I understand that Microsoft only recommends installing a standalone certificate authority when you do not have...
an Active Directory domain, and automatic deployment of certificates to users and computers isn't required.
If someone wants to take advantage of the enterprise certificate authority, but wants the best security, can the certificate authority be placed on the internal network (thereby requiring the ISA server to be a member of the internal domain)?
It seems to me that you have two lines of thought converging here. One is trying to figure out how to deploy your enterprise certificate authority (CA) in the most secure fashion, and the other has something to do with ISA. I think I know where you are headed, so I'll give it a shot.
Microsoft recommends deploying a standalone certificate authority to protect the root certificate authority from being compromised. Standalone certificate authorities can be taken offline (when they are not being used to generate certificates) which helps to protect the validity of your root certificate authority. The workload of deploying user certificates can be done by subordinates while the root certificate authority is offline. Subordinate certificate authorities can be member servers of the domain and can be used for automating the deployment of certificates.
How can ISA help? ISA can prevent any external users from accessing the certificate authority. And depending on how you configure ISA, it can even help you protect your certificate authority from internal users as well.
I hope this helps. Please respond with a comment to this answer if I'm way off base here.
Do you have comments on this Ask the Expert Q&A? Let us know.
Reference Center: ISA Server
Reference Center: Permissions and authentication
Related Q&A from Richard Luckett
When you're stumped on how to track email items following a central mailbox move, fix the dilemma by knowing what happens to items in mailboxes when ...continue reading
You can pull out the big guns to manually remove what's left of your failed Exchange Server from Active Directory, but it's best to consider ...continue reading
There are a number of actions to take to implement OWA security, including obvious ones like creating strong password policies. Admins should also ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.