IT tutorials
 
Applications Server
 

Active Directory 2008 : Configuring Active Directory Certificate Services (part 1)

1/7/2014 8:24:12 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

1. Understanding Server Manager

Windows Server 2008 combines many of these tools in a new Microsoft Management Console (MMC) snap-in called Server Manager. With Server Manager, an administrator can view the server configuration and installed roles. Server Manager also includes links for adding and removing features and roles (see Figure 1).

Server Manager is your one-stop shopping MMC snap-in. By that, I mean that you can take care of all your server management needs in one easy interface.

  • Active Directory Certificate Services

  • Active Directory Domain Services

  • Active Directory Federation Services

  • Active Directory Lightweight Directory Services

  • Active Directory Rights Management Services

Figure 1. Server Manager showing Windows Server 2008 server roles

2. Configuring Active Directory Certificate Services

Using Active Directory Certificate Services (AD CS), administrators configure public key certificate services. AD CS security allows a private key to be combined with objects (such as users and computers), devices (such as routers), or services. The public-key infrastructure greatly increases data security.

In Windows Server 2008, AD CS provides services for creating and managing public key certificates used in software security systems that employ public key technologies. Organizations can use AD CS to enhance security by binding the identity of a user, device, or service to a corresponding private key. AD CS also includes features that allow you to manage certificate enrollment and revocation in a variety of environments.

Think of a digital certificate as a carrying case for a public key. A certificate contains the public key and a set of attributes, like the key holder's name and email address. These attributes specify something about the holder: their identity, what they're allowed to do with the certificate, and so on. The attributes and the public key are bound together because the certificate is digitally signed by the entity that issued it. Anyone who wants to verify the certificate's contents can verify the issuer's signature.

Certificates are one part of what security experts call a public-key infrastructure (PKI). A PKI has several different components that you can mix and match to achieve the desired results.

Applications supported by AD CS include Secure/Multipurpose Internet Mail Extensions (S/MIME), secure wireless networks, Virtual Private Networks (VPN), IP security (IPsec), Encrypting File System (EFS), smart card logon, Secure Socket Layer/Transport Layer Security (SSL/TLS), and digital signatures.

The following are some of the AD CS components:


Cert Publishers group

Certificates are used to increase security by allowing for strong authentication methods. User accounts are placed within the Cert Publishers group if they need to be able to publish security certificates. Generally, these accounts are used by Active Directory security services.


PKI-savvy applications

These applications allow you and your users to do useful things with certificates, like encrypt email or network connections. Ideally, the user shouldn't have to know (or even necessarily be aware) of what the application is doing—everything should work seamlessly and automatically. The best-known examples of PKI-savvy applications are web browsers like Internet Explorer and Firefox and email applications like Outlook and Outlook Express.


Certificate templates

Certificate templates act like rubber stamps: By specifying a particular template as the model you want to use for a newly issued certificate, you're actually telling the CA which optional attributes to add to the certificate, as well as implicitly telling it how to fill in some of the mandatory attributes. Templates greatly simplify the process of issuing certificates because they keep you from having to memorize the names of all the attributes you might potentially want to put in a certificate. In Windows Server 2008, multiple templates are available and you also have the ability to secure templates using template permissions.


Online Responder service

Some applications—including S/MIME, SSL, EFS, and smart cards—need to validate the status of certificates. The Online Responder service authoritatively responds to such requests.


Certification practice statement

A Certification practice statement (CPS) is a statement that is issued by a certificate creator. It represents the creator's practices for issuing and validating certificates. The CPS represents the technical, procedural, and personnel policies and practices of the issuing certification authority (CA) organization.


Enrollment agents

Enrollment agents are administrators who have the ability to enroll users into the certificate services program. Enrollment agents can issue and manage certificate requests.


Network device enrollment service (NDES)

Network devices such as routers do not have accounts in the Active Directory Domain. The NDES allows such network devices to obtain certificates.


Web enrollment

With web enrollment, users can easily request certificates and retrieve certificate revocation lists (CRLs) through a web browser.

2.1. Installing Active Directory Certificate Services

When you are installing AD CS, the installation wizard will walk you through the installation process, and you will need to answer some configuration questions. If at any time during installation you do not know how to configure an option, you can click on the help link for explanations. Here are some of the AD CS options that you can configure during the installation:


Certificate authorities (CAs)

Certificate authorities issue, revoke, and publish certificates for their clients; big CAs like Thawte and VeriSign may do this for millions of users. You can also set up your own CA for each department or workgroup in your organization if you want.

Each CA is responsible for choosing what attributes it will include in a certificate and what mechanism it will use to verify those attributes before it issues the certificate.

There are three types of CA:

  • Enterprise Root CAs (automatically integrated with Active Directory) are the most trusted CAs of the hierarchy. They hold the certificates that you issue to the users within your organization.

  • Stand-Alone Root CAs hold the CAs that you issue to Internet users.

  • Subordinate CAs are below the Enterprise and Stand Alone Root CAs in the hierarchy. The Enterprise or Stand Alone Root CAs give certificates to the Subordinate CAs, which in turn issue certificates to objects and services.


Cryptographic service provider (CSP)

The CSP is the mechanism that is responsible for authentication, encoding, and encryption services that Windows-based applications access through the Microsoft Cryptography application programming interface (CryptoAPI). Every CSP offers a unique implementation of the CryptoAPI. Some CSPs offer a strong cryptographic algorithm, while others use hardware components, such as smart cards.


Hash algorithm

An algorithm that produces a hash value of some piece of data, such as a message or session key, is called a hash algorithm. If you use a well-designed hash algorithm, the hash value changes when the data changes. Due to this characteristic, hash values are useful when you are trying to detect whether any modifications have been made to data (such as a message). Also, a well-designed hash algorithm makes it almost impossible for two independent inputs that have the same hash value.

Exercise 1 will show you the steps you need to follow to install the AD CS server.

Exercise 1: Installing Active Directory Certificate Services

  1. Open the Server Manager MMC by selecting Start => Administrative Tools => Server Manager.

  2. Under Roles Summary, click the link labeled Add Role.

  3. On the Select Server Roles screen, check the box next to Active Directory Certificate Services and click Next to continue.



  4. At the Active Directory Certificate Services (AD CS) screen, read the explanation of AD CS, then click Next.



  5. At the Select Role Services screen, make sure the Certificate Authority and Certificate Authority Web Enrollment boxes are both checked.



  6. When you check the Certificate Authority Web Enrollment box, the Add Roles Wizard may appear, stating that you need to install supporting services. If you see this wizard, click the Add Required Role Services button. Otherwise go on to step 7.



  7. Once both check boxes are checked on the Select Role Services screen, click Next.

  8. At the Specify Setup Type screen, choose Enterprise (Recommended) and click Next.



  9. The Specify CA Type screen appears. This is where you decide what type of CA you will use. If you have only one CA or this is the first CA, choose Root CA (Recommended). If you are going to receive your certificates from a higher CA (either your own root or a third-party company) choose Subordinate CA. Click Next.



  10. At the Set Up Private Key screen, choose Create A New Private Key, then click Next.

    This option allows you to create a new key for our certificate server. You would choose Use Existing Private Key if you were reinstalling or using previously issued keys.



  11. When the Configure Cryptography For CA screen appears, you must select a CSP. Choose RSA#Microsoft Software Key Storage Provider. Make sure that the Key Character Length is 2048 and choose sha1 for the hash algorithm. Click Next.



  12. At the Configure CA Name screen, accept the defaults and click Next. The common name is the general name that is used to help identify the CA and the common name is also added to all issued certificates.



  13. At the Set The Certificate Validity Period screen, change the default to 1 Years and click Next.



  14. The Configure Certificate Database screen will prompt you to enter the storage location for your database files. Accept the defaults and click Next.

  15. The Web Server IIS screen appears. This is an informational screen. Click Next.

  16. At the Select Role Services screen, click Next. These are all the services you need to install IIS so it works with the certificate server.



  17. At the Confirm Installation Selections screen, you will see a warning message stating that the name of this server must remain unchanged for the certificate server to continue to run properly. Click Install.



  18. At the Installation Results screen, you will see the status of the installation. You should see an Installation Succeeded message. Click Close and exit the Server Manager.



 
Others
 
- Active Directory 2008 : Monitoring and Troubleshooting Active Directory Replication
- Sharepoint 2013 : Organizing and managing information - Associating document templates with content types
- Sharepoint 2013 : Organizing and managing information - Creating a new content type
- Architecting an Enterprise-Level Exchange Server 2013 Environment (part 3) - Designing Exchange Server Infrastructure
- Architecting an Enterprise-Level Exchange Server 2013 Environment (part 2) - Designing Exchange Server Roles in an Exchange Server Environment
- Architecting an Enterprise-Level Exchange Server 2013 Environment (part 1) - Designing Active Directory for Exchange Server 2013
- Sharepoint 2013 : Organizing and managing information - Browsing through content types
- Sharepoint 2013 : Organizing and managing information - Creating site columns
- Sharepoint 2013 : Organizing and managing information - Browsing through site columns
- Active Directory 2008 : Configuring Replication (part 5) - Configuring Server Topology
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us