NOTE
There are three versions of X.509:
X.509 version 1
X.509 version 2
X.509 version 3
You do not need to understand the intricate differences among these three versions to become a capable administrator.
7. Using Certificate-Monitoring Tools
For the certification exam, you
need to be familiar with two important and useful
certificate-monitoring tools that come with Windows Server 2008:
- pkiview.msc
The pkiview.msc
command launches the PKI Health tool, which allows you to monitor the
activity and health of your currently existing public key
infrastructure. Additionally, it monitors Authority Information Access
(AIA) and CRL distribution (CDP) extensions to ensure that the line of
communication for the distribution of authority for certificates is
properly monitored.
- certutil.exe
The certification utility (certutil.exe) command allows you to determine the validity of issued certificates through the use of two switches:
-verify -urlfetch
-viewstore
Using the –verify –urlfetch FileName
switch allows you to see the output of the URL for each certificate. If
it succeeds, it will display a "verified" output. If it fails, it will
display an "error" output.
The –viewstore output
allows you to see the contents of a specific Active Directory Domain
Services store or object, which lets you choose to view all certificates
in that store.
8. Reasons for a PKI
Whenever an organization
uses technologies such as smart cards, IPsec, SSL, digital signatures,
EFS, or other technologies that rely upon levels of encryption, the
organization needs to create a public system of encryption and
identification. But the most common reason for using a system of
certificates is Secure Sockets Layer (SSL), which verifies a user's
identity and securely transmits data. Without a system of certificates,
this would be almost impossible.
Therefore, in most companies,
because of the need for the Web, there have been numerous examples of
simple PKIs just to support a website on IIS. Without a PKI and
certificates, you can't even use HTTPS!
9. Components of the Public Key Infrastructure
The PKI (the technology that
your infrastructure uses to validate the identity of user or entities)
is composed of many different components, but at the MCITP level you are
primarily concerned with the following:
Certificates
Certificate authorities (CAs)
Certificate revocation lists (CRLs)
Certificate templates
The Online Certificate Status Protocol
Some of the material you
may read here will seem like review—and some of it may be. But remember,
on the Enterprise Administrator certification exam the strongest
concentration of material is not necessarily on any one new technology
but on a mix of all technologies available to you within a modern
infrastructure and your ability to apply those technologies in complex
situations.
9.1. Certificate Authority
A certificate authority
is part of the PKI that is responsible for validating certificates,
issuing certificates, and revoking certificates. At a minimum, an
enterprise using Active Directory Certificate Services (AD CS) must have
at least one CA that issues and revokes certificates. Normally, there's more than one CA deployed in an
organization. Additionally, CAs can be either internal or external and
can exist at several different levels, acting as a root CA or an
issuance-only CA, for example.
9.2. Certificate Revocation Lists
When certificates are revoked before their period of expiration, they are added into a list called a certificate revocation list. Within Windows Server 2008, there are two types of CRLs: base CRLs and delta CRLs.
Base CRLs are complete lists of certificates revoked by a CA; this list also contains the reason for their revocation. A delta CRL,
on the other hand, contains only the serial numbers and revocation
reasons for a revoked certificate that has been revoked since the
original incarnation of the base CRL. It's sort of like a differential
backup, because it lists only what has changed since the original list
was added.
9.3. Certificate Templates
Certificate templates
are categories of certificates that allow AD CS to store certificates
within Active Directory and categorize them according to how they are
used and what they contain. They are still relatively new and can be
used with either Windows Server 2003 or Windows Server 2008. In effect,
what a certificate template does is issue a set of rules that can be
applied to certificates, such as where certificates can come from and
how they can be created.
7.10. Certificate Authority Roles
Within the enterprise, the
PKI is usually comprised of multiple certificate authorities, each of
which contains one of several roles. These range from the most
fundamental of all roles—the root CA role—to a simple CA issuing
certificates, all of which fit somewhere within the CA hierarchy.
10.1. Root CA Role
The root
CA in an organization is the first installed and most important CA in
the entire infrastructure. Ultimately, the root CA contains the
authority to sign certificates as well as authorize other subordinate
CAs throughout the organization. And authorizing subordinate CAs is the
activity that most root CAs spend the majority of their time
undertaking.
Logically, what happens with a
root CA is that whenever a client or subordinate receives a certificate,
the client will validate that the certificate is trusted by the root
CA. Thus, because of this vital role, most root CAs are kept offline,
protected from the outside world and stored in a secure location for
fear of being compromised.
10.2. Intermediate CA Role
An intermediate
CA is any certificate authority that exists outside the role of the
root CA and issues certificates to other CAs somewhere in the CA
hierarchy. Normally, this intermediate CA exists in a state between the
root CA (which is offline) and the issuing CAs, which are online. This
way, issuing CAs have a method of contacting the root CA while
ultimately exposing the root CA's private key the minimum number of
times.
10.3. Policy CA Role
The policy
CA is technically a subcategory of intermediate CA, but it has a
special category in and of itself because of the vital part it plays
within a Windows Server 2008 infrastructure. Within that infrastructure,
a policy CA contains the policies and procedures an organization uses
to secure and validate both the CA and the certificate holder identity.
Normally, policy CAs communicate only with other CAs.
10.4. Issuing CAs
By far, the most common and
lowest-level certificate authority is the CA that is responsible for
actually distributing certificates to users and devices within the
infrastructure—the issuing CA.
Typically, the issuing CA receives policies from a higher-level policy
CA and responds to requests for certificates and other information.
However, an issuing CA is capable of holding its own policies and making
its own policy decisions in a smaller architecture, such as a one- or
two-tiered hierarchy .
10.5. Enterprise and Stand-Alone CAs
It's most likely that you have
encountered an explanation of enterprise and stand-alone CAs in your
previous study, but in case you have forgotten, an enterprise
CA is a CA that takes advantage of Active Directory to control the
enrollment process. Thus, because it involves the use of Active
Directory, it can logically be further controlled and refined through
the use of Group Policy.
Stand-alone CAs
do not take advantage of Active Directory and cannot be managed by
Group Policy. Furthermore, stand-alone CAs are limited to either
web-based or command-line deployment.
11. Using the Online Certificate Status Protocol
One of the drawbacks of using
certificates is that as the number of certificates grows, expires, or
ultimately become revoked, the number of revoked certificates in the CRL
becomes very large and cumbersome to send back and forth. Using the
Online Certificate Status Protocol (OCSP), administrators are able to
implement a system that, instead of sending the complete list of revoked
certificates, is able to respond to a request about a single
certificate within the organization. This greatly reduces the amount of
data traffic and optimizes the infrastructure for other tasks.
11.1. Online Responders
Any computer that is
currently running the Online Responder service can function in the
online responder role. The responsibility of the Online Responder
service is to communicate responses upon requests for OCSP responses,
along with the use of CRLs. Normally, in the enterprise architecture the
online responder is an individual machine that is responsible only for
the online responder role.
According to Microsoft, online responders can respond to requests much more quickly stances involving the following:
External clients connected via low-speed WAN connections
Overloaded networks
An organization with numerous certificates
An organization that does not want all expired certificate data to be exposed
In Windows Server 2008,
Microsoft encourages the use of the OCSP with its responder system over
the use of traditional CRLs to increase the network efficiency of your
infrastructure capabilities.
NOTE
Responses from online
responders are digitally signed and indicate the status of only the
certificate to which they have been requested to respond.
The online responder
server should be set up and running the Online Responder service before
any client certificates are issued. This server must be running Windows
Server 2008, but the data can come from a published CRL, which can exist
on either Windows Server 2008, Windows Server 2003, or even a
non-Microsoft CA.
However, in order to install the Online Responder service, the following prerequisites must be met:
IIS installed and operating
OCSP response signing certificate template must be configured on the CA with autoenrollment
URL placed in the AIA extension of certificates by the CA