Like many of you I've heard all the stories about how PKI (Public Key Infrastructure) "will save the day" for all our security concerns - this message was pushed particularly hard four to five years ago. PKI is a component of infrastructure which makes things like secure email (S/MIME), secure browsing (SSL/HTTPS), secure wireless (PEAP/EAP-TLS), code authenticity (code signing / authenticode) possible. Windows XP, Vista and Server 2003 make implementing PKI reasonably easy from a technical standpoint - don't forget the importance of process and procedure support and legal compliance.
Following much demand I'm going to present a Technet session purely on PKI (on 29th November) during which I'll debunk some myths, explain exactly HOW PKI works and show you how to implement all of the above with the exception of secure wireless which has a dedicated session of it's own on 8th December. Details of both sessions can be found on the UK TechNet events site - they are both in Reading.
Please let me know which parts of PKI confuse people most - comments would be appreciated. Clearly I have my own views and experience but I'm very keen to learn from you.