If you want to uphold the name constraints in your CA cert, mark the field as critical. At that point clients that don’t understand them should fail validation of the CA cert.
We stood up the root CA, created the certificate, imported it, then destroyed the root CA. It’s a common security practice. Root CA can then never be compromised
The root CA certificate is used to establish trust in the chain of trust, but it is not directly involved in the certificate issuance process once the trust has been established.
In other words, a keyboard with zero hand movement, optical switches, and mostly querty layout (or Dvorak, Colemak, if you want it).
Unlike DataHand, it’s available, hackable, and the finger positioning is more fine grained.