August 2019
Intermediate to advanced
786 pages
20h 22m
English
Digital certificates are used more and more in modern infrastructure as additional layers of security to prove that objects and services are genuine. In this chapter, you learned what a PKI is and how exactly it works. Then, we looked into AD CS components and their roles. After that, we moved into the planning of a PKI and discussed what needs to be considered when building a PKI. Then, we further looked into PKI deployment models and evaluated their advantages and disadvantages. Last but not least, we went through a step-by-step guide to setting up a two-tier PKI.
In the next chapter, you are going to learn about another AD role service—AD Federation Service—and see how identities are handled in a federated environment.