CIS256 Discussions 5.1 Discussion: Design Considerations



5.1 DiscussionDesign Considerations

Certificate Authorities, or Certificate Authorities / CAs, issue Digital Certificates. Users represent their authentic online identity (authentic because the CA has verified their identity. Digital Certificates are verifiable small data files that contain identity credentials to help websites, people, and devices). These Digital IDs/certificates are used to protect the information, encrypt billions of transactions, and enable secure communication. CAs play a critical role in how the Internet operates and how transparent, trusted transactions can take place online. CAs issue millions of Digital Certificates each year.

An SSL Certificate is a popular type of Digital Certificate that binds the ownership details of a web server (and website) to cryptographic keys. These keys are used in the SSL/TLS protocol to activate a secure session between a browser and the web server hosting the SSL Certificate. In order for a browser to trust an SSL Certificate, and establish an SSL/TLS session without security warnings, the SSL Certificate must contain the domain name of the website using it, be issued by a trusted CA, and not have expired.

According to industry experts, in August 2012 there are almost 2.5m SSL Certificates in use for public facing websites. In reality, there are probably as many as 50% more than this number in use that cannot be identified. This makes SSL one of the most prevalent security technologies in use today.

Before you begin, be sure to review the following resources:

Please read the following chapter(s) in your textbook:  Windows Server 2019 Inside Out (1st edition)

  • Chapter 12: Active Directory Certificate Servicespages 391-420


  • Reply to the topic below by Wednesday of this week, 11:59 pm EST.
  • Reply to 2 classmates by Sunday of this week, 11:59 pm EST. 
  • To see how discussions are graded, click the vertical ellipsis (  )  and select Show Rubric or refer to your instructor’s guidelines.
  • For more information about discussion grading criteria, visit the Undergraduate Discussion Participation Policies and Rubric page located in ECPI Resources.

Discussion Topic

Search the public web to find three (3) popular sites explaining the advantages and disadvantages of using certificates with Active Directory. You will be sharing your results with your peers, so try to not duplicate content that your peers have already posted.

In your original post, answer the following:

  • Give a one to two-paragraph summary/description about each of the one advantage and one disadvantage presentations that you chose. In your paragraph be sure to include an example that explains your advantage and disadvantage of LDAP, be sure to explain why you feel a particular structure is more advantageous than the other. Why do you think this structure is so popular among users? What features do you think the users find attractive? Explain why. Note any major similarities or differences you notice between the different choices.
  • Provide a screenshot of each of the features in your explanation. Try to find screenshots or diagrams of different policies and include these in your post. You may need to search the public web using a search engine like Google or Bing to find screenshots. Cite any sources you use in APA format; this includes sources for any screenshots that are not your own.

In your responses to your classmates, address the following:

  • Describe your initial thoughts on the shells they posted.
  • Note any major similarities or differences you notice between the different distributions.
  • Ask clarifying questions that help keep the discussion moving



There are no reviews yet.

Be the first to review “CIS256 Discussions 5.1 Discussion: Design Considerations”

Your email address will not be published. Required fields are marked *