AD CS Step by Step Guide
AD CS Step by Step Guide
AD CS Step by Step Guide
Table of Contents
Test Lab Overview
Computer Requirements
Major Steps
Install the Active Directory Forest
o Configure Server Name and Network Settings
o Install a new forest by using Server Manager
o Install the Group Policy Management Console
Prepare HTTP Web Server for CDP and AIA Publication
o Join SRV1 to the domain
o Install Web Server (IIS) Role
o Create CertEnroll Folder and grant Share & NTFS Permissions
to Cert Publishers group
o Create CertEnroll Virtual Directory in IIS
o Enable Double Escaping on IIS Server
o Create CNAME (pki.fabrikam.com) in DNS
Install the Standalone Offline Root CA
o Create a CAPolicy.inf for the standalone offline root CA
o Installing the Standalone Offline Root CA
Perform Post Installation Configuration for Root CA
o Additional information
o Enable Auditing on the Root CA
Additional Information
o Configure the AIA and CDP
Configure the AIA
Additional Information
Configure the CDP
Additional Information
Install Enterprise Issuing CA
o Join CA02 to the domain
o Create CAPolicy.inf for Enterprise Root CA
o Publish the Root CA Certificate and CRL
Additional information
o Install Subordinate Issuing CA
o Submit the Request and Issue Fabrikam Issuing CA Certificate
o Install the Fabrikam Issuing CA Certificate on CA02
o Perform Post Installation Configuration Tasks on the
Subordinate Issuing CA
Configure Certificate Revocation and CA Certificate
Validity Periods
Additional information
o Enable Auditing on the Issuing CA
o Configure the AIA and CDP
Configure the AIA
Configure the CDP
Install and Configure the Online Responder Role Service
o Install the Online Responder Role Service on SRV1
o Add the OCSP URL to the Fabrikam Issuing CA
o Configure and Publish the OCSP Response Signing Certificate
on the Fabrikam Issuing CA
o Configure Revocation Configuration on the Online Responder
o Configure Group Policy to Provide the OCSP URL for the
Fabrikam Issuing CA
Join Win7 to the domain
Verify the PKI Hierarchy Health
o Check PKI Health with Enterprise PKI
o Configure Certificate Distribution on the Fabrikam Issuing CA
o Obtain a Certificate Using WIN7 and Verify PKI Health
Subnet Preferred
Virtual Machine Role(s) OS Type IP Address
Mask DNS Server
DC & DNS Windows
DC01.Fabrikam. 192.168.1. 255.255.25 192.168.1.
- LDAP Server
com 10 5.0 10
CDP/AIA 2008 R2
CA01 Standalon Windows Not Not Not
e Offline Server
Applicable Applicable Applicable
Root CA 2008 R2
Windows
CA02.Fabrikam. Enterprise 192.168.1. 255.255.25 192.168.1.
Server
com Issuing CA 12 5.0 10
2008 R2
Web Windows
SRV1.Fabrikam. Server - Server 192.168.1. 255.255.25 192.168.1.
com HTTP 2008 R2 13 5.0 10
CDP/AIA Enterprise
Windows
WIN7.Fabrikam. Windows 192.168.1. 255.255.25 192.168.1.
Client
com 7 14 5.0 10
Computer
Computer Requirements
Make sure that following requirements are met for the computers or
virtual machines to be installed for this lab:
Major Steps
There are eight major steps in this step-by-step guide as listed below
(each includes several sub tasks).
Prepare HTTP Web Server for
CDP and AIA Publication
Join SRV1 to the domain
1. Log on to SRV1 as the local administrator.
2. Click Start, type ncpa.cpl and press ENTER.
3. In Network Connections, right-click the Local Area Connection
and then click Properties.
o If there are more than one Local Area Connection icons in the
Network Connections, you want to modify the one that is
connected to network segment shared by all the computers
that you have installed for this lab.
4. Click the Internet Protocol Version 4 (TCP/IPv4) and then click
Properties.
5. Select the Use the Following IP address. Configure the IP
address, Subnet mask, and Default gateway appropriately for
your test network.
o IP Address: 192.168.1.13
o Subnet mask: 255.255.255.0
o Default gateway: <optional>
6. Select the Use the following DNS server address. Configure the
Preferred DNS server for the IP address of your domain
controller. Click OK. Click Close.
o Preferred DNS Server: 192.168.1.10
7. Click Start, type sysdm.cpl and press ENTER. Click Change.
8. In Computer name, type SRV1 and then click OK.
9. When prompted that you need to restart the computer, click OK.
Click Close. Click Restart Now.
10. After SRV1 restarts, log on as a local administrator.
11. Click Start, type sysdm.cpl and press ENTER. Click Change.
12. In Member of, select Domain, and then type fabrikam.com.
Click OK.
13. In Windows Security, enter the User name and password
for the domain administrator account. Click OK.
14. You should be welcomed to the Fabrikam domain. Click OK.
15. When prompted that a restart is required, click OK. Click
Close. Click Restart Now.
Note - Include the terminating “.” in the FQDN in the previous step. In a
production environment this alias can resolve to a load balancer which
distributes requests to any number of web servers that contain the CA
certificates and CRLs.
[Version]
Signature="$Windows NT$"
[Certsrv_Server]
RenewalValidityPeriod=Years
RenewalValidityPeriodUnits=20
AlternateSignatureAlgorithm=0
Notes:
6. Close Notepad.
Additional information
CRLPeriodUnits - You can use this setting to specify the number of
days, weeks, months, or years, that a CRL will be valid.
CRLPeriod - You can use this setting to specify whether the validity
period of a CRL will be defined in days, weeks, months, or years.
CRLOverlapPeriodUnits - You use this setting to specify the
number of days, weeks, months, or years that CRLs can overlap.
When a large number of certificates are revoked, such as during an
employee layoff, the delta CRL size might increase significantly
because of the large number of entries, and almost all clients will
refer to the older base CRL. You can reduce the size of the overlap
period to speed the propagation process for the new base CRL and
help minimize the size of delta CRLs.
CRLOverlapPeriod - This setting specifies whether the overlap
period for CRLs will be defined in days, weeks, months, or years.
The overlap period for CRLs is the amount of time at the end of a
published CRLs lifetime that a client can use to obtain a new CRL
before the old CRL is considered unusable. The default setting for
this value is 10% of the CRL lifetime. Because some environments
may require longer periods to replicate a CRL, this setting can be
configured manually.
ValidityPeriodUnits - You can use this setting to define the number
of days, weeks, months, or years that a certificate issued by the CA
will be valid. The validity period for a certificate cannot be greater
than the validity period of the CA that issued the certificate. The
default value depends on the type of certificate.
ValidityPeriod - You can use this setting to specify whether the
validity period of certificates issued by the CA will be defined in
days, weeks, months, or years. The default value depends on the
type of certificate.
Additional Information
CA\AudtiFilter 127 enables all forms of auditing. You can enable use
this setting to enable specific or all auditing events for CA.
You cannot use a domain Group Policy for this case because the
offline root CA is not joined to the domain.
TechNet articles
o Audit object access
o Setting Up CA Auditing
After you have run that command, run the following command to confirm
your settings:
1:C:\Windows\system32\CertSrv\CertEnroll\%1_%3%4.crt
2:http://pki.fabrikam.com/CertEnroll/%1_%3%4.crt
You can also see this in the the CA (certsrv) console. To open the console,
click Start, click Administrative Tools, and then click Certification
Authority. In the navigation pane, expand the Certificate Authority
(Local). Right-click Fabrikam Root CA and then click Properties. On
the Extensions tab, under Select extension, click Authority
Information Access (AIA) and you will see the graphical representation
of the AIA settings.
Additional Information
Clients will use the CDP to locate the CRL for the certificates issued by the
CA. This allows certificate clients to ensure that the certificates have not
been revoked. You can also configure the CDP with the user interface,
certutil, and registry. Using a certutil command is a quick and common
method for configuring the CDP. When you run the following certutil
command, you will be configuring a static file system location, an LDAP
location, an http location, and a file system location.
Note: The file system location that you will be setting will allow the CRL to
be copied over the network to the web server (SRV1), which is why we
earlier allowed the Cert Publishers group access to the share and folder.
All CAs are members of the Cert Publishers group, so we effectively
allowed all CAs to copy to the CertEnroll folder on SRV1. Some
administrators decide to configure a separate group of specific computers
for that purpose or even grant permissions to the CAs individually.
The certutil command to set the CDP modifies the registry, so ensure that
you run the command from an command prompt run as Administrator.
Run the following command:
1:C:\Windows\system32\CertSrv\CertEnroll\%3%8%9.crl
10:ldap:///CN=%7%8,CN=%2,CN=CDP,CN=Public Key
Services,CN=Services,%6%10
2:http://pki.fabrikam.com/CertEnroll/%3%8%9.crl
Additional Information
You can also see this in the the CA (certsrv) console. To open the console,
click Start, click Administrative Tools, and then click Certification
Authority. In the navigation pane, ensure that Certificate Authority
(Local) is expanded. Right-click Fabrikam Root CA and then click
Properties. On the Extensions tab, under Select extension, click CRL
Distribution Point (CDP) and you will see the graphical representation
of the CDP settings.
Restart-Service certsvc
certutil -crl
Install Enterprise Issuing CA
Enterprise CAs must be joined to the domain. Before you install the
Enterprise Issuing CA (CA02), you must first join the server to the domain.
Then you can install the Certification Authority role service on the server.
[Version]
Signature="$Windows NT$"
[PolicyStatementExtension]
Policies=InternalPolicy
[InternalPolicy]
OID= 1.2.3.4.1455.67.89.5
URL=http://pki.ideeyatech.corp/cps.txt
[Certsrv_Server]
RenewalKeyLength=2048
RenewalValidityPeriod=Years
RenewalValidityPeriodUnits=10
LoadDefaultTemplates=0
AlternateSignatureAlgorithm=0
6. Close Notepad.
Notes
Additional information
Additional information
Additional Information
CA\AudtiFilter 127 enables all forms of auditing. You can enable use
this setting to enable specific or all auditing events for CA.
You could have used a domain Group Policy in this case because the
enterprise issuing CA is joined to the domain.
TechNet articles
o Audit object access
o Setting Up CA Auditing
After you have run that command, run the following command to confirm
your settings:
2:http://pki.fabrikam.com/CertEnroll/%1_%3%4.crt
You can also see this in the the CA (certsrv) console. To open the console,
click Start, click Administrative Tools, and then click Certification
Authority. In the navigation pane, expand the Certificate Authority
(Local). Right-clickFabrikam Root CA and then click Properties. On the
Extensions tab, under Select extension, click Authority Information
Access (AIA) and you will see the graphical representation of the AIA
settings.
copy
"c:\Windows\System32\certsrv\certenroll\CA02.fabrikam.com_Fabr
ikam Issuing CA.crt" \\srv1.fabrikam.com\c$\certenroll\
Additional Information
Note: The file system location that you will be setting will allow the CRL to
be copied over the network to the web server (SRV1), which is why we
earlier allowed the Cert Publishers group access to the share and folder.
All CAs are members of the Cert Publishers group, so we effectively
allowed all CAs to copy to the CertEnroll folder on SRV1. Some
administrators decide to configure a separate group of specific computers
for that purpose or even grant permissions to the CAs individually.
The certutil command to set the CDP modifies the registry, so ensure that
you run the command from an command prompt run as Administrator.
Run the following command:
After you run that command, run the following certutil command to verify
your settings:
In the registry
location:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Service
s\CertSvc\Configuration\Fabrikam Issuing CA you can open the
REG_MULTI_SZ value and see the configuration of these values:
65:C:\Windows\system32\CertSrv\CertEnroll\%3%8%9.crl
79:ldap:///CN=%7%8,CN=%2,CN=CDP,CN=Public Key
Services,CN=Services,%6%10
6:http://pki.fabrikam.com/CertEnroll/%3%8%9.crl
65:file://\\srv1.fabrikam.com\CertEnroll\%3%8%9.crl
Additional Information
certutil -crl