Changes to SSL/TLS Certificate Validity Periods – September 2020

Validity Period Changes to SSL/TLS Certificate PKI

It was recently announced that Google Chrome will be joining Apple Safari in implementing a change to publicly trusted SSL/TLS certificates. This change, however, will impact organizations operating their own internal PKI as well. While the change was initially submitted to the official CA/Browser Forum, the vote failed last year. However, both Apple and Google…

Read More

Our Advanced PKI Training Course Is Now Online

ADCS Advance Training Course PKI Solutions

Now is the time to keep your PKI healthy – now more than ever. The key to operating and maintaining your PKI is understanding how it all works. We all know that PKIs are the foundational backbone of enterprise IT security, IoT, and industry specific security standards. Ensuring the security and integrity of your PKI…

Read More

PKI Solutions Live Q&A

PKI Solutions Office Hours

If you joined our PKI Solutions Office Hours – our live Q&A – held on April 2, 2020 with Mark Cooper, Vadims Podāns, and Jacob Grandlienard, you were part of a lively PKI discussion. With questions around setting up permissions in ADCS, the pros and cons of where CDPs are located, and configuring NDES, this…

Read More

Creating RDP Certificates

Jake Grandlienard PKI Solutions Consultant

In a previous blog on Object Identifiers (OID) in PKI, I mentioned creating a certificate template for Remote Desktop Connection (RDP).  In this blog, I will show how to create the template, why the OID and extensions are important, and how to implement it and remove self-signed certificate warnings from RDP connections. Important Note Prior…

Read More

PKI Explained: Why It Is Necessary and Relevant Now More Than Ever

Digital Technology Background PKI

Unauthorized access, unsigned applications (malware) and unsecured email. What can help prevent these top 3 cyberthreats impacting organizations today? Public key infrastructure (PKI). Mark explains PKI and authentication in an article in ISACA’s The Nexus. I like his analogy describing PKI as “a virtual, encrypted handshake.” Check out the article.

Read More