Setup vmlab.local (12)

       
 

(PKI) Public Key Infrastructure Server Deployment

Reference URL: http://blogs.technet.com/b/yungchou/archive/2013/10/21/enterprise-pki-with-windows-server-2012-r2-active-directory-certificate-services-part-1-of-2.aspx

  1. Build out a standalone Root CA host
  2. Deploy Root CA host from Server 2012 R2 Template


  3. Set IP


Add AD CS Roles

  1. Add roles and Features > Role-based or feature-based installation>local server>Select Active Directory Certificate Services (AD CS)


  2. Certification Authority Role


  3. Check Restart automatically if required option and install


Configure CA

  1. Click Configure Active Directory Certificates Services on the destination server link


  2. Next


  3. Check on Certification Authority and Next


  4. Select Standalone CA


  5. Select Root CA


  6. Select Create a new private key


  7. Select RSA#Microsoft Software Key Storage Provider with 4096 key length, and SHA1 Hash Algorithm


  8. Remove Distinguished name suffix


  9. Set Validity Period for 5 years as default


  10. Next


  11. Configure after reviewing the settings



  12. On Server Manager>AD CS>Right Click on Root CA and Select Certificate Authority


  13. Expand vmlab-RootCA-CA> and Right click on Revoked Certificates>All Tasks>Publish


  14. New CRL


  15. Open Run>MMC> Add Certificates Snap-in > Computer Account>Local computer


         
     


         
     


  16. Browse to Certificates>Personal>Certificates, and Export


         
     


  17. Select No export the private key


  18. Keep it as default


  19. Create a folder named to RootCA on C Drive and name to save as RootCA-vmlab


  20. Finish


         
     


  21. And open C:\Windows\system32\CertSrv\CertEnroll and copy all to C:\RootCA\ Folder


         
     


  22. Share C:\RootCA Directory


         
     


         
     


         
     

Install RootCA cert to SQLPKI1

  1. On SQLPKI1, browse to \\RootCA\RootCA\
  2. Install RootCA-vmlab.cer


  3. Select local machine


  4. Next


  5. OK


Configure Subordinate CA on SQLPKI1

  1. On SQLPKI1, Add ADCS Role


  2. Select Certificate Authority and Certificate Authority Web Enrollment


  3. Add IIS Role Services as default as well





  4. Review and Install


  5. Click Configure AD CS on the destination Server


  6. Next


  7. Select both Certification Authority and Certification Authority Web Enrollment Services


  8. Select Enterprise CA


  9. Select Subordinate CA


  10. Select create a new private key


  11. Change the key length to 4096


  12. Next


  13. Select Save a Certificate request to file on the target machine as default and Next


  14. Next


  15. Confirm the settings and Configure


  16. Click Close and close


  17. Open Explorer and Map Network drive \\RootCA\Rootca


  18. Right click on RootCA-vmlab.cer file on the share drive and install Certificate


  19. Select Local Machine


  20. Place it to Trusted Root Certification Authorities


  21. Create a new folder and name it Certdata on C:\inetpub\wwwroot\
  22. From \\RootCA\RootCA, copy RootCA.vmlab.local_vmlab-ROOTCA-CA.crt and vmlab-ROOTCA-CA.crl files to c:\inetpub\wwwroot\Certdata


  23. Open Explorer and C:\ and Copy request cert to \\RootCA\RootCA share folder on RootCA.vmlab.local


Submit a subordinate CA’s Request to the Root CA

  1. On the RootCA server, open CA mmc and Right Click vmlab-RootCA-CA>All Tasks>Submit new request


  2. Select SQLPKI1.vmlab.local_vmlab-SQLPKI1-CA.req file


  3. Go to Pending Requests node and right click on the request file >All Tasks>Issue


  4. Go to Issued Certificates node, right click the issued cert and open


  5. Go to Details Tab> copy to File


  6. Select (.P7B) cert format and include path option


  7. Name it and save it to \\RootCA\RootCA share folder


  8. Per instruction, I opened the cert and checked all certs for establishing the trust


  9. Go back to SQLPKI1 host, and open CA mmc.
  10. Right Click on vmlab-SQLPKI1-CA>All Tasks>Install CA Certificate


  11. Browse to \\RootCA\RootCA share folder and open p7b cert file


  12. Click Start Button


  13. AD CS Service on SQLPKI1 is now started successfully


Create Distribute Root CA Policy and Apply to the domain

  1. Go to DC1, and Open Group Policy Management> right click on vmlab.local and Create a GPO in this domain

  2. Name it

  3. Right click on the new GPO and edit

  4. Browse to Computer Configuration>Policies>Windows Settings>Security Settings>Public Key Policies>Trusted Root Certification Authorities and right click import

  5. Select RootCA-vmlab.cer file from \\RootCA\Rootca network share

  6. Next

  7. Finished