Configuring a CA for Autoenrollment in Win2K8.docx

上传人:b****6 文档编号:8559437 上传时间:2023-01-31 格式:DOCX 页数:15 大小:656.81KB
下载 相关 举报
Configuring a CA for Autoenrollment in Win2K8.docx_第1页
第1页 / 共15页
Configuring a CA for Autoenrollment in Win2K8.docx_第2页
第2页 / 共15页
Configuring a CA for Autoenrollment in Win2K8.docx_第3页
第3页 / 共15页
Configuring a CA for Autoenrollment in Win2K8.docx_第4页
第4页 / 共15页
Configuring a CA for Autoenrollment in Win2K8.docx_第5页
第5页 / 共15页
点击查看更多>>
下载资源
资源描述

Configuring a CA for Autoenrollment in Win2K8.docx

《Configuring a CA for Autoenrollment in Win2K8.docx》由会员分享,可在线阅读,更多相关《Configuring a CA for Autoenrollment in Win2K8.docx(15页珍藏版)》请在冰豆网上搜索。

Configuring a CA for Autoenrollment in Win2K8.docx

ConfiguringaCAforAutoenrollmentinWin2K8

 

ConfiguringaCAforAutoenrollmentinWin2K8

 

WeSoftwareLtd.

Suite335,1ScienceParkEastAvenue

HongKongSciencePark,Shatin,HongKong

Phone:

(852)31882929

Fax:

(852)31882939

CHINA.HONGKONG.USA

CopyrightNotice

2005WeSoftwareLtd.

ThisdocumentispreparedsolelyforWeSoftCentrifyTestingTeamtouseasreference.NopartofthisdocumentmaybereproducedorretransmittedinanyformorbyanymeanselectronicallyandmechanicallywithoutwrittenpermissionofWeSoft.

∙Filename:

PublicDomainEnvironmentsSetup

∙LastSaved:

2/10/20125:

14:

00PM

∙PrintedOn:

0/0/00000:

00:

00AM

ChangeControl

Thechangecontrolpagewillbeusedtorecordinformationforcontrollingandtrackingmodificationsmadetothisdocument.

Version

RevisionDatemm/dd/yy

Author(s)

SummaryofChange(s)

ApprovedBy

0.1

02/10/2012

CandyXue

1Introduction

ThisdocumentdescribeshowtoconfigureCAforAutoenrollmentinournewdomainenvironment.

Thisdocumentdescribeshowtosetupacertificateauthority(CA)thatenablesPKItobeusedbyDirectSecurity.AlongwiththeCA,configurationofcertificatetemplatesandautoenrollmentarealsodiscussed.YouwillalsoknowhowtoverifyCAandsomeTroubleshootingCertificateTemplatesfromthisdoc.

·Certificatetemplatesdefinethecontentandcharacteristicsofacertificate,andarestoredintheADconfigurationnamingcontext.TheyareusedtodefinethecertificatetypesaCAcanissue,andforsettingwhichuserscanenrolland/orautoenrollforwhichcertificatetypes.

Autoenrollmentisthecapabilitythatallowsusersandmachinestoautomaticallyenrollcertificates.Forourpurposes,weonlyfocusonmachineenrollment.TheautoenrollmentcapabilityisusedbyDirectSecure,suchthatwhenacomputerjoinsadomainviaadjoin,theappropriatecertificatesareautomaticallydownloadedtothecomputer,andcansubsequentlybeusedbyIKEwhenPKIischosenforauthenticationandencryption.

 

Theinstallation/configurationstepsaresummarizedasfollows:

1.InstallInternetInformationServices(IIS)onthehostwheretheCAwillbeinstalled

2.Installanenterprisecertificateserverforthedomain

3.Addtrustedrootcertificatetogrouppolicyobject

4.EnableautoenrollmentattheGPOlevel

5.Createanewcertificatetemplatewithautoenrollmentpermission.

6.Assign[new]certificatetemplatetoCAsoitcanissuecertificates

1.1InstallIIS

WhenCertificateServicesisinstalledonacomputerrunningIIS,thedefault(orprimary)WebsiteisupdatedsothatyoucanperformkeycertificatetasksusingtheHTTPprotocol.Thesetasksinclude

∙RetrievingCRLs

∙Requestingcertificates

∙Checkingonpendingcertificates

ComponentsofDirectSecuremakeuseoftheaboveoperationsduringitsoperationbymakingvariousHTTPrequests,hencethereasonwhyIISmustexist.Forexample,duringtheadgpupdateprocess,theCentrifyscriptcertgp.plwillmakearequesttotheIISservertoretrievetheCRLfortherootcertificatebeingused.ThescreenshotbelowshowstheservicesaddedtoIIS:

ToinstallIIS.ItispossibletoinstallbothIISandCertificateServicesatthesametime.Thiswilleffectivelytakecareofitemsinthissectionandthesectionbelow.ItishighlyrecommendedthatyouinstallIISeitheratthesametime,orbeforeCertificateServices.IfyouinstallIISafterCertificateServices,youwillhavetomanuallyperformtheseoperationsandthatwilladdtimeandcomplexitytoyoureffort.

OnyourWindowsServer,OpenSeverManagerandselectRoles->ClickAddRoles.ThiswillbringuptheAddRolesWizard.SelectApplicationServer[IIS]andCertificateServicesfromthelisttoinstall.

Thescreenshotbelowprovidesanexample.

ClickNextbuttontocontinuetheinstall,choosetheoptiononRoleServicesasbelow.

 

1.2InstallanEnterpriseCertificateServer(CA)

InstallingaCAinEnterprisemodeprovidesfullintegrationwithActiveDirectory.Thismeans,amongotherthings,thattheCAwillusethecertificatetemplatesstoredintheADconfigurationnamingcontext.Sincethisscenariowillprovideasingle,rootCA,thisneedtobeanenterprisemodeinstallation.

Followup1.1sectionstoinstallaEnterpriserootCA.

AtthescreentochoosetheCAType,alistofoptionswillbepresent.ChoosetheEnterpriserootCAoption.Ifthisoptionisnotavailable,youdonothavethecorrectpermissions.Stopthisoperationandloginusinganaccountthathastheappropriatepermissions.

ThenextscreenallowsforthenamingoftheCA.Onecanalsosetthevalidityperiod(defaultis5years),anddistinguishednamesuffix.Don'tmodifytheDNsuffixunlessyoureallyknowwhatyouaredoing(andeventhen,don'tdoit).

Thenext2screensfocusonwherethecertificatedatabaseiscreated.Thereisn'tanyreasontochangethesevalues(note:

thefirstdialogwilldisplayquickly,thendisplaythenextdialog).AtthispointaprivatekeyforthisCAwillalsobegenerated.

Configurationofcomponentsthenhappens.Thiswilltakeafewminutes.

 

1.3AddRootCACertificateasaTrustAnchor

AftertheinstallationoftherootCA,itscertificatewillneedtobeaddedtothegrouppolicyobjectwheretheipsecpoliciesaredefined.Doingthisenablesthecertificatetobedownloadedtoanymachinethatjoinsthedomain.

OpenuptheCertificatessnap-in(mmc->add/removesnapin->Certificates->Add->Computeraccount->Localcomputer->Finish),andnavigatetotheTrustedRootCertificationAuthorities->Enterprise->Certificatescontainer.InthiscontainerwillbearootcertificatethatwasgeneratedduringtheCAinstallationprocess.Double-clickonthiscertificateanditwillbringupadialogboxwhereyoucanviewthecertificatedetails.

Note:

TheEnterprisecontainerwillbeshownwhencheckingoptions“Physicalcertificatestores”and“Archivedcertificates”byclickingTrustedRootCertificationAuthoritiesnode->MenubarView->Option.

FromtheDetailstab,choosetheCopytoFilebutton.ThiswillstarttheCertificateExportWizardwhichwillguideyouthroughtheprocessofsavingthecertificatetoafile.Whenitaskswhethertosavetheprivatekey,chooseNo.TheformatoftheexportedfileshouldbeDERencodedbinaryX.509(.CER)(thiswillmostlikelybethedefaultselection).Savethecertificatetoafile.

AtthispointtheGroupPolicyEditorshouldbeinvoked(easiestwayistogotoADUC->right-clickdomain->properties->GroupPolicytab->edit).FromwithintheADconfigurationnamingcontext,opentheWindowsSettings->SecuritySettings->PublicKeyPolicies->TrustedRootCertificationAuthoritiescontainer.Right-clickonthiscontainerobjects,andselectsImport.FollowtheinstructionsandimporttherootcertificateintotheGPO.

1.4AddAutoenrollmentattheGPOLevel

Certificateenrollmentenablesauser,machine,orservicetoparticipateinandusePKI-enabledapplications.EnrollmentcanalsobeinitiatedautomaticallyformachineaccountsthatarepartofaWindowsdomainenvironment.Thisfeatureisknownascertificateautoenrollment.Itnotonlyhandlescertificateenrollment,butalsoautomatescertificaterenewalandcertainhousekeepingtasks,suchasremovingrevokedcertificatesfromamachine'scertificatestore.

Forwindowsmachines,itispossibletoenableautoenrollmentattheGPOlevel.Todothis,opentheGroupPolicysnap-in,gototheWindowsSettings->SecuritySettings->PublicKeyPoliciescontainer,andopentheCertificateServicesClient-AutoenrollmentSettingsPropertiesdialogbox.Checkthe"Enrollcertfiicatesautomatically"andcheckthe"Updatecertificatesthatusecertificatetemplates"checkbox.Thisisshowninthepicturebelow:

You'llnotethatthisisforautoenrollmentofWindowsbasedmachines.DirectSecurewillusethevariousattributessupportedbytheautoenrollmentfeaturetodeterminewhichcertificatesneedtoberequested,byevaluatingthecertificatetemplateswhenacomputerjoinsadomain.

1.5Createanewcertificatetemplatewithautoenrollmentpermission

OpentheCertificateTemplatessnap-in,andselectatemplatefromthelist(e.g.chooseWorkstationAuthentication).MakesureitminimallysupportsWindowsServer2003,EnterpriseEdition.RightclicktoopenthepopupmenuandchooseDuplicateTemplate.ThediagrambelowshowswhattheCertificateTemplatessnap-inlookslike,withthenewtemplatecalledNewCATemplate.

Oncethe"DuplicateTemplate"operationisselected,apropertiesdialogboxwillbedisplayed,whichallowsyoutomodifythecontentsofthetemplate.Forourpurposes,wewillfocuson3items.Youcanchangeotherinformationofthetemplate,suchasexpirationdates,etc.Butitisnotnecessary.Thedescribedstepswillcreateanewcertificatetemplatethatsupportsautoenrollment:

FromtheGeneraltab,fillintheTemplateDisplayNamewithavalue-suchas"CentrifyIPsecTemp"

FromtheSecuritytab,selectDomainComputers,andtheninthelowerbox,selecttheallowcheckboxfortheautoenrollpermission.

FromtheExtensionstab,selectApplicationPolicies.MakesureClientAuthenticationandServerAuthenticationpoliciesareincluded.IfyouchosetoduplicatetheWorkstationAuthenticationTemplate,youwillneedtoaddServerauthentication.

Applicationpoliciesgivetheabilitytodecidewhichcertificatescanbeusedforcertainpurposes.Applicationpoliciesaresettingsthatinformatargetthatthesubjectholdsacertificatethatcanbeusedtoperformaspecifictask.Theyare

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 党团工作 > 入党转正申请

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1