Configuring a CA for Autoenrollment in Win2K8文档格式.docx

上传人:b****6 文档编号:21695667 上传时间:2023-01-31 格式:DOCX 页数:15 大小:656.81KB
下载 相关 举报
Configuring a CA for Autoenrollment in Win2K8文档格式.docx_第1页
第1页 / 共15页
Configuring a CA for Autoenrollment in Win2K8文档格式.docx_第2页
第2页 / 共15页
Configuring a CA for Autoenrollment in Win2K8文档格式.docx_第3页
第3页 / 共15页
Configuring a CA for Autoenrollment in Win2K8文档格式.docx_第4页
第4页 / 共15页
Configuring a CA for Autoenrollment in Win2K8文档格式.docx_第5页
第5页 / 共15页
点击查看更多>>
下载资源
资源描述

Configuring a CA for Autoenrollment in Win2K8文档格式.docx

《Configuring a CA for Autoenrollment in Win2K8文档格式.docx》由会员分享,可在线阅读,更多相关《Configuring a CA for Autoenrollment in Win2K8文档格式.docx(15页珍藏版)》请在冰豆网上搜索。

Configuring a CA for Autoenrollment in Win2K8文档格式.docx

CopyrightNotice

2005WeSoftwareLtd.

ThisdocumentispreparedsolelyforWeSoftCentrifyTestingTeamtouseasreference.NopartofthisdocumentmaybereproducedorretransmittedinanyformorbyanymeanselectronicallyandmechanicallywithoutwrittenpermissionofWeSoft.

∙Filename:

PublicDomainEnvironmentsSetup

∙LastSaved:

2/10/20125:

14:

00PM

∙PrintedOn:

0/0/00000:

00:

00AM

ChangeControl

Thechangecontrolpagewillbeusedtorecordinformationforcontrollingandtrackingmodificationsmadetothisdocument.

Version

RevisionDatemm/dd/yy

Author(s)

SummaryofChange(s)

ApprovedBy

0.1

02/10/2012

CandyXue

1Introduction

ThisdocumentdescribeshowtoconfigureCAforAutoenrollmentinournewdomainenvironment.

Thisdocumentdescribeshowtosetupacertificateauthority(CA)thatenablesPKItobeusedbyDirectSecurity.AlongwiththeCA,configurationofcertificatetemplatesandautoenrollmentarealsodiscussed.YouwillalsoknowhowtoverifyCAandsomeTroubleshootingCertificateTemplatesfromthisdoc.

·

Certificatetemplatesdefinethecontentandcharacteristicsofacertificate,andarestoredintheADconfigurationnamingcontext.TheyareusedtodefinethecertificatetypesaCAcanissue,andforsettingwhichuserscanenrolland/orautoenrollforwhichcertificatetypes.

Autoenrollmentisthecapabilitythatallowsusersandmachinestoautomaticallyenrollcertificates.Forourpurposes,weonlyfocusonmachineenrollment.TheautoenrollmentcapabilityisusedbyDirectSecure,suchthatwhenacomputerjoinsadomainviaadjoin,theappropriatecertificatesareautomaticallydownloadedtothecomputer,andcansubsequentlybeusedbyIKEwhenPKIischosenforauthenticationandencryption.

Theinstallation/configurationstepsaresummarizedasfollows:

1.InstallInternetInformationServices(IIS)onthehostwheretheCAwillbeinstalled

2.Installanenterprisecertificateserverforthedomain

3.Addtrustedrootcertificatetogrouppolicyobject

4.EnableautoenrollmentattheGPOlevel

5.Createanewcertificatetemplatewithautoenrollmentpermission.

6.Assign[new]certificatetemplatetoCAsoitcanissuecertificates

1.1InstallIIS

WhenCertificateServicesisinstalledonacomputerrunningIIS,thedefault(orprimary)WebsiteisupdatedsothatyoucanperformkeycertificatetasksusingtheHTTPprotocol.Thesetasksinclude

∙RetrievingCRLs

∙Requestingcertificates

∙Checkingonpendingcertificates

ComponentsofDirectSecuremakeuseoftheaboveoperationsduringitsoperationbymakingvariousHTTPrequests,hencethereasonwhyIISmustexist.Forexample,duringtheadgpupdateprocess,theCentrifyscriptcertgp.plwillmakearequesttotheIISservertoretrievetheCRLfortherootcertificatebeingused.ThescreenshotbelowshowstheservicesaddedtoIIS:

ToinstallIIS.ItispossibletoinstallbothIISandCertificateServicesatthesametime.Thiswilleffectivelytakecareofitemsinthissectionandthesectionbelow.ItishighlyrecommendedthatyouinstallIISeitheratthesametime,orbeforeCertificateServices.IfyouinstallIISafterCertificateServices,youwillhavetomanuallyperformtheseoperationsandthatwilladdtimeandcomplexitytoyoureffort.

OnyourWindowsServer,OpenSeverManagerandselectRoles->

ClickAddRoles.ThiswillbringuptheAddRolesWizard.SelectApplicationServer[IIS]andCertificateServicesfromthelisttoinstall.

Thescreenshotbelowprovidesanexample.

ClickNextbuttontocontinuetheinstall,choosetheoptiononRoleServicesasbelow.

1.2InstallanEnterpriseCertificateServer(CA)

InstallingaCAinEnterprisemodeprovidesfullintegrationwithActiveDirectory.Thismeans,amongotherthings,thattheCAwillusethecertificatetemplatesstoredintheADconfigurationnamingcontext.Sincethisscenariowillprovideasingle,rootCA,thisneedtobeanenterprisemodeinstallation.

Followup1.1sectionstoinstallaEnterpriserootCA.

AtthescreentochoosetheCAType,alistofoptionswillbepresent.ChoosetheEnterpriserootCAoption.Ifthisoptionisnotavailable,youdonothavethecorrectpermissions.Stopthisoperationandloginusinganaccountthathastheappropriatepermissions.

ThenextscreenallowsforthenamingoftheCA.Onecanalsosetthevalidityperiod(defaultis5years),anddistinguishednamesuffix.Don'

tmodifytheDNsuffixunlessyoureallyknowwhatyouaredoing(andeventhen,don'

tdoit).

Thenext2screensfocusonwherethecertificatedatabaseiscreated.Thereisn'

tanyreasontochangethesevalues(note:

thefirstdialogwilldisplayquickly,thendisplaythenextdialog).AtthispointaprivatekeyforthisCAwillalsobegenerated.

Configurationofcomponentsthenhappens.Thiswilltakeafewminutes.

1.3AddRootCACertificateasaTrustAnchor

AftertheinstallationoftherootCA,itscertificatewillneedtobeaddedtothegrouppolicyobjectwheretheipsecpoliciesaredefined.Doingthisenablesthecertificatetobedownloadedtoanymachinethatjoinsthedomain.

OpenuptheCertificatessnap-in(mmc->

add/removesnapin->

Certificates->

Add->

Computeraccount->

Localcomputer->

Finish),andnavigatetotheTrustedRootCertificationAuthorities->

Enterprise->

Certificatescontainer.InthiscontainerwillbearootcertificatethatwasgeneratedduringtheCAinstallationprocess.Double-clickonthiscertificateanditwillbringupadialogboxwhereyoucanviewthecertificatedetails.

Note:

TheEnterprisecontainerwillbeshownwhencheckingoptions“Physicalcertificatestores”and“Archivedcertificates”byclickingTrustedRootCertificationAuthoritiesnode->

MenubarView->

Option.

FromtheDetailstab,choosetheCopytoFilebutton.ThiswillstarttheCertificateExportWizardwhichwillguideyouthroughtheprocessofsavingthecertificatetoafile.Whenitaskswhethertosavetheprivatekey,chooseNo.TheformatoftheexportedfileshouldbeDERencodedbinaryX.509(.CER)(thiswillmostlikelybethedefaultselection).Savethecertificatetoafile.

AtthispointtheGroupPolicyEditorshouldbeinvoked(easiestwayistogotoADUC->

right-clickdomain->

properties->

GroupPolicytab->

edit).FromwithintheADconfigurationnamingcontext,opentheWindowsSettings->

SecuritySettings->

PublicKeyPolicies->

TrustedRootCertificationAuthoritiescontainer.Right-clickonthiscontainerobjects,andselectsImport.FollowtheinstructionsandimporttherootcertificateintotheGPO.

1.4AddAutoenrollmentattheGPOLevel

Certificateenrollmentenablesauser,machine,orservicetoparticipateinandusePKI-enabledapplications.EnrollmentcanalsobeinitiatedautomaticallyformachineaccountsthatarepartofaWindowsdomainenvironment.Thisfeatureisknownascertificateautoenrollment.Itnotonlyhandlescertificateenrollment,butalsoautomatescertificaterenewalandcertainhousekeepingtasks,suchasremovingrevokedcertificatesfromamachine'

scertificatestore.

Forwindowsmachines,itispossibletoenableautoenrollmentattheGPOlevel.Todothis,opentheGroupPolicysnap-in,gototheWindowsSettings->

PublicKeyPoliciescontainer,andopentheCertificateServicesClient-AutoenrollmentSettingsPropertiesdialogbox.Checkthe"

Enrollcertfiicatesautomatically"

andcheckthe"

Updatecertificatesthatusecertificatetemplates"

checkbox.Thisisshowninthepicturebelow:

You'

llnotethatthisisforautoenrollmentofWindowsbasedmachines.DirectSecurewillusethevariousattributessupportedbytheautoenrollmentfeaturetodeterminewhichcertificatesneedtoberequested,byevaluatingthecertificatetemplateswhenacomputerjoinsadomain.

1.5Createanewcertificatetemplatewithautoenrollmentpermission

OpentheCertificateTemplatessnap-in,andselectatemplatefromthelist(e.g.chooseWorkstationAuthentication).MakesureitminimallysupportsWindowsServer2003,EnterpriseEdition.RightclicktoopenthepopupmenuandchooseDuplicateTemplate.ThediagrambelowshowswhattheCertificateTemplatessnap-inlookslike,withthenewtemplatecalledNewCATemplate.

Oncethe"

DuplicateTemplate"

operationisselected,apropertiesdialogboxwillbedisplayed,whichallowsyoutomodifythecontentsofthetemplate.Forourpurposes,wewillfocuson3items.Youcanchangeotherinformationofthetemplate,suchasexpirationdates,etc.Butitisnotnecessary.Thedescribedstepswillcreateanewcertificatetemplatethatsupportsautoenrollment:

FromtheGeneraltab,fillintheTemplateDisplayNamewithavalue-suchas"

CentrifyIPsecTemp"

FromtheSecuritytab,selectDomainComputers,andtheninthelowerbox,selecttheallowcheckboxfortheautoenrollpermission.

FromtheExtensionstab,selectApplicationPolicies.MakesureClientAuthenticationandServerAuthenticationpoliciesareincluded.IfyouchosetoduplicatetheWorkstationAuthenticationTemplate,youwillneedtoaddServerauthentication.

Applicationpoliciesgivetheabilitytodecidewhichcertificatescanbeusedforcertainpurposes.Applicationpoliciesaresettingsthatinformatargetthatthesubjectholdsacertificatethatcanbeusedtoperformaspecifictask.Theyare

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 法律文书 > 起诉状

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1