Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Import a Signed Wildcard CA into MS Enterprise Root CA enviromnent

Status
Not open for further replies.

mlchris2

Technical User
Mar 18, 2005
512
US
Our Network Environment currently uses a self-signed root certificate that we created within our Microsoft Enterprise Root CA environment. Our Network Ops team is having some problem with public facing HTTPS requests thru a IronPort device. The self-signed certificate we currently have in place worked in a good portion of our network, but we want to implement a solution when working with public facing devices.

I was tasked with finding a cheap, easy to implement solution to this problem.

I am pretty sure we can do this rather easily, by purchasing a Wildcard Signed Cert from a CA (Verisign, Thawte, etc) and import it into our CA server and then using Active Directory/Group Policy push this out to workstations, servers and network devices.

I have a couple questions thou...

1. Can I roll this out just to the network devices that have a public facing interface or does it get rolled out to the entire network?

2. will this design work?

appriciate any advice or clarification.

Mark C.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top