Thanks a lot everyone.  Sorry if the questions are basic, but as I said I've 
never messed with PKI, and there's no documentation on what we have right now.  
I am actually not sure where the CRL is, looking for that now, but the idea of 
just moving one of our issuing servers to the DR site sounds very appealing.  
We're mainly using this for user certs for VPN access, and we have about 2500 
clients, so doing it that way may be enough.  And if I can take our root CA 
offline and just store it on a SAN volume mirrored between our primary and DR 
sites that may be enough.  OK, got some reading to do.
Thanks again.
Ryan

From: [email protected] [mailto:[email protected]] On 
Behalf Of Eric Morrison
Sent: Tuesday, November 11, 2014 7:00 PM
To: [email protected]
Subject: RE: [NTSysADM] RE: making ADCS resilient

There's really no reason to have two subordinate issuing servers unless you're 
getting tons of cert renewals, or your CRL is on those servers.

Root should always, ALWAYS, be offline and never connected to the network. Only 
time to bring it online is to renew the CRL, or to issue a new cert to your Sub 
CA. You could take one of the Sub CAs and move them to your DR site, assuming 
they're portable VMs or something like that. I would also recommend publishing 
your CRL on an internal web server, or two. Using common names, not server 
names, to publish the CRL URL with. Something like PKI1.domain.com and 
PKI2.domain.com. This will give you a lot of flexibility going forward.

Really, the resiliency focus should be on the CRL and making sure it's 
available for your systems to check at all times.

Hopefully this helps! We just rebuilt our PKI infrastructure with a PFE and 
tried to go best practice and make it as practical as possible and low 
maintenance as possible since we have a small team managing everything.

Thanks!

Eric Morrison

From: [email protected] [mailto:[email protected]] On 
Behalf Of Ryan Shugart
Sent: Tuesday, November 11, 2014 5:49 PM
To: [email protected]; [email protected]
Subject: [NTSysADM] RE: making ADCS resilient

Thanks everyone.  So if I'm understanding right, the root CA can be shut down 
with no issues, and I can just bring up new issuing servers in our DR site and 
they'll work along side the ones at our main site?
Thanks.
Ryan

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Michael B. Smith
Sent: Tuesday, November 11, 2014 11:55 AM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] RE: making ADCS resilient

I advise my clients to only have the root server online when they are bringing 
up new DCs or renewing certificates for the sub-authorities.

They also bring it up once a month to patch and then create a full-backup that 
goes over-the-wire to the DR site.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Ryan Shugart
Sent: Tuesday, November 11, 2014 1:35 PM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] making ADCS resilient

Hi all:
        I just got handed our ADCS infrastructure, and was told that it needs 
to be made resilient.  From what I can tell (the old admin left the company and 
didn't provide much documentation) we have a two teer infrastructure with one 
root CA and two issuing CAs all running Windows Server 2012.  From what I'm 
seeing now, I should be able to bring up another issuing server relatively 
easily in our DR site and we should be good there, but the root CA isn't that 
easy to make resilient, and may not need to be resilient anyway.  So question, 
is this what people are doing to make ADCS resilient across multiple sites or 
is there another approach to this?
Thanks.
Ryan

Ryan Shugart
LAN Administrator
MiTek USA, MiTek Denver
314-851-7414


MiTek Holdings, Inc., 2011-2014, All Rights Reserved
  ________________________________
This communication (including any attachments) contains information which is 
confidential and may also be privileged. It is for the exclusive use of the 
intended recipient(s). If you are not the intended recipient(s), please note 
that any distribution, copying, or use of this communication or the information 
in it is strictly prohibited. If you have received this communication in error, 
please notify the sender immediately and then destroy any copies of it.

Reply via email to