June 2017
Beginner to intermediate
742 pages
18h 29m
English
The three-tier model is the highest in the model list, which operates with greater security, scalability, and control. Similar to a two-tier model, it also has an offline root CA and online issuing CAs. In addition to that, there will be offline intermediate CAs, which operates between the root and subordinate CAs. The main reason for it is to operate intermediate CAs as policy CAs. In larger organizations, different departments, different sites, and different operation units can have different certificate requirements. As an example, a certificate issued to a perimeter network will required manual approval process while others users in the corporate network prefer auto approval. IT teams prefer to have advanced cryptographic ...