IT tutorials
 
Technology
 

System Center Configuration Manager 2007 : PKI Management References (part 3) - Certificate Templates, Certificate Validation, Deploying Certificates

10/14/2013 9:08:00 PM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

4. Certificate Templates

Certificate templates do just what you would expect: They let the CA issue certificates preconfigured with specific settings or information. Windows Server 2003 supports version 1 and 2 certificate templates. Windows Server 2008 supports version 3, although ConfigMgr does not currently support this version. Certificates templates are stored in the configuration naming context in the following location:

CN=Certificate Templates,CN=Public Key Services,CN=Services,CN=Configuration, DC=ForestRootDomain


Version 1 certificate templates are only capable of having their permissions modified. Version 2 certificate templates allow you to create new templates by duplicating existing version 1 or 2 templates.

ConfigMgr requires the use of the following certificate templates:

  • Web Server

  • Computer or Workstation

  • Authenticated Session


5. Certificate Validation

Certificate validation guarantees that the information contained in the certificate is authentic, what the certificate is to be used for, and that the certificate is trusted. When you enable Certificate Revocation List checking, the Windows OS using the certificate validates each certificate in the chain until it reaches the CA.

CRL checking is the process of searching for revoked certificates on a server. The default setting for ConfigMgr in native mode is that the clients validate their certificate against the CRL. Although disabling CRL checking is not a best practice, some technologies offer scenarios where CRL checking may not be necessary or ideal. As an example, Windows mobile devices cannot perform CRL checking. You can disable CRL checking using one of two methods:

  • Configuring the setting as a site property

  • Using the /Native or /Native:FALLBACK switches with CCMSetup.exe at client installation time

Certificate validation also includes certificate discovery and path validation:

  • Certificate discovery is used to build or enumerate the certificate chain at the client while the issued certificate is being validated.

  • Path validation is the process of running checks against each certificate discovered in the chain until the root CA is reached.

These checks include verifying Authenticode signatures, determining if the issuing CA certificate is already in the certificate store, and checking for policy object identifiers.

6. Deploying Certificates

Once the PKI is built and the certificate templates are in place, ConfigMgr administrators can begin issuing certificates to sites, site systems, and clients. There are a number of ways to deploy the certificates to each.

Deploying to Site Servers

ConfigMgr site servers can obtain their certificates in one of five ways:

  • If Microsoft’s PKI is used, the ConfigMgr administrator can modify a version 2 template that can be requested online.

  • If Microsoft’s PKI with web enrollment is used, the certificate can be requested from the website of the CA. A template can be created with the necessary configuration, which can also be requested from the website.

  • If IIS is installed on the site server, site servers will always have one role available, because the certificate request can be initiated through IIS.

  • The certificate can be requested using the Microsoft Certreq command-line utility included with Windows 2000 Server, Windows XP, Windows Server 2003, and Windows Server 2008.

  • The certificate can be created using the certificate management tools and then imported on the site server.

Note: Site Server Signing Certificate

Every site in the Configuration Manager 2007 hierarchy configured for native mode requires that each site server have its own site server signing certificate. This includes a central site used for reporting that has no clients assigned to it.


Deploying to Site Systems

ConfigMgr site systems can obtain their certificates in a number of ways:

  • Using Microsoft’s PKI with an enterprise CA, you can create the certificates based off a version 2 template and assign them to the servers using group policy and auto-enrollment.

  • Using Microsoft’s PKI with web enrollment, the certificate can be requested from the website of the CA.

  • If IIS is installed on the site server, site servers will always have one role available, because the certificate request can be initiated through IIS.

  • The certificate can be requested using the Microsoft Certreq command-line utility included with Windows 2000 Server, Windows XP, Windows Server 2003, and Windows Server 2008.

  • The certificate can be created with the certificate management tools and then imported on to the site server.

Deploying to ConfigMgr Clients

ConfigMgr clients can obtain their certificates in one of three ways:

  • Automatically through Active Directory Domain Services.

  • Manually when the client is installed via ccmsetup.exe using the client.msi parameter SMSSIGNCERT with the path and filename of the exported certificate.

  • Automatically from the management point.

Certificate Auto-Enrollment

The process of certificate auto-enrollment handles certificate enrollment, certificate renewal, and certain other tasks, including removing revoked certificates and downloading trusted root CA certificates. Fortunately, Windows 2003 PKI extends certificate auto-enrollment for users to all certificate types.

Microsoft’s PKI uses certificate auto-enrollment in several ways:

  • Every Windows DC automatically receives a DC certificate when the machine joins a domain with an enterprise CA defined.

  • Administrators can use a group policy object (GPO) setting that automatically enrolls machines for IP security (IPSec) or SSL certificates.

  • An administrator can use a GPO setting that automatically enrolls several users.

  • A CA administrator who wants to change a property of a particular certificate type can duplicate the old certificate template to create a new certificate template and let the new template supersede the old one. Auto-enrollment then automatically distributes to the appropriate PKI users a new certificate based on the new template.

User and machine auto-enrollment requires that the machine and user be part of an AD domain.

 
Others
 
- System Center Configuration Manager 2007 : PKI Management References (part 2) - How SSL Works, Establishing a PKI
- System Center Configuration Manager 2007 : PKI Management References (part 1) - Cryptography Basics
- Administering an Exchange Server 2007 Environment : Using the Exchange Server 2007 Toolbox
- Administering an Exchange Server 2007 Environment : Journaling and Archiving
- Administering an Exchange Server 2007 Environment : Server Administration
- Sharepoint 2010 : Making Business Intelligence Work - Excel Services
- Sharepoint 2010 : Making Business Intelligence Work - Excel Services
- Sharepoint 2010 : Getting Started with Business Intelligence
- Windows Small Business Server 2011 : Advanced Email Configuration (part 3) - Adding an Additional Email Domain Name, Changing the Maximum Message Size
- Windows Small Business Server 2011 : Advanced Email Configuration (part 2) - Using Contacts - Adding a New Mail-Enabled Contact
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us