Browse by Tags

Tagged Content List
  • Blog Post: How to Determine if Smart Card Authentication Provider Was Used

    Hey folks, Keith Brewer here to discuss how to determine how a user has authenticated. Recently I was onsite with a Microsoft Premier Customer and they asked if there was a way for them to determine if a user had used username and password or their issued smart card for logon. Problem: IT Organization...
  • Blog Post: Microsoft PKI OCSP Responder Now JITC Certified and Lab Setup Guide

    Hello all, my name is Jesse Esquivel and I’m a platforms PFE with one of my specialty’s being security/PKI. I’ve been working with PKI in the Department of Defense (DoD) and Federal spaces for the last 7 years, designing, installing, upgrading, and troubleshooting both DoD and Microsoft...
  • Blog Post: Choosing a Hash and Encryption Algorithm for a new PKI?

    I frequently get asked to consult on building out new Public Key Infrastructures here in Premier Field Engineering. One of the things that I get asked commonly is “How do I choose a key length and Hash Algorithm?”. That’s a complex question, that generally is difficult to answer, but I thought I might...
  • Blog Post: Server 2012 PKI Key Based Renewal Explained

    Hello everybody, Randy here. I am new to the PFE role, but have a number of BLOG Posts under my belt from my time as a CTS engineer for the Directory Services team. One of my first tasks as a PFE was to clarify some features available in Server 2012 AD Certificate Services. This BLOG Post focuses on...