Revoking Old Client Authentication Certificates After Workstation Is Reimaged?


what best practice when workstation returned and/or reimaged , reassigned new employee?

if there connection or automation between deleting computer account ad , certificate getting revoked?

if not, there way set up?  the people reimaging laptops not same people have access revoke certificates, , if were, easy forget step.

is necessary manually revoke certificates when device not lost or stolen rather allowing reimaged system enroll new certificate , allow previous certificate expire naturally?

what best validity period workstation client authentication certificates?



certutil -view allows search certificates in ca database , export search results csv. powershell can used select certificate issued last , revoke others. running on issuing ca itself.

short term certificates can describing it, window having 2 valid certificates longer in option above.

i dont think there problem, e.g. if people cloned hard drives still have previous certificate , can use it. or has access backup of re-imaged machine before. backup used extract old key. give few ideas, , yes have seen people cloning business laptops. creative. these risks, if these real risks organization.



Windows Server  >  Security



Comments

Popular posts from this blog

some help on Event 540

WMI Repository 4GB limit - Win 2003 Ent Question

Event ID 1302 (error 1307) DFS replication service encountered an error while writing to the debug log file