ADCS Installation And Configuration Lab Manual
User Manual: Pdf
Open the PDF directly: View PDF
.
Page Count: 46
| Download | |
| Open PDF In Browser | View PDF |
Certificate Authority Infrastructure Hands-On Lab Part 1: ADCS Installation & Configuration Information Technology & Security CLASS DESCRIPTION The first of a two-part hands-on-lab series; this lab will take you step-by-step through the installation and configuration of an enterprise Public Key Infrastructure (PKI) using Microsoft Active Directory Certificate Services (ADCS). OVERVIEW We will be deploying the PKI environment described below in Figure 1 and Table 1. The installation procedure will follow these major steps: • • • Provision a web server to host PKI information (CDP and AIA). Deploy a standalone root CA Deploy an enterprise subordinate CA NOTE: All domain and local account passwords are set to pw Figure 1 - Lab Infrastructure Machine Roles FQDN [IP] Domain Controller DC, DNS, DHCP, WINS dc.city.gov [10.10.10.10] Root CA Certificate Authority rootca.city.gov [10.10.10.5] Subordinate CA Certificate Authority, Web Enrollment subca.city.gov [DHCP] PKI Info Server IIS, File Share pkiinfo.city.gov [DHCP] Web Application Server IIS webapps.city.gov [DHCP] Workstation Windows Client OS workstation.city.gov [DHCP] Table 1 - Listing of Lab Machines ADCS INSTALLATION AND CONFIGURATION HANDS-ON-LAB TIP: Before starting any VM in this lab for the first time, you should apply the Lab Start checkpoint 2 Provisioning the PKI Information Distribution Server 1. Start the Domain Controller (DC) if it isn’t already running, wait for it to 2. Start the PKI Information server (PkiInfo) 3. Start a Hyper-V Virtual Machine Connection to PKiInfo and login as domain administrator NOTE: Domain administrator credentials are user name: CITY\Administartor password: pw TIP: When logged in as the domain administrator you should see the following information in the top right of the desktop wallpaper: If the information shown is different you may have logged in as local administrator, log out and try again. 3 4. Start Internet Information Services Manager (IIS Manager) and verify that the certinfo directory is exists under the Default Web Site and directory browsing is enabled 5. Start Internet Explorer and verify that you can browse to http://pkiinfo.city.gov/certinfo 4 Deploying the Root Certificate Authority – Installation 1. Start the Root CA server (RootCA) and login as local Administrator NOTE: A DNS entry for rootca.city.gov [10.10.10.5] has already been manually created for this server since it is not a domain member and hence will not self-register with the domain DNS. 2. Start Server Manager and select Add roles and features, under the Configure this local server section 3. On the Select installation type screen, select Role-based or feature-based installation and click next 5 4. On the Select destination server screen ensure the RootCA server is selected and click next 5. On the Select server roles screen, select Activity Directory Certificate Services then click Add Features in the dialog window. Click Next. 6 6. Skip to the Roles Services screen under AD CS and verify that only the Certificate Authority role service is selected. Click Next 7. On the Confirm installation selections screen, check the box to allow automatic restarts during installation and click Yes in the dialog box and finally click Install 7 8. Wait for the installation to complete then click Close. The Certificate Authority role is now installed. 8 Deploying the Root Certificate Authority – Configuration 1. In the Server Manager notifications menu, find the Post-deployment Configuration notification and click the Configure Active Directory Certificate Services on the destination server link 2. On the Credentials screen of the AD CS Configuration wizard, accept the default local Administrator credentials and click Next 9 3. On the Roles Services screen, select Certificate Authority then click Next 4. On the Setup Type screen ensure Standalone CA is selected then click Next. 5. On the CA Type screen ensure Root CA is selected then click Next 10 6. On the Private Key screen select Create a new private key then click Next 7. On the Cryptography for CA screen ensure RSA#Microsoft Software Key Storage Provider and SHA256 are selected, however, change the Key Length to 4096 and check the Allow administrator interaction when the private key is accessed by the CA option then click Next 8. On the CA Name screen, enter a common name for you Root CA, we will use CityRootCA for this lab 11 9. On the Validity Period screen enter the period for which the Root CA certificate will be valid, we will use 15 years for this lab TIP: Given cryptography settings of SHA256 and 4096 key length or stronger, 10 – 20 years is a reasonable range for validity periods. 10. On the CA Database screen accept the default locations and click Next 12 11. On the Confirmation screen, verify all choices then click Configure 12. The Certificate Authority role service is now configured. Click Close. NOTE: We now need to configure the locations of the CDP and AIA to point to the PKI Information Server, so that the domain infrastructure has access to information published by the Root CA once it is offline 13. In the Tools menu of Server Manager, launch the Certificate Authority management console 13 14. Verify that the CityRootCA certificate authority service is running (green check mark) 15. Right click the CityRootCA node and select Properties NOTE: It takes a few seconds for the Properties dialog box to show 16. In the CityRootCA Properties dialog, select the Extensions tab 14 17. Remove all entries for the CRL Distribution Point, except for the file system entry on drive C: 18. Click Add… to open the Add Location dialog 19. Enter for following URL to the PKI Information Server and click OK http://pkiinfo.city.gov/certinfo/.crl TIP: Use the Variable dropdown to insert the URL parts to avoid typos 15 20. For this location check both the Include in CRLs. Clients use this to find Delta CRL Locations and the Include in the CDP extension of issued certificates options, then click Apply 21. Click Yes in the Certificate Authority dialog box to restart the CA service 16 22. In the Select extension dropdown, choose Authority Information Access (AIA) 23. Just as we did for the CDP, remove all entries except for the file system entry on drive C: 24. Click Add… and enter for following URL to the PKI Information Server then click OK http://pkiinfo.city.gov/certinfo/ _ .crt 17 25. For this location check the Include AIA extension of issued certificates options, click OK then click Yes to restart the CA service 26. Right-click the Revoked Certificates node and select Properties 27. In the Revoked Certificates Properties dialog, set the CRL publication interval to 1 year, then click OK TIP: Expired CRLs will prevent online CA services from starting. Be careful to choose a publication interval that is sensible for your organization 18 NOTE: We now need to publish the certificate revocation list (CRL) along with the AIA certificate that signs the CRL 28. In the Certificate Authority management console, right click Revoked Certificates folder under CityRootCA, go to All Tasks and click Publish NOTE: It can take a few seconds for the Publish CRL dialog box to show 29. Ensure the New CRL option is selected and click OK 30. In Windows Explorer browse to the following path and copy the crl and crt files. These are the certificate revocation list and AIA cert C:\Windows\System32\CertSrv\CertEnroll 19 31. Browse to the administrative share for drive C: on the PKI Information Server (PkiInfo) and copy the crl and crt files to the certinfo folder of the web server \\pkiinfo\C$\inetpub\wwwroot\certinfo 32. Use Internet Explorer to verify that the crl and crt files are available via the PKI Information Server URL http://pkiinfo.city.gov/certinfo NOTE: Next we will make the Root CA certificate available via the PKI Information Server 33. In the Certificate Authority console, open the properties of the CityRootCA and go to the General tab 20 34. Click View Certificate to open the Certificate dialog and go to the Details tab 35. Click Copy to File… then click Next in the Certificate Export Wizard dialog. Ensure the DER encoded binary X.509 (.CER) option is selected then click Next 21 36. Enter the following file path for the Root CA certificate export, then click Next C:\Windows\System32\CertSrv\CertEnroll\CityRootCA.cer 37. Verify the information in the summary screen shows then click Finish 22 38. Copy the CityRootCA.cer file to the PKI Information Server NOTE: Lastly, we update the validity period of certificates created by the Root CA to 5 years 39. In PowerShell run the following command certutil.exe -setreg CA\ValidityPeriodUnits "5" TIP: Whenever modifying validity period units, always verify that the validity period is set correctly, to years in this case certutil.exe -getreg CA\ValidityPeriod 23 40. Stop, then Start the Certificate Authority service to pick up these registry changes TIP: You can also run the following commands to stop and start the CA service: stop-service certsvc then start-service certsvc 24 Deploying the Root Certificate Authority – Trusted Root Certificate Group Policy NOTE: Now we need to configure a domain group policy so that all machines in the domain will trust the RootCA 1. Open a Virtual Machine Connection to the Domain Controller (DC) and login 2. In Server Manager, launch Group Policy Manager from the Tools menu 3. Create a new GPO for the city.gov domain named City PKI 25 4. Edit the City PKI GPO 5. In the Group Policy Management Editor navigate to the following policy path then right click and select Import from the Trusted Root Certification Authorities node Computer Configuration > Policies > Windows Settings > Security Settings > Public Key Policies > Trusted Root Certification Authorities 6. In the Certificate Import Wizard dialog click Next and then Browser… and enter the following path Root CA certificate, then click Open then click Next \\pkiinfo\C$\inetpub\wwwroot\certinfo\CityRootCA.cer 26 to the 7. On the Certificate Store page of the Certificate Import Wizard, ensure the certificate store is set to Trusted Root Certification Authorities, then click Next then click Finish NOTE: It will take a few seconds to import the Root CA certificate. Once imported you will see the following dialog. Click OK then refresh the Group Policy Manager Editor 27 8. Go to the Properties of the imported CityRootCA certificate 9. Here you can make updates to the Root CA certificate, we will update Friendly Name and Description NOTE: We now have a fully configured Root Certificate Authority! You may need to run gpupdate /force on domain members to immediately pull these GPO updates. 28 Deploying the Enterprise Subordinate Certificate Authority – Installation 1. In Hyper-V Manager, start the Subordinate CA (SubCA) virtual machine 2. Open a Virtual Machine Connection to the Subordinate CA (SubCA) and login as domain Administrator 3. Start Server Manager and select Add roles and features, under the Configure this local server section 4. On the Select installation type screen, select Role-based or feature-based installation and click next 29 5. On the Select destination server screen ensure the SubCA server is selected and click next 6. On the Select server roles screen, select Activity Directory Certificate Services then click Add Features in the dialog window. Click Next. 30 7. Skip to the Roles Services screen under AD CS and select Certificate Authority Web Enrollment then click Add Features to Add the IIS dependency. 8. Ensure both the Certificate Authority and Certificate Authority Web Enrollment role services are selected, then click Next 31 9. Skip to the Configuration page and check Restart the destination server automatically if required, before clicking Install 10. Wait for the installation process to complete then click Close 32 Deploying the Enterprise Subordinate Certificate Authority – Configuration 1. In the Server Manager notifications menu, find the Post-deployment Configuration notification and click the Configure Active Directory Certificate Services on the destination server link 2. On the Credentials screen of the AD CS Configuration wizard, accept the default domain Administrator credentials and click Next 33 3. On the Roles Services screen, select Certificate Authority and Certificate Authority Web Enrollment for configuration, then click Next 4. On the Setup Type screen ensure Enterprise CA is selected then click Next. 5. On the CA Type screen ensure Subordinate CA is selected then click Next 34 6. On the Private Key screen select Create a new private key then click Next 7. On the Cryptography for CA screen ensure RSA#Microsoft Software Key Storage Provider and SHA256 are selected, however, change the Key Length to 4096 and uncheck the Allow administrator interaction when the private key is accessed by the CA option then click Next 8. On the CA Name screen, enter a common name for you Root CA; we will use CitySubordinateCA for this lab 35 9. On the Certificate Request screen, save the request as a file 10. On the CA Database screen accept the default locations and click Next 36 11. On the Confirmation screen, verify all choices then click Configure 12. Review to configuration results. The Certificate Authority Web Enrollment role service should be completely configured, however, we still need to complete the configuration of Certificate Authority role service NOTE: We now need to have the Root CA issue a certificate for the Subordinate CA. We will do this next by submitting the certificate request file that was just created to the Root CA for issuance. 37 Deploying the Enterprise Subordinate Certificate Authority – Certificate Issuance 1. Open a Virtual Machine Connection to the Root CA (RootCA) and login 2. In Server Manager, launch the Certificate Authority management console from the Tools menu 3. Right click the CityRootCA node and under the All Tasks menu select Submit new request… 4. In the Open Request File dialog box, browse the certificate request created on the Subordinate CA \\subCA\C$\SubCA.city.gov_city-SUBCA-CA.req NOTE: It can a take up to 15 seconds for the request to be imported even though the console remains usable. Refresh the console until you see the certificate request in the Pending Requests node. 38 5. In the Pending Requests node, right click on the imported certificate request and select All Tasks > Issue 6. In the Issued Certificates node, verify that the Subordinate CA certificate has been issued 7. Double-click to open the issued certificate and go to the Details tab of the Certificate dialog 39 8. Click Copy to File… then click Next in the Certificate Export Wizard dialog. Ensure the Cryptographic Message Syntax Standard option is selected then click Next TIP Enabling the Include all certificates in the certificate path if possible options will include the root certificate in the export file as well. 9. Enter the following file path for the Root CA certificate export, then click Next \\subCA\C$\SubCA.p7b 40 10. Verify the information in the summary screen shows then click Finish 41 Deploying the Enterprise Subordinate Certificate Authority – Certificate Installation 1. Open a Virtual Machine Connection to the Subordinate CA (SubCA) and login as the domain Administrator 2. In a command prompt, force a group policy update to ensure the City PKI GPO has been applied gpudate /force 3. In Server Manager, launch the Certificate Authority management console from the Tools menu NOTE: The Certificate Authority service for the Subordinate CA is currently stopped 4. Right click the CitySubordinateCA node and select All Tasks > Install CA Certificate… 42 5. In the Select file to complete CA installation dialog, browse the certificate file (.p7b) that was issued and exported from the Root CA NOTE: The certificate will take a few seconds to install, during which time the mmc console will be unresponsive 6. Right-click the CitySubordinateCA node and select All Tasks > Start Service NOTE: The CA service will take a few seconds to start up. NOTE: Lastly, we need to update the CDP and AIA extensions to point to the PKI Information Server 43 7. In the CitySubordinateCA Properties dialog, select the Extensions tab and remove the http and file entries for the CRL Distribution Point then click Apply 8. Click Yes in the Certificate Authority dialog box to restart the CA service 44 9. In the Select extension dropdown, choose Authority Information Access (AIA) 10. Just as we did for the CDP, remove the http and file entries for the AIA then click Apply 11. Click Yes to restart the CA service NOTE: We now need to publish the certificate revocation list (CRL) along with the AIA certificate that signs the CRL 45 12. In the Certificate Authority management console, right click Revoked Certificates folder under CitySubordinateCA, go to All Tasks and click Publish NOTE: It can take a few seconds for the Publish CRL dialog box to show 13. Ensure the New CRL option is selected and click OK NOTE: Congratulations! You have successfully deployed a Two-Tier Enterprise PKI. You may now shut down the Root CA and keep it offline. 46
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.7 Linearized : No Page Count : 46 Language : en-US Tagged PDF : Yes XMP Toolkit : 3.1-701 Producer : Microsoft® Word 2016 Creator : Parsons, Cindy Creator Tool : Microsoft® Word 2016 Create Date : 2018:04:19 13:29:15-04:00 Modify Date : 2018:04:19 13:29:15-04:00 Document ID : uuid:FA4B630D-10EA-406E-8C1F-7C786485EDE9 Instance ID : uuid:FA4B630D-10EA-406E-8C1F-7C786485EDE9 Author : Parsons, CindyEXIF Metadata provided by EXIF.tools