Hi Marcosfds,
Thank you for posting in the Microsoft Community Forum.
In your scenario, renewing the certificates of the existing subordinate CAs instead of replacing them with new servers and certificates may have the following implications:
- **Complexity and Risk:** Renewing the certificates of the existing subordinate CAs may require some adjustments and changes to be made to the existing infrastructure, which could increase complexity and introduce some level of risk. Especially when synchronizing certificate chains between the offline root CA and other infrastructure, caution should be exercised to ensure the integrity and security of the certificate chain.
- **Certificate Chain Updates:** After renewing the certificates of the subordinate CAs, you will need to ensure that all relevant certificate chains are updated and correctly deployed in all systems relying on PKI services. This may involve installing new root and intermediate certificates on computers, servers, and mobile devices.
- **Risk of Business Interruption:** Updating certificate chains may potentially cause business interruptions in some systems. Therefore, it is advisable to conduct testing in a non-production environment before making any changes and ensure that appropriate rollback plans are in place to address any unexpected issues.
- **Mobile Device Management (MDM):** For devices managed using Mobile Device Management (MDM), you will need to ensure that updating the certificate chain does not impact device connectivity and access. Updating the root certificate in MDM configurations may be necessary to ensure continued connectivity to PKI services.
In summary, renewing the certificates of the existing subordinate CAs may introduce some complexity and risk. However, with careful execution, appropriate testing, and monitoring throughout the process, you should be able to successfully complete the update without significant impact on business operations.
Best regards
Neuvi Jiang