One or more certification authorities (CAs) can be configured to support a number of scenarios that require the added security that certificates can provide. The following checklists identify the general steps and procedures needed to configure one or more CAs to enable these scenarios.
-
Checklist: Configure CAs to Issue and Manage Certificates
-
Checklist: Protect Encrypted Data from Loss by Enabling Key Archival and Recovery
-
Checklist: Enhance Certificate Revocation Checking in Diverse Environments by Setting Up an Online Responder Array
-
Checklist: Authenticate Web Servers with Certificates Issued by a Windows-Based CA
-
Checklist: Enhance Wireless Network Security by Requiring Certificates for Authentication and Encryption
-
Checklist: Strengthen Identity Management by Issuing Certificates for Smart Cards