Best Practices

The following best practices should be followed when security Active Directory Certificate Services:

  • Increase the security of root CA computers You can do this by deploying off-line CAs and, if possible, by deploying off-line policy CAs, depending on your company's security policy.

  • Implement a hardware security module You should do this only if your company's security policy or organizations that you want to exchange certificates with require strong protection of CA key pairs.

  • Ensure that CRLs and CA certificates are published to accessible locations The certificate-chaining engine must have access to all CRLs and CA certificates in the certificate chain to validate a presented certificate. If any certificate or CRL is unavailable, ...

Get Windows Server® 2008 Security Resource Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.