Techcommunity Microsoft Com t5 Ask The Directory Services Team Implementing An Ocsp Responder Part V High Availability Ba P 396882
Techcommunity Microsoft Com t5 Ask The Directory Services Team Implementing An Ocsp Responder Part V High Availability Ba P 396882
Home Windows Server Ask the Directory Services Team Implementing an OCSP Responder: Part V High Availability
Version history
Implementing an OCSP
Last update: Apr 04 2019 02:48 PM
Updated by: TechCommunityAP
Responder: Part V High IAdmin
Availability Labels
By Ned Pyle
Published Apr 04 2019 02:48 PM 11.2K Views ocsp 9
There are two major pieces in implementing the High Availability Configuration. The first
step is to add the OCSP Responders to what is called an Array. When OCSP Responders are
configured in an Array, the configuration of the OCSP responders can be easily maintained,
so that all Responders in the Array have the same configuration. The configuration of the
Array Controller is used as the baseline configuration that is then applied to other members
of the Array.
The second piece is to load balance the OCSP Responders. Load balancing of the OCSP
responders is what actually provides fault tolerance. I am going to demonstrate using the
built in Windows Network Load Balancing feature of Windows Server 2008. You can of
course use a third party hardware load balancer if you wish. In this example, we are going to
deploy two OCSP Servers in a highly available configuration.
Firewall Exceptions
In Windows Server 2008 the Windows Firewall is enabled by default. Depending on the
requirements of your enterprise, you may have the firewall in its default state, you may have
it turned off, or you may have a custom configuration.
If you are unfamiliar with Windows Firewall with Advanced Security, you may want to review
Windows Firewall with Advanced Security and IPSEC , which has links to a variety of sources
for learning about as well configuring and implementing the Windows Firewall with
Advanced Security. The document includes a link on how to deploy firewall settings with
Group Policy .
The Windows Firewall with Advanced Security there are three types of profiles:
Public . Other than domain networks, all networks are initially categorized as
public. Networks that represent direct connections to the Internet or are in public
places, such as airports and coffee shops should be left public.
http://technet.microsoft.com/en-us/library/cc748991(WS.10).aspx
In a higher security environment you may want to configure this setting for a specific profile.
For example inside an enterprise you may want to enable the rule just for the Domain
Profile. Skip
Skip
Skip
toto
tofooter
primary
main navigation
content
content
In this example when we configure the rules, we are configuring them for Any profile, which
will allow the responder to be managed regardless of which profile is applied.
When you install the OCSP Role the following Inbound Rules will be configured on the
Windows Firewall:
These rules allow the OCSP Responder to receive the OCSP requests from the client and to
respond to the OCSP clients.
You will also need to enable the following rules to manage the OCSP Responders as well as
allowing the OCSP Responder to sync the configuration with the Array Controller:
To enable the rules, open the Windows Firewall with Advanced Security MMC (WF.msc)
and click on Inbound Rules . Find the rule, right click on the rule and select Enable Rule
from the context menu.
You should perform this action on every OCSP Responder that will be a member of the
array. A more scalable solution is to place all of the OCSP Responders in a common OU, and
use group policy to maintain a consistent configuration.
CA Preparation
In Part II of this series we discussed preparing the certificate authorities for use with the
OCSP Responder. One of the configuration steps was to configure the Authority Information
Access (AIA) extensions with the OCSP Extension that included the URL that points to the
OCSP Responder. When configuring an OCSP Responder in a Load Balanced Configuration
you will need to specify the name of the Load Balancer. Below is a diagram of the OCSP
Infrastructure that I will walk through implementing in this blog posting. Notice that the
name of the two OCSP Responders are FCOCSP01.FourthCoffee.Com and
FCOCSP02.FourthCoffee.com. You will also notice that I have decided to assign the name of
FCOCSP.FourthCoffee.Com to the NLB Cluster. Since I want clients to access the load
balancer and let the load balancer determine which OCSP Responder that the OCSP
Requests goes to, I must specify FCOCSP.FourthCoffee.Com in the OCSP URI.
DNS Configuration
As mentioned above, you will want OCSP clients to send the OCSP Requests to the Load
Balancer. This allows the Load Balancer to balance requests, this is especially important if one
of the OCSP Responders is offline. To ensure that clients can resolve the DNS name of the
cluster you will want to register the hostname in DNS.
To register the A record for the NLB cluster in DNS, perform the following steps:
Skip
Skip
Skip
toto
tofooter
primary
main navigation
content
content
1. Open up the DNS Manager MMC (dnsmgmt.msc)
2. Right click on the appropriate zone and select New Host (A or AAAA)… from
the context menu.
3. In the New Host dialogue box enter the hostname that will be used for the NLB
Cluster, and enter the appropriate IP address. You can provide additional
configuration such as Create associated (PTR) record if appropriate for your
environment.
Steps:
2. Configure the OCSP Responder that will become the Array Controller. For
guidance on deploying an OCSP Responder please see Part III and Part IV of this
series.
I will be covering the final two steps as the other steps are covered elsewhere in this Blog
Series.
3. You will then receive the Select Computer dialog box. Click on the Browse…
button.
4. Enter the name of the OCSP Responder that you wish to add, and click on the
Check Names button.
5. Once the computer name of the OCSP Responder has been resolved, click OK .
6. The Select Computer dialogue box will now be populated with FQDN of the
computer that is hosting the Online Responder, click OK .
7. You will then be prompted to confirm that you wish to add the array member.
This dialogue box will give you one last chance to abort before the configuration of
the OCSP Responder is overwritten with the configuration of the Array Controller.
Click Yes to continue.
8. To verify the configuration expand Array Configuration in the OCSP MMC and
Skip
Skip
Skip
toto
tofooter
primary
main navigation
content
content
select the name of the Responder that was just added. The Revocation
Configuration Status should be the same as illustrated in the figure below.
Note: If you are using a manually installed certificate, such as from a Standalone CA, you will
receive the error in the figure below.
To rectify this issue you will need to manually assign the certificate after it is installed in the
Local Machine Store. Expand Array Configuration , click on the name of the OCSP Server
that was just added to the Array, and Right click on the Revocation Configuration that will
be using a manually assigned signing certificate. Select Assign Signing Certificate from the
context menu.
You will then get the error listed below. This error simply indicates that the OCSP Responder
has not yet retrieved revocation information, so it can not verify that the configuration is
correct.
If you would like to clear this error, Right click on Array Configuration and select Refresh
Revocation Data.
Skip
Skip
Skip
toto
tofooter
primary
main navigation
content
content
Installing the Network Load Balancing Feature
Before you install and configure the NLB cluster, there are some key items you will need to
know ahead of time:
What is the IP address you are going to assign to the NLB cluster?
What DNS name you are going to associate with this cluster?
Before you can configure the NLB Cluster, you must first install the Network Load Balancing
feature on all of the OCSP Responders that will be a member of the NLB cluster.
To install the NLB feature, open a command prompt, and type ServerManagerCmd –
install NLB , as illustrated below.
1. Once the Network Load Balancing feature is installed, open the Network Load
Balancing Manager.
2. Select Cluster from the Menu Bar, and then select New . This will start the New
Cluster Wizard.
3. Enter the hostname of the first node and click Connect , then click Next .
4. This will open the Host Parameters page of the New Cluster Wizard. Accept the
defaults and click Next .
6. Here you will add the IP address and subnet mask of the Load Balancer. After
you enter the network information, click OK .
8. On the Cluster Parameters page add the FQDN of the cluster in the Full Internet
Name text box. Configure the Cluster Operation Mode as appropriate for your
environment. In this example I have selected Unicast .
Skip
Skip
Skip
toto
tofooter
primary
main navigation
content
content
Add Nodes to the cluster
For each node that you would like to add to the NLB cluster you will need to perform the
following steps.
2. On the Connect Page of the Wizard, enter the hostname of the node you wish to
add to the cluster and click Connect .
Conclusion
In this posting we covered implementing a highly available OCSP Responder. In the next
part of this series I will be covering how to configure clients to obtain revocation information
from an OCSP Responder that is not listed in the OCSP URI of the certificate.
1 Like
Comment
Surface Duo 2 Virtual workshops and training Educator training and development
Microsoft 365 Microsoft Store Promise Deals for students and parents
Sitemap Contact Microsoft Privacy Manage cookies Terms of use Trademarks Safety & eco About our ads © Microsoft 2023