Dear Moreira Adonis,
My name is Hoang Phan, and I understand that you are having some query related to PKI infrastructure.
From my experience, it’s completely normal to have two or more PKI hierarchies in the same forest. However, based on my research, there’s no straightforward method (such as a GPO or direct configuration) to restrict a user or computer to request certificates from only a specific CA. By default, they will attempt to enroll from any available CA.
One practical way to achieve this restriction is to publish the required certificate template only on the desired CA. This ensures that the user or computer can only contact that CA for enrollment.
For the CRL Distribution Point (CDP), you can configure multiple URLs—it doesn’t have to be published solely on an IIS server. You can also use file share paths and LDAP paths. I recommend configuring multiple locations so that the CRL remains accessible even if one path becomes unavailable.
If you’d like, I can provide a detailed explanation of the configuration steps. For further reading, here are some useful references:
I hope this information proves helpful. Please don’t hesitate to reach out if you need further clarification—I’ll be happy to assist 🙂
If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.
Best regards,
Hoang Phan