Once the Certificate Authority has been created it is time to deploy those Certificates to the organization. Through the use of Group Policy with Active Directory, this is a fairly easy task, and can deploy the Certificates to the organization in only a few minutes.
Once the Root CA has been created, the Subordinate CA needed to be setup. This Subordinate CA is needed to do all of the work for the Certificate Authority. It will issue all Certificates to the organization and handle the day to day operations.
The first step in establishing a two-tier Certificate Authority is the creation of the Root Certificate. The Root Certificate is the most important part of the Certificate Trust, and it is critical that this is setup properly and securely from day one.
This is the start of an 8-part series on building a Certificate Authority using Active Directory Certificate Services in Windows Server 2019. The process is quite involved, but with this guide and planning on your part, you should be able to build this important Infrastructure component with ease.
It had a good run, but the time has finally run out on Windows XP and all of it’s variants. It was a great OS (eventually), but ultimately it has been succeeded by more modern Operating Systems and better practices.
Active Directory is an incredibly powerful tool that pretty much every business relies on for user authentication and management. That doesn’t mean that people set it up properly though, and Microsoft has provided a very good guide on how to avoid those mistakes.
One of the biggest and most welcome changes to the Windows 10 1809 update and in Windows Server 2019 was the addition of the OpenSSH Client and OpenSSH Server features. Certainly this was something that I never expected to happen.