Revoking Old Client Authentication Certificates After Workstation Is Reimaged?
what best practice when workstation returned and/or reimaged , reassigned new employee?
if there connection or automation between deleting computer account ad , certificate getting revoked?
if not, there way set up? the people reimaging laptops not same people have access revoke certificates, , if were, easy forget step.
is necessary manually revoke certificates when device not lost or stolen rather allowing reimaged system enroll new certificate , allow previous certificate expire naturally?
what best validity period workstation client authentication certificates?
certutil -view allows search certificates in ca database , export search results csv. powershell can used select certificate issued last , revoke others. running on issuing ca itself.
short term certificates can describing it, window having 2 valid certificates longer in option above.
i dont think there problem, e.g. if people cloned hard drives still have previous certificate , can use it. or has access backup of re-imaged machine before. backup used extract old key. give few ideas, , yes have seen people cloning business laptops. creative. these risks, if these real risks organization.
Windows Server > Security
Comments
Post a Comment