Our Advanced PKI Training Course Is Now Online

ADCS Advance Training Course PKI Solutions

Now is the time to keep your PKI healthy – now more than ever. The key to operating and maintaining your PKI is understanding how it all works. We all know that PKIs are the foundational backbone of enterprise IT security, IoT, and industry specific security standards. Ensuring the security and integrity of your PKI…

Read More

PKI Solutions Live Q&A

PKI Solutions Office Hours

If you joined our PKI Solutions Office Hours – our live Q&A – held on April 2, 2020 with Mark Cooper, Vadims Podāns, and Jacob Grandlienard, you were part of a lively PKI discussion. With questions around setting up permissions in ADCS, the pros and cons of where CDPs are located, and configuring NDES, this…

Read More

Creating RDP Certificates

Jake Grandlienard PKI Solutions Consultant

In a previous blog on Object Identifiers (OID) in PKI, I mentioned creating a certificate template for Remote Desktop Connection (RDP).  In this blog, I will show how to create the template, why the OID and extensions are important, and how to implement it and remove self-signed certificate warnings from RDP connections. Important Note Prior…

Read More

PKI Explained: Why It Is Necessary and Relevant Now More Than Ever

Digital Technology Background PKI

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.” Check out the article.

Read More

Understanding Microsoft Cryptographic Service Providers

Crypto Provides PKI

A common question I often get from customers and students is about Microsoft’s Cryptographic Service Providers (CSP). The CSPs are responsible for creating, storing and accessing cryptographic keys – the underpinnings of any certificate and PKI. These keys can be symmetric or asymmetric, RSA, Elliptical Key or a host of others such as DES, 3DES, and…

Read More