123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

Examining A Simple, Best Practice Ca Hierarchy

Profile Picture
By Author: Henry Brown
Total Articles: 59
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

This example shows how the layers of CA hierarchies should be implemented and specifies two important practices: protecting the root CA and limiting the types of certificates that any CA can issue. It does not, however, provide the information that will help you accomplish that, nor does it inform you of typical CA hierarchy implementation types and when they should be used. Review the guidelines in this lesson to get the full picture.

Guidelines for Protecting the CA Hierarchy Infrastructure

The CA hierarchy computers require CompTIA Security+ above and beyond that of other servers in the network. The root CA requires special protection. The root CA is the seat of all trust in a PKI. This CA issues all other certificates used in the enterprise. If the root CA is compromised, all other certificate usage is suspect. The only method of recovery is to rip and replace—that is, to revoke all certificates produced by the CAs in the hierarchy, remove all CAs in the hierarchy, and start all over again. The root CA therefore requires a higher degree of protection than any device or free practice tests ...
... on the network. To protect the CA infrastructure, follow these guidelines:

Protect the root CA. To do this: a Establish at least a two-tier hierarchy composed of a IT certification and one or more issuing CAs. Figure 2-3 shows a simple two-layer CA hierarchy that can be used to provide protection for the root CA, and hence for the rest of the trust network. The connection between the two CAs illustrates their hierarchical connection; it does not represent a network connection.

This chapter shows you how to configure your Active Directory physical structure by configuring sites and replication. When you are faced with managing a geographically spread out Active Directory infrastructure, you'll need to understand replication. There are two types of replication: intersite and intrasite. Intrasite is the default replication type that occurs as soon as you place the second domain controller in a domain. Intersite replication occurs when you create sites. You use sites to control data replication between domain controllers. To implement a site topology, you'll need to know how to configure sites and intersite replication. To configure intersite replication, you must be familiar with site links and their attributes of cost, frequency, and scheduling. You must know why it's not always necessary to designate a preferred bridgehead server, site link bridges, or connection objects.

Total Views: 187Word Count: 404See All articles From Author

Add Comment

Education Articles

1. How Exercise Books Foster Organization And Creativity
Author: The School Print Company

2. Diy Vs. Professional: Choosing The Right Approach For Your School Logo
Author: The School Print Company

3. Top-rated Icse High School In Bhopal For Quality Education
Author: Ronit Sharma

4. Best B. Tech And Engineering College In Meerut And Up
Author: CONTENT EDITOR FOR SAMPHIRE IT SOLUTIONS PVT LTD

5. The Five Borough Academic: Cross-cultural Research In Nyc's Diverse Communities
Author: jonesmiller

6. The Future Of Advertising: How Cgi Is Replacing Traditional Commercials
Author: Rajat Sancheti

7. What Is Iso 27001 Procedures And Why Do They Matter?
Author: john

8. Devops Foundation Certification Course
Author: Simpliaxissolutions

9. The Best Gcp Devops Online Training Institute In Bangalore
Author: visualpath

10. Best Hotel Management College In Delhi
Author: harsh thapa

11. Servicenow Online Training | Servicenow Course In India
Author: krishna

12. Best Google Cloud Platform Ai Training In Hyderabad
Author: visualpath

13. Aws Data Engineering Online Training | Data Analytics
Author: naveen

14. Oracle Fusion Cloud Hcm | Oracle Fusion Hcm Training In Pune
Author: visualpath

15. Why Choose The Certified Big Data Foundation? Key Certification Objectives Explained
Author: gsdc

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: