Enterprise PKI with the 2 tier hierarchy – Offline Root CA and Online Subordinate CA – Step by Step – Part 2

Today I’m glad to continue our journey for Setup an Enterprise Subordinate Certificate Authority deployment “Installing – Configuring Subordinate CA as Online Issuing CA”  

Certificate Authority Purpose


For part 1 please check the link bellow

DEPLOYING ENTERPRISE PKI ON WINDOWS SERVER 2012 R2 WITH THE 2 TIER HIERARCHY – OFFLINE ROOT CA AND ONLINE SUBORDINATE CA – STEP BY STEP – PART 1

let me start explaining a little bit about Enterprise CA
For my needs I will install my own CA, so I can use it to issue any number of certificates to support for the following Servers and Services with free charge.

This CA removes the cost required to buy a dozen of certificates to support those services

Before I start let’s know what is Certification Authority (CA) and what is the CA main purposes?

Certificate Authority (CA) is well-designed and highly trusted service in an enterprise that is trusted to sign digital certificates. CA verifies identity and legitimacy of company or individual that requested a certificate and if the verification is successful, CA issues signed certificate.

The main purposes of the CA are

By doing this, the CA ensures that users, services, and computers are issued certificates that always valid and validated. Before start let`s discuss this diagram 🙂

Enterprise PKI Design

Being diligent, I sketch out what we are about to do first.

My Servers Information

Server NameOSRoleWorkgroup/Domain
RootCAWindows Server 2012Standalone Offline Root CAWorkgroup
IssuingCA1001Windows Server 2012Enterprise Subordinate CADomain Joined
DC01Windows Server 2012Domain ControllerNAN
Certificate Authority Serers List
[inhype_block type=”postsgrid2″ block_title=”See also” block_subtitle=”Recommended” block_posts_type=”latest” block_categories=”” block_posts_limit=”4″ block_posts_loadmore=”no” block_posts_offset=”0″]

Phase 1: Enterprise PKI Deployment – Subordinate CA

For this scenario I will complete the implementation of 2 tier PKI hierarchy which contains offline standard Root CA server and online enterprise subordinate CA.

Prepare your servers with latest update and enforce your organization policy and make sure to join IssuingCA1001 to the DC. let`s go…

Installation

Configuration
You can start configuring the AD CS form here or from the server manager notification

[inhype_block type=”postsgrid4″ block_title=”Take a Look” block_subtitle=”Other article might be useful” block_posts_type=”latest” block_categories=”” block_posts_limit=”3″ block_posts_loadmore=”no” block_posts_offset=”0″]

Phase 2: Trust Subordinate CA by Root CA

To make the subordinate server responsible for issuing a certificates for your organization you should make trust between Root CA and Subordinate CA, by submitting the request file that created in subordinate configuration above to Root CA and get back the resulted certificate to the subordinate.

Go to the offline ROOTCA server – open Certificate Authority – All Tasks- Submit new request

choose the .req file created while configuring subordinate CA phase 1 – open

the certification trust now is done, but in pending state, we should issue that certificate

All tasks – Issue

Now its in issued certificates list

Double click at the certificate, it should look like this

go to certification path to view the certificate server hierarchy, it should have two level hierarchy Root CA at the Top – Sub CA (Issuing CA) under RootCA

 now we need to export the trusted certificate back into the subordinate server – choose Copy to File

Choose .P7B and tick Include all certificates in the certification path if possible

save the file – and copy it to the IssuingCA1001 server (Subordinate server) and move on 

in IssuingCA1001 server open Certification Authority – All Tasks Install CA Certificate, choose the exported certificate that come from Root CA

Certificate service now is in running state, You should see the small green icon for the sub-CA certificate authority now.

If not, go back to check the CRL and AIA settings, again, all of the location defined in CRL and AIA must be accessible in server IssuingCA1001 server, which means you should have a copy of the CRL files in C:\Windows\System32\CertSrv\CertEnroll and the IIS site as well.

Checking the CRL and AIA status 

Conclusion

Awesome, done for now.

At this moment, we have deployed and configured an enterprise subordinate CA…
Next, check the part 3 to publish the root CA certificate to your infrastructure using Group Policy 


Thanks


[inhype_block type=”showcase4″ block_title=”More from Mohamad Sallal” block_subtitle=”Recommended” block_posts_type=”random” block_categories=”” block_posts_limit=”4″ block_posts_loadmore=”no” block_posts_offset=”0″]

Exit mobile version