Summary Deploying a secure PKI is not difficult if you plan and practice the steps. Using a root offline CA is part of that strategy, but a number of steps are required in order to use it as the base for an Active Directory integrated CA hierarchy. In addition to basic installation and configuration techniques, customized templates can be used and their use can be secured.Securing PKI is necessary because it serves as the basis for trust within the organization. Even if passwords for user authentication are not slated for replacement by smart cards or other devices that require certificates, certificates are being increasingly used to support secure transactions. Many functions, such as VPNs, IP Security policies, secured web sites, and secure wireless networks are based on certificates. The following chapters describe how to use them in these circumstances. |