or more before a template is updated. |
Superceding CertificatesNew certificate templates or revised templates can be specified to supercede existing templates. This allows V2 certificates to supercede existing ones. For example, to take advantage of key archival for EFS certificates, a new V2 template can be created and configured to supercede the existing EFS certificates. Likewise, to use autoenrollment to renew certificates, create a V2 certificate template and set it to supercede the existing certificate. A new certificate will be issued. This illustrates using superceding to move users from V1 to V2 certificates; other uses of superceding include the following:Changing certificate lifetimeChanging key sizeAdding extended key use of application policyCorrecting enrollment policy errors The Supercede attribute is set in the certificate template on the Superceded page. Clicking the Add button displays a list of certificates to select from. Figure 12-22 shows that the new V2 template for EFS will supercede the EFS certificate.Figure 12-22. A superceded certificate will be replaced by a new template if the new template is configured to do so.
 Certificate and Key Recovery and Archival Certificates can be exported to a file with or without the associated private key. This method is often used to enable the use of a certificate and private key on another computer or as a form of backup. If the certificate and private key are exported, the file can be used to recover the certificate and private key. Additional methods for recovery exist.Chapter 13.Exporting Certificate and Private Key Exporting a certificate and private key provides a simple backup solution. This is especially critical for certificates where creating a new key pair would remove the user's ability, for example, in the case of EFS certificates where key archival is not used. Exporting keys can also create a security issue. If users export certificate and key to a floppy disk, protect it with a weak password, and leave the disk easily available, it is subject to theft and might be used to attack the system and, in the case of EFS, to decrypt sensitive files. Whether users should be allowed to export keys should be a management decision and should be part of your organization's security policy.The ability to export keys can be technically constrained by selecting an attribute on the certificate. To export a certificate, follow these steps:
1. | Open the Certificates console. | 2. | Right-click the certificate that you want to export. | 3. | Select All Tasks, and then select Export. | 4. | Click Next on the welcome page. | 5. | Select Yes, Export The Private Key, select No, Do Not Export The Private Key. | 6. | Click Next. | 7. | Select the format from those shown in Figure 12-23, and then click Next. If a format cannot be used, it will be grayed out. Formats and reasons why they might be used are listed in Table 12-4.Figure 12-23. Select a file format.
 Table 12-4. Certificate Format Uses Functionality Required | Choose |
---|
Platform independence. Interoperability Application requires DER encoding. | DER encoded binary X.509 (.CER) | S/MIME. | BASE-64-encoded X.509 (.CER) | Need for countersignatures associated with signatures, use of signing time and authentication of signing time and message content. Preserves the chain of certificate authorities. | Cryptographic Message Syntax StandardPKCS #7 Certificates (.P&B) | Include all certificates in the path. | Cryptographic Message Syntax StandardPKCS #7 Certificates (.P&B) orPersonal Information ExchangePKCS #12 (.PFX)and (in both cases)Select Include all certificates in the certification path if possible. | EFS export. Export of the private key. | Personal Information ExchangePKCS #12 (.PFX) | Enable strong protection. | Personal Information ExchangePKCS #12 (.PFX) and check the box Enable strong protection (Requires IE 5.0, NT 4.0 SP 4, or above.) | Delete the private key if the export is successful. | Personal Information ExchangePKCS #12 (.PFX) and check the box Delete the private key if the export is successful. |
| 8. | Enter a file path and name or browse to a location and enter a file name. | 9. | Click Next, and then click Finish to export the certificate or certificate and private key. | 10. | Click OK. |
Certificate Chaining and Certificate RevocationCertificate chaining is the process of completing the path from the end-use certificate back to the root of its trust and includes the validation of each certificate in the chain. The process is carried out by a chaining engine (a process running on the local computer) and includes the following steps:
1. | Creating the request list:- a. The chaining engine looks in memory and in the certificate cache for recently cached certificates. The location of the cache is the Documents and Settings\username\Local Settings\Temporary Internet Files folder.
- b. The chaining engine examines the certificate stores (trusted root certification authorities, Enterprise Trust, Intermediate Certification Authorities, Third-Party Root Certification Authorities, personal) on the current computer. The engine can be configured to check other stores, such as restricted root, restricted trust, restricted other, and additional stores. Additional stores are stores created by applications. More than one chain can be built when certificates are renewed or if complex cross-certification exists. For example, in a CA hierarchy with one CA, the certificate chain will be two certificates deep: the end certificate and the CA certificate. In Figure 12-24, this type of chain is displayed. Certification paths for actual certificates are displayed in the Certification Path page of a certificate, as shown in Figure 12-25. Figure 12-26 displays the details of the certificate itself. By viewing the Certification Path page and selecting the CA certificate in the path, then clicking View Certificate, you can view the CA certificate, as shown in Figure 12-27, which displays the certificate of the CA. Note how the issuer information in Figure 12-26 matches the subject information of the CA certificate in Figure 12-27. This is the information used to build the certificate chain. If the CA certificate has been renewed, it is possible that two chains will exist, each one using the different CA certificate.
Figure 12-24. A simple certificate chain.

 Figure 12-26. The issue information on this certificate will match the subject information on the issuer certificate.
 Figure 12-27. The issue information in the certificate in Figure 12-26 will match the subject information on this issuer certificate.

| 2. | Assign Certificate status. Each certificate is assigned a status code based on characteristics such as time valid, revoked, expired, etc. The status is determined during the following processes:- a. Revocation checking is performed during chain building in Windows 2000 after the chain is built and, in Windows XP, while it is being built. Windows uses a CRL list as the default mechanism for revocation checking. If the certificate is on the list specified by the certificate, the certificate is noted as revoked. (The CA that signed the certificate must sign the CRL in order for the CRL to be used by the chaining engine.)
- b. Third-party revocation provided can be registered with CryptoAPI and hence perform other methods of revocation checking, such as OCSP.
- c. Path Validation. For each chain, path validation is the process of finding a valid path from the presented certificate to its root CA. First, the issuing CA is determined, and then the CA that issued the CA a certificate, and so on until a self-signed certificate is reached, the root CA certificate. A valid certification path is a leaf, or end-use certificate that chains to a trusted root CA. A certificate can be determined to not be trusted because it is time invalid, does not conform to the x.509 V13 standard, information in the certificate is invalid or incomplete, the digital thumbprint and signature fail an integrity check (the certificate has been tampered with or is corrupt), the root CA is not in the Trusted Root Certification Authorities Store, the certificate is not valid for the intended use as identified in a CTL, or the certificate includes a critical extension not understood by the application.NOTE: Path ValidationDuring path validation, it is assumed that the application is responsible for validating and understanding an extension and the certificate is not rejected as long as the application does so. However, a CRL will be evaluated for critical extensions and will be rejected by Crypto API if the extension is not recognized.
- d. AKI checking. If the certificate has the Authority Key Identifier (AKI) field defined with the issuer's name and serial number, only certificates that match this information will be identified.
- e. Constraint validation. Possible constraints are checked. Basic constraints serve to identify the certificate as an end-use certificate or a CA certificate and can also limit the path length that is valid. For example, a path length of 0 means the CA can issue only end-use certificates. Name constraints identify namespaces that are permitted to be trusted for example, a name constraint permitting the tailspintoys.com name space would validate certificates from tailspintoys.com CA but not those provided by a newyork.tailspingtoys.com CA. Policy constraints allow specification of when and where a certificate may be issued. Policies are implemented using OIDs. A certificate without the proper OID would not be considered valid, for example. Application constraints also use OIDs but identify whether the certificate can be used for a specific function in an application. For example, spending levels in accounts payable might be technically constrained using an application constraint. Different OIDs would identify spending limits. If a clerk attempted to purchase something over her spending level, the certificate would be rejected.NOTE: Windows 2000 Doesn't Check All ConstraintsWindows Server 2003 and Windows XP check all constraints. Windows 2000 only checks Basic constraints.
| 3. | Each chain is assigned a status based on the status of the certificates in the chain. | 4. | The chains are ordered based on their status. | 5. | The chains are evaluated to determine if a valid path is found. If it is, the certificate can be accepted. If it is not, the certificate is rejected. |
One place that the certificate chaining engine looks for certificates is the certificate stores. How are the certificate stores populated?Certificates defined in Group Policy are added when the computer joins the domain and are refreshed every 8 hours. The root CA certificates from the Computer Configuration\Windows Settings, Security Settings\Public Key Policies, Trusted Root Certification Authorities Policy, and any other certificate in Group Policy are downloaded.NTAuth store certificates are added to the local machine store, and the NTAuth store is rechecked every 8 hours for new certificates.If the personal certificate store contains a certificate not issued by these CAs, then the root CA certificate from that chain will be downloaded from the AIA extension of the certificate if the certificate is not revoked or expired.Certificates referenced by cross-certificates are downloaded every 8 hours.If the Update Root Certificates component is added, then updated root certificates are added periodically as well.During certificate enrollment and certificate validation, all subordinate and root CA certificates are downloaded to the computer or user personal store. |
Cross-Certification and Qualified Subordination Qualified Subordination is a characteristic of Windows Server 2003 CAs that allows cross-certification of CA certificates and provides precise control of certificate trusts. Cross-certification is the process of creating a certificate trust between two CA hierarchies. Certificate trusts are created when cross-certification certificates from two different CA hierarchies are traded. If a certificate trust is created, certificates from either CA hierarchy can be trusted if the root CA certificate of one hierarchy is available.For example, if two companies want to share documents between researchers at both companies, they must implement some form of authentication to make sure only the right individuals can access the documents. If each company has implemented PKI using their own in-house root CA, certificates from each may be presented as part of the authentication process. Because neither company has a copy of the root A certificate of the other, how can trust be established? It's always possible to provide a copy of the root CA certificate from each company to the other, and then import that certificate into the certificate stores of any computer in the extra net. This may be unwieldy if many computers must import the CA certificate and if Group Policy cannot be used. If each CA hierarchy provides a cross-certification certificate to the other, holders of either root CA certificate will trust certificates from either CA hierarchy.In addition to providing basic trust, the trust can be constrained by rules established when the certificates are created. For example, certificates from a specific CA can be excluded from the trust, or specific certificate purposes can be trusted or not trusted. If, for example, IPSec certificate purpose was excluded from the trust, a computer certificate that can be used for domain authentication and for IPSec will be restricted and will only be useful for domain authentication.Two typical places for installing the cross-certification certificate are with the root CA, as shown in Figure 12-28, and with a subordinate CA, as shown in Figure 12-29. When cross-certification is created at the root, and the certificate trust is not restricted by qualified subordination, every certificate issued by one CA is trusted by the other. On the other hand, if the trust is created at a subordinate CA level and is not restricted, only the certificates issued from the subordinate CA or its children are trusted by the other CA. In Figure 12-29, the CAs trusted by Regalinn are circled in the Motorinn Hierarchy.Figure 12-28. Cross-certification at the root extends trust throughout the hierarchy.
 Figure 12-29. Trust at the subordinate CA level extends trust from the subordinate CA and below.
Cross-certification only creates a trust relationship between two CA hierarchies. This trust is not transitive. That is, if CA hierarchy A and CA hierarchy B are cross-certified, and CA hierarchy B and CA hierarchy C are cross-certified, there is no trust relationship between CA hierarchy A and CA hierarchy C. You can create that trust relationship by cross-certifying A and C. If many CA hierarchies are involved, this can become difficult to manage. Sometimes, something more is needed. When multiple trust relationships between multiple CA hierarchies are required, a bridge CA can be used.Bridge CA A bridge CA provides an easy way of creating trust relationships between multiple CA hierarchies. In this scenario, a CA serves as the managing hub or bridge for the trust relationships, as illustrated in Figure 12-30. All that is necessary is for each CA hierarchy to cross-certify with the bridge CA. This type of trust is not meant to combine multiple unrelated organizations with each other. However, it is extremely useful for large organizations composed of independent entities, such as a decentralized governmental organization.
 |