{"id":1212,"date":"2013-12-11T11:35:46","date_gmt":"2013-12-11T17:35:46","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=1212"},"modified":"2015-04-24T16:52:10","modified_gmt":"2015-04-24T21:52:10","slug":"part-2-how-to-configure-a-public-key-infrastructure-on-a-windows-server","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/part-2-how-to-configure-a-public-key-infrastructure-on-a-windows-server\/","title":{"rendered":"Configuring a Public Key Infrastructure-Pt. 2"},"content":{"rendered":"<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: trebuchet ms,helvetica,sans-serif;\"><em><span style=\"color:#FF0000;\">Part 2, Continued from \"<\/span><a href=\"\/blog\/how-to-configure-a-public-key-infrastructure-on-a-windows-server-part-1\/\" target=\"_self\"><span style=\"color:#FF0000;\">How to Configure a Public Key Infrastructure on a Windows Server \u2013 Part 1<\/span><\/a><span style=\"color:#FF0000;\">\"<\/span><\/em><\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: trebuchet ms,helvetica,sans-serif;\"><em>Enable<\/em> the policy and check the <em>Renew expired certificates, update pending certificates and remove revoked certificates<\/em> and <em>update certificates that use certificate templates<\/em> check-boxes:<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Services-Client-Auto-Enrollment.png\" rel=\"\" style=\"\" target=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Certificate Services Client Auto-Enrollment\" class=\"alignnone size-full wp-image-1202\" height=\"448\" src=\"\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Services-Client-Auto-Enrollment.png\" style=\"\" title=\"Certificate Services Client Auto-Enrollment\" width=\"403\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Services-Client-Auto-Enrollment.png 403w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Services-Client-Auto-Enrollment-269x300.png 269w\" sizes=\"auto, (max-width: 403px) 100vw, 403px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: trebuchet ms,helvetica,sans-serif;\">Now we have to configure certificate templates for auto-enrollment. Open the <em>Certification Authority <\/em>console, navigate to the <em>Certificate Templates <\/em>section, <em>right click <\/em>and select <em>Manage<\/em>:<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Authority-Templates.png\"><img loading=\"lazy\" decoding=\"async\" alt=\"Certificate Authority Templates\" class=\"alignnone size-full wp-image-1203\" height=\"465\" src=\"\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Authority-Templates.png\" width=\"1024\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Authority-Templates.png 1024w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Authority-Templates-300x136.png 300w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/a>\n<\/p>\n<p align=\"center\">\n\t\u00a0\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: trebuchet ms,helvetica,sans-serif;\">From the <em>Certificate Template<\/em> section right click the <em>Computer <\/em>template and select <em>Properties:<\/em><\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Templates-Console-Properties.png\"><img loading=\"lazy\" decoding=\"async\" alt=\"Certificate Templates Console Properties\" class=\"alignnone size-full wp-image-1204\" height=\"349\" src=\"\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Templates-Console-Properties.png\" width=\"957\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Templates-Console-Properties.png 957w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Certificate-Templates-Console-Properties-300x109.png 300w\" sizes=\"auto, (max-width: 957px) 100vw, 957px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: trebuchet ms,helvetica,sans-serif;\">Navigate to the <em>Security<\/em> tab and add the users or security groups that will be able to enroll these certificate types. I\u2019ve added the <em>Domain Users<\/em> group and set the <em>Read<\/em> and <em>Enroll <\/em>permissions:<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/12\/Domain-Users-Group-Permissions.png\"><img loading=\"lazy\" decoding=\"async\" alt=\"Domain Users Group Permissions\" class=\"alignnone size-full wp-image-1205\" height=\"446\" src=\"\/blog\/wp-content\/uploads\/2013\/12\/Domain-Users-Group-Permissions.png\" width=\"403\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Domain-Users-Group-Permissions.png 403w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Domain-Users-Group-Permissions-271x300.png 271w\" sizes=\"auto, (max-width: 403px) 100vw, 403px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: trebuchet ms,helvetica,sans-serif;\">We\u2019ve finished the CA auto-enrollment configuration. Remember that all wireless clients must trust this CA in order to request and renew certificates. Because we\u2019ve deployed the PKI within our Active Directory Domain, all machines will receive a certificate for the CA in the Trusted Root Certification Authorities:<\/span><\/span>\n<\/p>\n<p align=\"center\">\n\t<a href=\"\/blog\/wp-content\/uploads\/2013\/12\/Trusted-Root-Certification-Authorities.png\"><img loading=\"lazy\" decoding=\"async\" alt=\"Trusted Root Certification Authorities\" class=\"alignnone size-full wp-image-1206\" height=\"523\" src=\"\/blog\/wp-content\/uploads\/2013\/12\/Trusted-Root-Certification-Authorities.png\" width=\"767\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Trusted-Root-Certification-Authorities.png 767w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/12\/Trusted-Root-Certification-Authorities-300x204.png 300w\" sizes=\"auto, (max-width: 767px) 100vw, 767px\"><\/a>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: trebuchet ms,helvetica,sans-serif;\">After configuring the CA, you\u2019ll need to configure the RADIUS server for this authentication type and all your wireless computers will be able to authenticate using certificates.<\/span><\/span>\n<\/p>\n<p>\n\t<span style=\"font-size:16px;\"><span style=\"font-family: trebuchet ms,helvetica,sans-serif;\">That\u2019s it for this article folks, hope you\u2019ve enjoyed it. If any of this is unclear, please post any questions and we will respond as soon as possible. Don\u2019t forget to rate this article and share it to others. Enjoy your day and stay tuned for following articles.<\/span><\/span>\n<\/p>\n<p>\n\t\u00a0\n<\/p>\n<p>\n\t<a href=\"http:\/\/www.twitter.com\/home?status=RT:%20@poweradmn%20How%20to%20Configure%20a%20Public%20Key%20Infrastructure%20on%20a%20Windows%20Server%20Part%201%20\/blog\/how-to-configure-a-public-key-infrastructure-on-a-windows-server-part-1\/?ref=blog\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Tweet this\" class=\"aligncenter size-medium wp-image-1028\" height=\"75\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png\" style=\"\" title=\"\" width=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>\n<\/p>\n<p>\n\t<a href=\"https:\/\/plus.google.com\/share?url={\/blog\/how-to-configure-a-public-key-infrastructure-on-a-windows-server-part-1\/?ref=blog}\" rel=\"nofollow\" style=\"\" target=\"_blank\" title=\"\"><img loading=\"lazy\" decoding=\"async\" alt=\"Share on Google+\" class=\"aligncenter size-medium wp-image-1053\" height=\"75\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png\" style=\"\" title=\"\" width=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Part 2, Continued from &#8220;How to Configure a Public Key Infrastructure on a Windows Server \u2013 Part 1&#8221; Enable the policy and check the Renew expired certificates, update pending certificates and remove revoked certificates and update certificates that use certificate templates check-boxes: Now we have to configure certificate templates for auto-enrollment. Open the Certification Authority [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,13,9,8],"tags":[],"class_list":["post-1212","post","type-post","status-publish","format-standard","hentry","category-how-to","category-pc-security","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=1212"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1212\/revisions"}],"predecessor-version":[{"id":3551,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/1212\/revisions\/3551"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=1212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=1212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=1212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}