Summary
Digital certificates are increasingly used in modern infrastructure as additional layers of security to prove that objects and services are genuine. In this chapter, you learned what a PKI is and how it works exactly. Then, we looked into AD CS components and their responsibilities.
After that, we moved into the planning of a PKI and discussed what needs to be considered when building it. Then, we looked into PKI deployment models and evaluated their pros and cons. Later, we went through a step-by-step guide to setting up a two-tier PKI. Windows Server 2008 is out of support now and it is important to know how we can migrate the CA configuration from Windows Server 2008 to Windows Server 2022. This scenario has also been covered in this chapter. Last but not least, we learned how to recover the CA from a disaster.
In the next chapter, you are going to learn about another AD role service—AD Federation Service—and see how identities are handled in a federated...