O'Reilly logo

Windows Server® 2008 PKI and Certificate Security by Brian Komar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Issuing Certificates

Having created the required certificate templates, the next step is to determine how to get the certificates to the desired computers, users, or network devices.

A certificate request involves actions performed at the computer where the certificate request is generated and at the certification authority (CA) that issues the certificate to the requestor.

When a certificate request is initiated, the process shown in Figure 15-1 takes place.

The certificate enrollment process

Figure 15-1. The certificate enrollment process

  1. When the user generates a request for a certificate, the client computer asks the cryptographic service provider (CSP) designated by ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required