Book description
Get in-depth guidance for designing and implementing certificate-based security solutions—straight from PKI expert Brian Komar. No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Windows Server 2008! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication, VPNs, secure email, Web SSL, EFS, and code-signing applications using Windows Server PKI and certificate services. A principal PKI consultant to Microsoft, Brian shows you how to incorporate best practices, avoid common design and implementation mistakes, help minimize risk, and optimize security administration.
Table of contents
- Windows Server® 2008 PKI and Certificate Security
- Acknowledgments
- Foreword
- Introduction
-
I. Foundations of PKI
- 1. Cryptography Basics
- 2. Primer to PKI
-
3. Policies and PKI
- Security Policy
- Certificate Policy
-
Certification Practice Statement (CPS)
- CPS Section: Introduction
- CPS Section: Publication and Repository Responsibilities
- CPS Section: Identification and Authentication
- CPS Section: Certificate Life-Cycle Operational Requirements
- CPS Section: Facility, Management, and Operational Controls
- CPS Section: Technical Security Controls
- CPS Section: Certificate, CRL, and OCSP Profiles
- CPS Section: Compliance Audit and Other Assessment
- CPS Section: Other Business and Legal Matters
- Case Study: Planning Policy Documents
- Additional Information
-
II. Establishing a PKI
-
4. Preparing an Active Directory Environment
- Analyzing the Active Directory Environment
- Upgrading the Schema
- Deploying Windows Server 2008 Enterprise CAs in Non–AD DS Environments
- Case Study: Preparing Active Directory Domain Services
- Additional Information
-
5. Designing a Certification Authority Hierarchy
- Determining the Number of Tiers in a CA Hierarchy
- Organizing Issuing CAs
- Choosing an Architecture
- Gathering Required Information
- Collecting AD DS Requirements
- Case Study: Identifying Requirements
- Additional Information
-
6. Implementing a CA Hierarchy
- CA Configuration Files
- Implementing a Three-Tier CA Hierarchy
- Implementing an Enterprise Root CA
- Enabling Auditing
- Verifying Installation
- Case Study: Deploying a PKI
- Additional Information
- 7. Upgrading Your Existing Microsoft PKI
-
8. Verifying and Monitoring Your Microsoft PKI
- Verifying the Installation
-
Ongoing Monitoring
- CAMonitor.vbs Script
- Microsoft Operations Manager Certificate Services Management Pack
- Case Study: Verifying a PKI Deployment
- Additional Information
- 9. Securing a CA Hierarchy
-
10. Certificate Revocation
- When Do You Revoke Certificates?
- Methods of Identifying Revoked Certificates
- Problems with CRLs
-
Online Certificate Status Protocol (OCSP)
- Microsoft’s Implementation of OCSP
- Implementing the Microsoft Online Responder
- Providing High Availability for the Online Responder
- Case Study: Planning Revocation
- Additional Information
- 11. Certificate Validation
- 12. Designing Certificate Templates
-
13. Role Separation
- Common Criteria Roles
- Other PKI Management Roles
- Case Study: Planning PKI Management Roles
- Additional Information
-
14. Planning and Implementing Disaster Recovery
- Developing Required Documentation
- Choosing a Backup Method
- Performing a System State Backup
- Performing Windows Server Backups
- Performing Manual Backups
- Restoration Procedures
- Evaluating Backup Methods
-
Availability Options
- CRL Re-Signing
- HSM Fail Over
-
Clustering Certificate Services
- CA Clustering Guidelines
- Preparing the CA Cluster Environment
- Installing the First Node of the CA Cluster
- Installing the Second Node of the CA Cluster
-
Configuring the CA Cluster
- Installing Failover Clustering
- Validating a Failover Cluster Configuration
- Creating a Failover Cluster
- Configuring the Failover Cluster
- Modifying the CRL Distribution Point for the Cluster
- Creating CRL Objects for the Cluster
- Modifying the CA Configuration in Active Directory (AD DS)
- Modifying the DNS Name for the Cluster in Active Directory Domain Services (AD DS)
- Testing CA Cluster Failover
- Case Study: Replacing Server Hardware
- Additional Information
-
15. Issuing Certificates
- Certificate Enrollment Methods
- Choosing an Enrollment Method
- Publishing Certificate Templates for Enrollment
- Performing Manual Enrollment
- Performing Automatic Enrollment
- Credential Roaming
- Case Study: Selecting a Deployment Method
- Additional Information
-
16. Creating Trust Between Organizations
- Methods of Creating Trust
- Implementing Cross Certification with Constraints
- Verifying Cross Certification Constraints
- Case Study: Trusting Certificates from Another Forest
- Additional Information
-
4. Preparing an Active Directory Environment
-
III. Deploying Application-Specific Solutions
-
17. Identity Lifecycle Manager 2007 Certificate Management
- Key Concepts
- Planning an ILM 2007 Certificate Management Deployment
- Deploying ILM 2007 Certificate Management
- Deploying a Code Signing Certificate
- Case Study: Contoso, Ltd.
- Best Practices
- Additional Information
-
18. Archiving Encryption Keys
- Roles in Key Archival
- The Key Archival Process
- The Key Recovery Process
- Requirements for Key Archival
- Performing Key Recovery
- Case Study: Lucerne Publishing
- Best Practices
- Additional Information
-
19. Implementing SSL Encryption for Web Servers
- How SSL Works
- Certificate Requirements for SSL
- Choosing a Web Server Certificate Provider
- Placement of Web Server Certificates
- Choosing a Certificate Template
-
Issuing Web Server Certificates
- Issuing Web Server Certificates to Domain Members
- Issuing Web Server Certificates to Non-Forest Members
- Issuing Web Server Certificates to Third-Party Web Servers and Web Acceleration Devices
- Certificate-Based Authentication
- Performing Certificate-Based Authentication
- Case Study: The Phone Company
- Best Practices
- Additional Information
- 20. Encrypting File System
-
21. Deploying Smart Cards
- Using Smart Cards in an Active Directory Environment
- Planning Smart Card Deployment
- Managing Issued Smart Cards
- Case Study: City Power and Light
- Best Practices
- Additional Information
- 22. Secure E-Mail
- 23. Virtual Private Networking
-
24. Wireless Networking
- Threats Introduced by Wireless Networking
- Protecting Wireless Communications
- 802.1x Authentication Types
- Planning Certificate for 802.1x Authentication
- Deploying Certificates to Users and Computers
- Implementing 802.1x Authentication
- Case Study: Margie’s Travel
- Best Practices
- Additional Information
- 25. Document and Code Signing
- 26. Deploying Certificates to Domain Controllers
- 27. Network Device Enrollment Service
-
A. Case Study Questions and Answers
- Chapter 1: Cryptography Basics
- Chapter 2: Primer to PKI
- Chapter 3: Policies and PKI
- Chapter 4: Preparing an Active Directory Environment
- Chapter 5: Designing a Certification Authority Hierarchy
- Chapter 6: Implementing a CA Hierarchy
- Chapter 7: Upgrading Your Existing Microsoft PKI
- Chapter 8: Verifying and Monitoring Your Microsoft PKI
- CA Hierarchy Verification Questions
- Monitoring Questions
- Chapter 9: Securing a CA Hierarchy
- Chapter 10: Certificate Revocation
- Chapter 11: Certificate Validation
- Troubleshooting Exercise
- Chapter 12: Designing Certificate Templates
- Chapter 13: Role Separation
- Chapter 14: Planning and Implementing Disaster Recovery
- Chapter 15: Issuing Certificates
- Chapter 16: Creating Trust Between Organizations
- Chapter 17: Identity Lifecycle Manager 2007 Certificate Management
- Chapter 18: Archiving Encryption Keys
- Chapter 19: Implementing SSL Encryption for Web Servers
- Chapter 20: Encrypting File System
- Chapter 21: Deploying Smart Cards
- Chapter 22: Secure E-Mail
- Chapter 23: Virtual Private Networking
- Chapter 24: Wireless Networking
- Chapter 25: Document and Code Signing
- Chapter 26: Deploying Certificates to Domain Controllers
- Chapter 27: Network Device Enrollment Service
-
17. Identity Lifecycle Manager 2007 Certificate Management
- B. About the Author
- Index
- About the Author
- Copyright
Product information
- Title: Windows Server® 2008 PKI and Certificate Security
- Author(s):
- Release date: April 2008
- Publisher(s): Microsoft Press
- ISBN: 9780735625167
You might also like
book
Windows Server 2016 Security, Certificates, and Remote Access Cookbook
This book contains more than 25 hands-on recipes that will equip you to build a PKI …
book
Windows Security Monitoring
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring …
book
Pro Active Directory Certificate Services: Creating and Managing Digital Certificates for Use in Microsoft Networks
In order to deploy and use Microsoft Certificate Services, you need to understand the fundamentals of …
book
Mastering VMware vSphere 6.7 - Second Edition
Unleash the benefits of VMware vSphere 6.7 to provide a powerful, flexible and secure digital infrastructure …