{"id":2805,"date":"2014-10-20T08:15:19","date_gmt":"2014-10-20T13:15:19","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=2805"},"modified":"2015-04-24T14:58:18","modified_gmt":"2015-04-24T19:58:18","slug":"deploying-active-directory-certificate-services-and-online-responder","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/deploying-active-directory-certificate-services-and-online-responder\/","title":{"rendered":"Deploying Active Directory Certificate Services and Online Responder"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-2824\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/deploying-active-directory-300x300.jpg\" alt=\"deploying active directory\" width=\"182\" height=\"182\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/deploying-active-directory-300x300.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/deploying-active-directory-150x150.jpg 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/deploying-active-directory.jpg 400w\" sizes=\"auto, (max-width: 182px) 100vw, 182px\"><\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Certificate Services has become one of the core components of any <a title=\"How to Monitor Microsoft Exchange\" href=\"https:\/\/www.poweradmin.com\/help\/sm_5_6\/howto_monitor_exchange.aspx\">Active Directory infrastructure<\/a>. A certification authority (CA) issues digital certificates to testify the authenticity of <\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">applications, users and computers. Digital certificates can be issued, revoked and renewed based on the necessities of the company. When deciding to deploy AD CS within your organization, you will need <\/span><span style=\"font-family: verdana,geneva; font-size: 12pt;\">to take into consideration several factors:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">What kind of CA are you going to deploy? \u2013 There are two CAs that can be deployed on a Windows Server: Enterprise CA or Stand-Alone CA. You should always opt for the Enterprise CA whenever possible because it offers increased capabilities. It integrates into AD and uses Group Policy to replicate certificate trust list to users and computers. Revocation lists are also published to AD, Auto-enrollment feature is supported, certificates are generated based on the information stored in AD and security checks are made when users send certificate requests. Most of these features are not supported by the Stand-Alone CA and all of these operations must be done manually by System Administrators.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">There may be times in which you\u2019d want to revoke certain certificates so that they are not trusted anymore. Information that a certificate has been revoked is published in so called certificate revocation list (CRL). The location of any CRL is included in the digital certificate so any entity can verify the validity of a digital certificate. You can specify a custom location for your CRL that is accessible by users and computers.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">When publishing huge CRLs to a certain location, delays may occur when there is an increased usage of network resources. These problems may arise when numerous users try to login using smart cards or use digital certificates. To overcome this problem Microsoft created Online Responders which are used to validate request sent by network users. Instead of downloading huge CRLs, a user will send a request to the local OCSP service to verify the authenticity of an entity. You can deploy one Online Responder to verify the revocation status for one or multiple CAs.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In this article we will learn how to install and configure an <i>Active Directory Certificate Services<\/i> and configure an <i>Online Responder Server<\/i>. For this demonstration I will be using a <a title=\"Auditing Windows Server 2012\" href=\"https:\/\/www.poweradmin.com\/blog\/auditing-windows-server-2012\/\">Windows Server 2012<\/a> Virtual Machine hosted in my VMware testing environment. Let\u2019s start by installing the Certification Authority and Online Responder services. Log in on the server with Administrator credentials, open the <i>Server Manager<\/i> console and click on <i>Add Roles and Features<\/i> button. From the available roles list select <i>Active Directory Certificate Services<\/i> and click on the <i>Next<\/i> button:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2808\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/active-directory-cerficate-service-roles.png\" alt=\"Active Directory Cerficate Service Roles\" width=\"793\" height=\"563\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/active-directory-cerficate-service-roles.png 793w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/active-directory-cerficate-service-roles-300x212.png 300w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Make sure that <i>Certification Authority<\/i> and <i>Online Responder<\/i> services are checked:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2813\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/certification-authority-online-responder.png\" alt=\"Certification Authority - Online Responder\" width=\"797\" height=\"565\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/certification-authority-online-responder.png 797w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/certification-authority-online-responder-300x212.png 300w\" sizes=\"auto, (max-width: 797px) 100vw, 797px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Check out the confirmation page to ensure everything will be installed as desired and press the <i>Install<\/i> button. Once the install operations is completed you will need to start the <i>post configuration Wizard<\/i> from the <i>Server Manager<\/i> console. We will start by configuring the <i>Certification Authority<\/i> service. From the setup type of the CA, select the <i>Enterprise CA<\/i> and the <i>Root CA<\/i> since this is the first CA deployed in our <i>PKI (Public Key Infrastructure)<\/i>.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In the following section we will need to create a new private key, make sure that the <i>RSA#Microsoft Software Key Storage Provider cryptographic provider<\/i> is selected, that the <i>key<\/i> is set to <i>2048<\/i> and the <i>hash<\/i> <i>algorithm<\/i> for signing certificates is set to <i>SHA1<\/i>:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2816\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/cryptography-for-ca-key-2048-hash-sha1.png\" alt=\"Cryptography for CA Key 2048 Hash SHA1\" width=\"771\" height=\"564\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/cryptography-for-ca-key-2048-hash-sha1.png 771w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/cryptography-for-ca-key-2048-hash-sha1-300x219.png 300w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In the following section we have to specify the name for our Certification Authority. You can configure the <i>common name<\/i> and the <i>distinguished name suffix<\/i>:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2814\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/certification-authority-names.png\" alt=\"Certification Authority Names\" width=\"771\" height=\"563\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/certification-authority-names.png 771w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/certification-authority-names-300x219.png 300w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Set the <i>validity period<\/i> of the Certification Authority (CA) to five years or whatever period you desire:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2811\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ca-validity-period.png\" alt=\"CA Validity Period\" width=\"770\" height=\"561\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ca-validity-period.png 770w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ca-validity-period-300x218.png 300w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">In the last section of the AD CS Configuration Wizard you\u2019ll need to type in the certificate database location and certificate database log location:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2809\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ad-cs-configuration-database-location.png\" alt=\"AD CS Configuration Database Location\" width=\"770\" height=\"562\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ad-cs-configuration-database-location.png 770w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ad-cs-configuration-database-location-300x218.png 300w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The configuration Wizard for the Online Responder is instant, you just need to start it and click on <i>Configure:<\/i><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2819\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/onlnie-responder-configure-role-services.png\" alt=\"Onlnie Responder Configure Role Services\" width=\"770\" height=\"563\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/onlnie-responder-configure-role-services.png 770w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/onlnie-responder-configure-role-services-300x219.png 300w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Once the OCSP service is configured, we need to configure our <i>OCSP Response Signing template<\/i>. Open <i>Certification Authority<\/i> console, navigate to the <i>Certificate Templates section<\/i>, <i>right click<\/i> it and select <i>Manage<\/i> from the menu:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2815\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/configure-ocsp-response-signing-template.png\" alt=\"Configure OCSP Response Signing Template\" width=\"983\" height=\"361\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/configure-ocsp-response-signing-template.png 983w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/configure-ocsp-response-signing-template-300x110.png 300w\" sizes=\"auto, (max-width: 983px) 100vw, 983px\"><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Now <i>right click<\/i> the <i>OCSP Response Signing<\/i> certificate and click on <i>Properties<\/i>. Navigate to the <i>Security<\/i> tab, add the Server hosting the OCSP service and set the permissions to <i>Read<\/i>, <i>Enroll<\/i> and <i>Autoenroll<\/i>.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2818\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ocsp-security-permissions.png\" alt=\"OCSP Security Permissions\" width=\"409\" height=\"565\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ocsp-security-permissions.png 409w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ocsp-security-permissions-217x300.png 217w\" sizes=\"auto, (max-width: 409px) 100vw, 409px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Return to the Certification Authority console, <i>right click the CA name<\/i> and click on <i>Properties<\/i>. Navigate to the <i>Extensions<\/i> <i>tab<\/i>, select <i>Authority Information Access (AIA)<\/i> <i>extension<\/i> and click on the <i>Add<\/i> button:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2810\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ca-properties-extensions-authority-information-access.png\" alt=\"CA Properties - Extensions - Authority Information Access\" width=\"409\" height=\"539\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ca-properties-extensions-authority-information-access.png 409w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ca-properties-extensions-authority-information-access-227x300.png 227w\" sizes=\"auto, (max-width: 409px) 100vw, 409px\"><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Type <span style=\"color: #339966;\">http:\/\/srv2.ppscu.com\/ocsp<\/span>, where <span style=\"color: #339966;\">srv2.ppscu.com<\/span> is the FQDN of my OCSP server. Make sure to check <i>Include in the online certificate status protocol (OCSP) extension<\/i>:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2820\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/srv2-ca-properties-ocsp.png\" alt=\"SRV2-CA Properties OCSP\" width=\"410\" height=\"540\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/srv2-ca-properties-ocsp.png 410w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/srv2-ca-properties-ocsp-227x300.png 227w\" sizes=\"auto, (max-width: 410px) 100vw, 410px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The CA will be restarted once the AIA extension is added. Return to the Certification Authority console, <i>right click<\/i> Certificate Templates and select <i>New -&gt; Certificate Template to Issue<\/i>. From the available templates select the <i>OCSP Response Signing<\/i> template:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2817\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ocsp-response-signing-template.png\" alt=\"OCSP Response Signing Template\" width=\"593\" height=\"377\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ocsp-response-signing-template.png 593w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/ocsp-response-signing-template-300x190.png 300w\" sizes=\"auto, (max-width: 593px) 100vw, 593px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Our configuration is almost completed, we just need to enable <i>Autoenrollment feature<\/i> from the <i><a title=\"GPMC &amp; Group Policy Store in Server 2008\" href=\"https:\/\/www.poweradmin.com\/blog\/gpmc-and-group-policy-store-in-windows-server-2008\/\">Group Policy<\/a> Management Console<\/i>. <i>Edit<\/i> the <i>Default Domain Policy<\/i> or create a <i>new<\/i> <i>GPO<\/i> and expand <i>Computer Configuration\/Policies\/Windows Settings\/Security Settings\/Public Key Policies<\/i> and enable the <i>Certificate Services Client \u2013 Auto-Enrollment <\/i>policy:<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-2812 size-full\" title=\"Certificate Services Client - Auto Enrollment\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/certificate-services-client-auto-enrollment.png\" alt=\"Certificate Services Client - Auto Enrollment\" width=\"409\" height=\"507\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/certificate-services-client-auto-enrollment.png 409w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/10\/certificate-services-client-auto-enrollment-242x300.png 242w\" sizes=\"auto, (max-width: 409px) 100vw, 409px\"><\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Once the policy is enabled, close GPM console and force a group policy update by typing <i>gpupdate \/force<\/i> from command prompt. Your CA is now configured with an <i>Online Responder<\/i> enabled to service certificate requests. That\u2019s about it for this article folks. Make sure you follow all steps precisely to be sure that your infrastructure will be configured accordingly. Please share your thoughts about this article and don\u2019t forget to enjoy your day!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Certificate Services has become one of the core components of any Active Directory infrastructure. A certification authority (CA) issues digital certificates to testify the authenticity of applications, users and computers. Digital certificates can be issued, revoked and renewed based on the necessities of the company. When deciding to deploy AD CS within your organization, you [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":2824,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,9,8],"tags":[],"class_list":["post-2805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-technical","category-windows"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=2805"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2805\/revisions"}],"predecessor-version":[{"id":3450,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2805\/revisions\/3450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/2824"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=2805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=2805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=2805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}