

Exit modules can write PKI data to a file or use HTTP or a remote procedure call (RPC) to transport the data to a remote location.

(I discuss these policy modes in greater detail later.) To check out the policy module installed on your CA, open the Microsoft Management Console (MMC) Certification Authority snap-in, right-click the CA object, select Properties from the context menu, and select the Policy Module tab, which Figure 2 shows.Įxit modules distribute and publish certificates, certificate chains, complete CRLs, and delta CRLs.
#Oracle jet calendar windows#
Windows 2003 comes with a policy module called certpdef.dll that supports two policy types: the enterprise policy mode and the standalone policy mode. To retrieve certificate layout information, the policy module can call on information stored in a directory (e.g., Active Directory-AD) or database. The policy module informs the CA server engine about the layout of a certificate and decides whether the CA should issue a certificate, deny a certificate, or leave a certificate request pending. The policy module implements and enforces the CA policy rules as set by the CA administrator. After accepting the requests, the entry module places them in a queue for processing by the policy module. The entry module accepts certificate requests formatted according to Public-Key Cryptography Standards (PKCS) #10 or the Cryptographic Management protocol using Cryptographic Message Syntax (CMS). The engine uses the entry, policy, and exit modules to communicate with the other components. At the heart of Certificate Services sits a CA server engine (certsrv.exe) that generates certificates and CRLs and directs the message flow between the CA and other Certificate Services components. Figure 1 shows the architecture, which includes various modules, databases, administrative tools, intermediaries, and CryptoAPI.
#Oracle jet calendar archive#
A key difference is that Microsoft modified the CA database layout to let the CA archive and recover PKI users' private keys. The Windows 2003 Certificate Services architecture is almost identical to the architecture that Microsoft used for previous editions of Certificate Services. Windows 2003 Certificate Services Architecture (For more information about certificate revocation, key archival and recovery, and certificate autoenrollment, see the articles in "Resources," page 9.) To better understand how CAs and PKI have evolved in Windows 2003, let's examine the components of the latest Certificate Services architecture and the differences between establishing an enterprise CA and a standalone CA in Windows 2003. A Windows 2003 CA can also perform secure private key archival and recovery. A CA receives and processes PKI user certificate requests, identifies and validates those requests, issues certificates according to the PKI's security policy, renews and revokes certificates, publishes certificates to different locations, creates and publishes certificate revocation lists (CRLs), and logs all certificate and CRL transactions to the appropriate database.

#Oracle jet calendar software#
The core component of the Windows Server 2003 public key infrastructure (PKI) software is the Certification Authority (CA), which Microsoft often refers to as the Certificate Server or Certificate Services.
