The certificate doesn't do anything about authentication from a DC standpoint necessarily.  The DC is still required for authentication of the user credentials as well as authorization services.  The certificate will allow your user to encrypt the conversation from the web client to the web server thereby adding a layer of protection to the conversation from prying eyes (or sniffers as the case may be).
 
Using your own certificate can be done, but often the overhead isn't worth it.  Allowing a third party to manage the cert is a lot easier in terms of management, reliability, hardware, etc.  The client will require access to the CA machine if only one machine is hosting all functions.  Add to that they will get a popup asking if they want to use this cert since it's not in the cache to date.  It's just not as clean from a user interface perspective, but workable if all else is worth it to you.
 
 
http://www.microsoft.com/technet/security/topics/crypto/cryptpki.mspx is a primer for Windows 2000 PKI that may help to explain some of the additional components.
 
AL


From: Celone, Mike [mailto:[EMAIL PROTECTED]
Sent: Tuesday, April 20, 2004 12:00 PM
To: '[EMAIL PROTECTED]'
Subject: [ActiveDir] Certificate Services

We are looking to add a certificate to one of our web servers so we can do an https session over it.  This will be for our users to access OWA over a secure connection.  Instead of purchasing a certificate from Verisign we would like to put up a CA server and use our own certificates.  Is this the common way of doing this?  Once the certificate is issued does the OWA server need to talk to the DC anymore?  I'm new to all the certificate stuff so any help is appreciated! 
 
Mike Celone
Systems Specialist
Radio Frequency Systems
v 203-630-3311 x1031
f 203-634-2027
m 203-537-2406
 

Reply via email to