One or more certification authorities (CAs) can be configured to support a number of scenarios that require the added security that certificates can provide. The following checklists identify the general steps and procedures needed to configure one or more CAs to enable these scenarios.
- Checklist: Configure CAs
to Issue and Manage Certificates
- Checklist: Protect
Encrypted Data from Loss by Enabling Key Archival and
Recovery
- Checklist: Enhance
Certificate Revocation Checking in Diverse Environments by Setting
Up an Online Responder Array
- Checklist: Authenticate
Web Servers with Certificates Issued by a Windows-Based CA
- Checklist: Enhance
Wireless Network Security by Requiring Certificates for
Authentication and Encryption
- Checklist: Strengthen
Identity Management by Issuing Certificates for Smart Cards