Skip to main content

Installing an Internal CA on Server 2012

Certificate Authority is a server role introduced by Microsoft, to issue digital certificates to target recipients. These digital certificates enable the environment to communicate securely between each other. 

Installing an internal CA server is not too hard and pretty much straight forward I believe. 




Description :
Installing an Internal CA on Server 2012.





How To Do :


  1.  Launch Server Manager, Go to Manage | Add Roles and Features






  2.  Click Next >





  3.  Ensure Role-based or feature-based installation is chosen, and click Next >




      
  4.  Ensure the target server is selected from the server pool, and click Next >





  5.  Check / tick Active Directory Certificate Services role





  6.  The Add Roles and Features Wizard appeared. Click at Add Features button.





  7.  Click Next > 





  8.  Select additional features if needed, then click Next >





  9.  Click Next >





  10.  Check / tick Certificate Authority role service





  11.  To enable web enrollment, Certificate Authority Web Enrollment role service needs to be enabled as well. Check / tick at it, then click Next > 





  12. Once all confirmed, click Install





  13. Installing...





  14.  At Server Manager, hover to Notification, and click at at Post-Deployment Configuration to configure Certificate Services role.





  15.  Click Change... if you want to change the credential used, then click Next >





  16. Select which role services need to be configured, in this case the first two.





  17.  Specify type of CA to be configured, either Enterprise CA or Standalone CA. Click Next > once done.You may refer to below links for better understanding :








  18.  Specify whether the server should be a Root CA or Subordinate CA. In this case, Root CA is chosen as this is the  first CA in the environment. Click Next > 





  19.  Specify whether to create a new private key or to use existing private key. You may refer to below link for better understanding on Private Key. Click Next > once done.






  20.  Choose Cryptographic provider, key length, and hash algorithm. Refer to below link for more info on cryptography. Click Next > 






  21.  Specify the name of the CA, then click Next >





  22.  Specify the validity period of the Certificate, then click Next > 





  23.  Specify the database locations, then click Next >





  24.  Review the information populated, then click Configure.





  25.  Configuring...





  26. Done, click Close.





  27.  CA Configured.





    Comments

    Popular posts from this blog

    Microsoft Assessment and Planning (MAP) Toolkit - Extract Report (3/4)

    As mentioned in  the first post , this KB series is about Microsoft Assessment and Planning (MAP) Toolkit. There are 4 main steps : Install MAP Toolkit and its basic configuration Collect inventory Data  Extract Report Extract Advanced Report Once inventory data collected, we can generate reports. From the inventory data collected earlier, we can use options in the toolkit to generate the report. For this example, we re going to discover Windows 10 Readiness This KB is about  how to generate report from collected inventory data. At Overview page, select the targeted scenario category. In this example, it is Desktop . At this page, select specific scenario that we after. In this example, it is Windows 10 Readiness.     It is possible to customize assessment properties. The properties will set the threshold of the assessment, such as, threshold for minimum CPU speed, acceptable free disk, as well as minimum assigned RAM. To do so, s...

    Microsoft Assessment and Planning (MAP) Toolkit - Collect Inventory Data (2/4)

    As mentioned in  previous post , this KB series is about Microsoft Assessment and Planning (MAP) Toolkit. There are 4 main steps : Install MAP Toolkit and its basic configuration Collect inventory Data  Extract Report Extract Advanced Report Before we could generate a report, we need to collect inventory data. There are a few options, such as Windows computers, Linux computers, computers on VMware, Active Devices and users, etc. For this example, we re going to discover Windows Computers within a specific IP ranges. This KB is about  how to collect inventory data. At Overviews section, select Perform an inventory For this testing, let’s select Microsoft computers, and select Next For this testing, we will discover devices via IP range. Select scan an IP address range, and select Next Specify range if IPs, and select Next To discover and connect to the machines, we need to provide user account(s) that have permission to do so. Select ...

    Microsoft Assessment and Planning (MAP) Toolkit - Overview

    Microsoft created a  toolkit called Microsoft Assessment and Planning Toolkit that helps IT to discover current infrastructure for variety of migration projects.  This tool kit covers below scenarios : Windows computers Linux/UNIX computers VMware computers Active Directory and Users Exchange Servers Endpoint Protection Server Lync Server Softwre ID (SWID) tags SQL Server SQL Server with Database Details Microsoft Azure Platform Migration Oracle Windows Volume Licensing Client Access Tracking for Windows Server 2012 or Later Client Access Tracking for SQL Server 2012 or later Client Access Tracking for Configuration Manager Client Access Tracking for SharePoint Server 2016 Client Access Tracking for Remote Desktop Services … and IT Admins can use below methods to discover the machines. Use Active Directory Domain Service (AD DS) Use Windows networking protocols Use System Center Configuration Manager (SCCM) Scan an IP Address range Manually enter...