Podcast
Root Causes 482: Microsoft and PQC


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 2, 2025
In this episode we explore the potential PQC future for Microsoft Active Directory Certificate Services, aka MSCA. We discuss potential paths for Microsoft to take and their consequences.
Podcast Transcript
Lightly edited for flow and brevity.
There have been some accusations of anybody saying that is spreading FUD. Therefore, I think it's worth addressing, what is Microsoft doing with their technology stack? I want to acknowledge the fact that Microsoft has obviously been doing a lot of work with respect to advancing to be able to be post-quantum capable. And they've got a great blog series on that. I think the latest update was just a few weeks ago in December of 2024 and so I wanted to call that out and say, listen to us very carefully on that episode, because a couple things were said. One was, hey, Microsoft, if something I'm saying is incorrect, tell me.
Everybody should be doing that. Totally not surprising that Microsoft is. But my question to Microsoft, and my question to the general industry is, is Microsoft referring to some of their net new technologies that this PQC capability will be implemented in, such as Azure PKI?
I mean, this is Microsoft's basic problem anyway. Like take anything they do and multiply it by billions, and even the smallest thing is a high stakes game that could literally cost lives, and so they always have to live in this world. But this is another example of that.
As well as it being so ensconced inside of the Microsoft stack and was never really built from the beginning to handle non-domain attached devices as an example.
Those are major, major limitations to Microsoft’s CA. Like if you're in a purely domain attached world, especially 1990s was an era where a lot of people were domain attached, even if you were remote, working through a VPN or something, you're typically attaching to a domain. But that's not, that’s not the way almost anybody works anymore. So it's almost like refactoring MSCA with post-quantum, you're still left with those major limitations. Anyway, food for thought. I could be wrong on all of it. If somebody from Microsoft wants to join us and tell us more.
Because we talk a lot about PKI and digital certificates, digital identities. One of the topics that we barely ever touch is trust models.
One is, we have episodes in the past, Tim and I will probably flash the references here, but former episodes, where are you sure you have configured your MSCA to be secure because white hats have taught us it's nearly impossible to do so. Not my words. Those are the words of some very smart white hats. But to answer your question, there's a couple options. I don't think you have to rip and replace MSCA. I think that you can augment it with another private CA and there might be a couple reasons you want to do that. You might want to keep that root. MSCA, you want to keep it as your root, root.
Therefore, if you want to do more modern use cases that MSCA cannot do alone, augmenting it with an issuing CA, a modern issuing CA that has been signed, that's a great route, because that's your first step towards phasing out what you're doing with MSCA, or phasing in modern use cases. Fantastic. MSCA augmentation is something that is available to you, and it's due to the flexibility of a PKI trust model. Signing and issuing CA is part of a trust model.
Another thing that I think is a consideration, Tim, is a lot of organizations have implemented MSCA without an HSM. Because for moderate size use cases, it just might not make sense to spend $30,000 to $50,000 and all the complexity that comes with an HSM. Therefore looking at a hosted solution that has a multi-tenant HSM, a private CA, where the keys are basically generated in an offline root with an HSM that is multi-tenant is a great way of dealing with the problem of security related to having keys generated in software and therefore there are reasons for some organizations to consider replacement or changing the trust model again. One way that you and I have talked about as well, a third reason for augmentation is you could eventually just turn the MSCA into being a pure offline root. Therefore, it's not as painful as a full rip and replace, which can be quite difficult, but then it mitigates the risk of security, because that offline root is doing so little, but ultimately providing that root of trust in a more secure way. Therefore it depends on the trust model that makes sense for you.

