External Articles – PKI

Page: 1 2

Hashing Algorithms take variable input and provide a unique fixed length output. Hashing algorithms have a number of desired properties. Those desired properties include that the hash should not be able to be reversed to determine the data that was inputted into the hash.
Read full article ...

Hello. Jim here again to take you through the migration steps for moving your two tier PKI hierarchy from SHA1 to SHA256. I will not be explaining the differences between the two or the supportability / security implementations of either. That information ...
Read full article ...

SCEP (Simple Certificate Enrollment Protocol) and NDES (Network Device Enrollment Service) are the mechanisms we currently use to deploy certificates to our mobile devices via Intune and Configuration Manager.
Read full article ...

A fellow engineer at Microsoft, Roger Grimes, has published a great article on Implementing SHA-2 in ADCS. You can read it at the link below: http://social.technet.microsoft.com/wiki/contents/articles/31296.implementing-sha-2-in-active-directory-certificate-services.
Read full article ...

Hey everyone, I'm back to grinding it out again! Here's another one for your "suite-tooth." We've covered installing and configuring a Suite B Offline Root CA, and also issuing end-entity key agreement and digital signature certificates in accordance with RFC 5759 from an offline Root CA.
Read full article ...

Hi, Rick Sasser here, with what was intended to be a quick blurb on security that back references one of my original posts on Choosing a Hash and Encryption Algorithm for a new PKI? and somehow turned out to be the labor equivalent of about a week, counting everyone who chipped in on it, and a lot
Read full article ...

Revocation is an important part of PKI to ensure the validity of certificates. There are two components to make the process work. A list, or more specifically Certified Revocation List (CRL), as the criteria to identify an invalid certificate needs to be published and distributed.
Read full article ...

My co-worker – Yung Chou – brings us Part 1 of a 2 Part blog post on using PKI in an enterprise networking environment. PKI is heavily employed in cloud computing for encrypting data and securing transactions.
Read full article ...

Q: How can I validate the public key infrastructure (PKI) certificates that are in my personal certificate store on my Windows machine? In this command, the MY verb tells the certutil utility to check the certificates in the personal certificate store of the account that's executing the command.
Read full article ...

Page: 1 2