发布时间:2011-2-28 15:42
分类名称:PKI
Element | Description |
Certification Authorities | Provide services that authenticate the identity of individuals, computers, and other entities in a network. This encompasses both root certification authorities and subordinate authorities. |
Certificate Directory | Saves certificate requests and issued and revoked certificates and certificate requests. |
Key Recovery Server | Saves encrypted private keys in the certificate database for recovery after loss. |
A certification authority (CA) is responsible for attesting to the identity of users, computers, and organizations. The CA authenticates an entity and vouches for that identity by issuing a digitally signed certificate. The CA can also manage, revoke, and renew certificates.
A CA can be public or private. A public CA provides certification services, typically for a fee, to the public over the Internet. A private CA provides this service to the members of a delimited population such as the employees of a business or members of some other private group.
The means by which a CA authenticates an end user are varied and beyond the scope of this documentation. Clearly, however, methods of authentication vary by type of provider. For example, a private CA can establish the identity of end users by referring to a group roster such as an employee database or Active Directory. The authentication methods performed by a public CA are generally more complex and depend partly on the level of assurance being promised by the certificate.
As the population of a public key infrastructure (PKI) grows, it can become difficult for a single CA to effectively manage all of the certificates it has issued. The CA can compensate by authorizing other CAs in the PKI to issue certificates. The initial CA is called the root, and the CAs it authorizes are called subordinates. Subordinate CAs can also designate their own subsidiaries within the limits set by the root. The resulting structure is called a certificate hierarchy. The certificates issued to CAs lower in the hierarchy contain enough certificates to trace a path back to the root. This is called a certificate chain.
The term certification authority can refer to both the organization that vouches for the identity of an end user and the server used by the organization to issue and manage certificates. A Windows server can be configured to act as a CA server, and this documentation usually refers to the server when using the term CA.
The Certificate Enrollment API interacts with a CA mainly by using the IX509Enrollment object. The Enroll method on this object can automatically encode a certificate request, submit it to the CA, and install the issued certificate. You can also use an initialized IX509Enrollment object for out-of-band enrollment or for delayed enrollment. In addition, you can use the IX509EnrollmentStatus object to monitor enrollment status.
A Windows public key infrastructure (PKI) saves certificates on the server that hosts the certification authority (CA) and on the local computer or device. CA storage is typically referred to as the certificate database, and local storage is known as the certificate store.
When you add Certificate Services on a Windows server and configure a CA, a certificate database is created. By default, the database is contained in the %SystemRoot%\System32\Certlog folder, and the name is based on the CA name with an .edb extension. The database can contain:
· Issued certificates
· Revoked certificates
· Archived private keys
· Certificate requests
You cannot use the Certificate Enrollment API to manipulate the database. The enrollment process automatically creates the necessary entries.
Microsoft Certificate Services copies issued certificates and pending or rejected requests to local computers and devices. The storage location is called the certificate store and consists of the following logical stores.
Logical store | Description |
Personal | Contains certificates associated with a private key controlled by the user or computer. |
Trusted Root Certification Authorities | Contains certificates from implicitly trusted certification authorities (CAs). |
Enterprise Trust | Contains certificate trust lists typically used to trust self-signed certificates from other organizations. |
Intermediate Certification Authorities | Contains certificates issued to subordinate CAs in the certification hierarchy. |
Active Directory User Object | Contains the user object certificate or certificates published in Active Directory. |
Trusted Publishers | Contains certificates from trusted CAs. |
Untrusted Certificates | Contains certificates that have been explicitly identified as untrusted. |
Third-Party Root Certification Authorities | Contains trusted root certificates from CAs outside the internal certificate hierarchy. |
Trusted People | Contains certificates issued to users or entities that have been explicitly trusted. |
Other People | Contains certificates issued to users or entities that have been implicitly trusted. |
Certificate Enrollment Requests | Contains pending or rejected certificate requests. |
You cannot use the Certificate Enrollment API to specify or retrieve store properties or copy certificates to specific stores.
A Microsoft certification authority (CA) can be configured to archive and recover the private key associated with the public key submitted in the certificate request. Recovery is useful if a key is lost. By default, only encryption keys can be archived. It is not necessary to archive keys intended only for signing because only the public key is needed to verify a signature if the private signing key is lost.
To archive a key, the CA must be configured to issue key recovery agent (KRA) certificates and to have already issued at least one. A key recovery agent is an administrator authorized by an organization to decrypt private keys. To enhance security, we recommend that the key recovery agent and the certificate manager roles be assigned to different individuals, that the certificate manager be permitted to retrieve but not decrypt archived keys, and that the key recovery agent be permitted to decrypt keys but not retrieve them.
A client typically requests a certificate by using a template. If the template requires that the private key be archived, the following steps are performed by the client and the CA:
Note Only a CMC request can be used for key archival. CMC requests are represented by the IX509CertificateRequestCmc interface.
Key recovery is not directly supported by Active Directory Certificate Services or the Certificate Enrollment API. Microsoft does, however, provide the following applications to help with the process:
The following steps are performed to recover a private key: