welcome to 's blog...


公告

我的分类(专题)

日志更新

最新评论

留言板

链接

搜索


Blog信息




PKI DESIGN(TEMPLE)
aku1 发表于 2004-9-25 16:02:01

Selecting Certificate Templates

The certificate services that you deploy and the security requirements that are specific to your organization impact the types of certificates that you issue. You can issue multiple types of certificates to meet a variety of security requirements.

The certificate templates available with an enterprise CA in Windows Server 2000 and Windows Server 2003 provide the default contents of all certificates that can be requested from a Windows enterprise CA. These certificate templates are stored in Active Directory and cannot be used with stand-alone CAs.

Certificate templates can serve a single purpose or multiple purposes. Single-purpose templates generate certificates that can be used for a single application. For example, the Smart Card Logon certificate template is designed for smart card logon only. Multipurpose templates generate certificates that can be used for a number of applications, such as Secure Sockets Layer (SSL), S/MIME, and EFS. For example, a user certificate can be used for both user authentication and EFS encryption.

Both Windows 2000 and Windows Server 2003 support single-purpose and multipurpose templates. However, Windows 2000 and Windows Server 2003 Standard Edition only support version 1 templates, which have read-only attributes that cannot be customized or extended. Windows Server 2003, Enterprise Edition supports version 2 templates, which allow you to create new certificate templates, clone an existing template, and replace templates that are already in use.

Important

  • If you are already using version 1 templates, you can upgrade them to version 2 templates. However, the domain admins in your top level domain must have full access control permissions on the version 1 templates in order to complete this upgrade. Domain administrators do not need to have full access control over the templates after the upgrade has been completed.

Both version 1 and version 2 certificate templates include the following information:

  • Intended user of the certificate.
  • CA that issued the certificate.
  • Serial number that uniquely identifies each certificate.
  • Public key value for the user identified in the subject field.
  • Validity period of the certificate.
  • Extensions, if any, which apply to the certificate, including additional information that can define certificate purposes, restrictions, and management.
  • Digital signature of the CA, which verifies the relationship of the certificate to the issuing CA.

    Note

    • You can also create your own certificate templates.

Before the certificates are issued, you need to determine the following critical information:

  • Certificate key length
  • Certificate validity period
  • Optional certificate extensions

    Note

    • Certificate templates, in conjunction with the CA policy module, allow you to define certificate policy for CA certificates.

In addition, version 2 templates allow you to configure the following:

  • Customized enrollment policies
  • Policies related to validity periods
  • Policies related to application usage
  • Policies related to key usage
  • Policies related to key archiving
  • Certificate authorization
  • Domain authentication
  • Certificate administrators
  • Signed enrollment agents
  • Key creation
  • Key and CSP types
  • Certificate contents

Important

  • You must upgrade the schema in an Active Directory forest to Windows Server 2003 in order to support version 2 templates. You do not need to upgrade all domain controllers to Windows Server 2003 to perform a schema upgrade.

Certificate templates can only be used when the server that is running Certificate Services is an enterprise CA. Enterprise CAs can issue a variety of certificate types based on the templates. You can configure each enterprise CA to issue only specific types of certificates. Table 16.6 lists the different types of version 1 certificate templates that are available, and the purposes for each.

Table 16.6   Version 1 Certificate Templates

Certificate template name Certificate purposes Issued to
Administrator Code signing, Microsoft trust list signing, EFS, secure e-mail, client authentication Users
Authenticated Session Client authentication Users
Basic EFS Encrypting File System Users
CEP Encryption Act as a registration authority Users
Code Signing Code signing Users
Domain Controller Client authentication, server authentication Computers
EFS Recovery Agent File recovery Users
Enrollment Agent (Computer) Certificate request agent Computers
Exchange Enrollment Agent (Offline Request) Certificate request agent Users
Exchange User Signature Secure e-mail, client authentication Users
Exchange User Secure e-mail, client authentication Users
IPSEC IP Security Computers
IPSEC (offline request) IP Security Computers
Root Certification Authority Identify the root CA Computers
Router Client authentication Computers/routers
Smartcard Logon Client authentication Users
Smartcard User Client authentication, secure e-mail Users
Subordinate CA All Computers
Trust List Signing Microsoft trust list signing Users
User Authentication, secure e-mail, and EFS Users
User Signature Secure e-mail, client authentication Users
WebServer Server authentication Computers

Table 16.7 lists the version 2 certificate templates that are available in Windows Server 2003 Advanced Server and the purposes for each.

Table 16.7   Version 2 Certificate Templates

Certificate template name Certificate purposes Issued to
CA Exchange CA encryption Computer
Cross certification authority Qualified subordination Computer
Directory E-mail Replication Directory replication Users
Domain Controller Authentication Client authentication, server authentication Users
Key Recovery Agent Key recovery Users

Note

  • When you select and modify templates, create function-based names for the templates, such as domainA_e-mail or legal_signing. Function-based names help users to select the appropriate certificate for the task that they need to perform.

Delegating Administration of Certificate Templates

Although the majority of CA-related tasks are performed by administering the CA itself, certain tasks, including the administration of certificate templates, are controlled through Active Directory.

To delegate the administration of certificate templates:

  • Right-click the Certificate Templates node in the Certification Authority snap-in and select Manage.
  • Double click a certificate template.
  • Under the Security tab, check the Allow boxes for the Read and Write permissions.

For more information about certificate templates, see the Distributed Services Guide of the Windows Server 2003 Resource Kit (or see the Distributed Services Guide on the Web at http://www.microsoft.com/reskit).



阅读全文 | 回复(0) | 引用通告 | 编辑


发表评论:

    昵称:
    密码: (游客无须输入密码)
    主页:
    标题:



Powered by Oblog.