Installing and Configuring the AD CS

To create an AD-integrated CA, that is, an Enterprise CA, an account with Enterprise Administrator level privileges is required for the role configuration.

  1. Join a machine to the Domain and Log in as a user with Administrative privileges

  2. Select Start then select on Server Manager to open Server Manager

  3. Select Manage, then select Add Roles & Features. The Before you begin window opens.

Click Next

  1. On the Select installation type window, make sure the default Role or Feature Based

Installation is selected. Click Next

  1. On Server selection, select a server from the server pool. Click Next

  2. On the Select server roles window, select the Active Directory Certificate Services role

image-20251105-123239.png

Figure 3: Select server roles window

  1. When prompted to install Remote Server Administration Tools, select Add Features. Click

    Next

image-20251105-123644.png

Figure 4: Add Roles and Features window

  1. On the Select features window, click Next

image-20251105-123703.png

Figure 5: Select features window

  1. On the Active Directory Certificate Services window, click Next

image-20251105-123710.png

Figure 6: Active Directory Certificate Services window

10. On the Select role services window, the Certification Authority role is selected by default. Click Next

image-20251105-123717.png

Figure 7: Select role services window

11. On the Confirm installation selections window, check, and verify the information then click Install

image-20251105-123724.png

Figure 8: Confirm installation selections window

12. When the installation is complete, click on the Configure Active Directory Certificate Services on the destination server link

image-20251105-123737.png

Figure 9: Installation Progress window

13. On the Credentials window, make sure that Administrator’s credentials are displayed in

the Credentials box. If not, select Change and specify the appropriate credentials. Click

Next

image-20251105-123745.png

Figure 10: Credentials window

14. On the Role Services window, select Certification Authority. This is the only available

selection when the certification authority role is installed on the server, Click Next

image-20251105-123759.png

Figure 11: Role Services window

If you are using Smartcard Authentication, the prompt will go on the PIN Pad device to insert

Smartcard and enter the pin. Then press OK button on the PIN Pad.

15. On the Setup Type window, select the appropriate CA setup type for your requirements.

Click Next

image-20251105-123808.png

Figure 12: Setup Type window

16. On the CA Type window, Root CA is selected by default. Click Next

image-20251105-123815.png

Figure 13: CA Type window

17. On the Private Key window, leave the default selection to Create a new private key

selected. Click Next

image-20251105-123820.png

Figure 14: Private Key window

18. On the Cryptography for CA window, select the appropriate Utimaco CryptoServer

cryptographic provider along with the key type, key length, and suitable hash algorithm:

  •  RSA #Utimaco CryptoServer Key Storage Provider

  •  ECDSA_P256 #Utimaco CryptoServer Key Storage Provider

  •  ECDSA_P384 #Utimaco CryptoServer Key Storage Provider

  •  ECDSA_P521 #Utimaco CryptoServer Key Storage Provider

If KeyFile or SmartCard protection is used, select the Allow administrator interaction when the

private key is accessed by the CA option.

image-20251105-123824.png

Figure 15: Cryptography for CA window

19. Click Next

20. On the CA Name window, give the appropriate CA name. Click Next

image-20251105-123829.png

Figure 16: CA Name window

21. On the Validity Period window, enter the number of years for the certificate to be valid.

Click Next

image-20251105-123833.png

Figure 17: Validity Period window

22. On the CA Database window, leave the default locations for the database and database

log files. Click Next

image-20251105-123837.png

Figure 18: CA Database window

23. On the Confirmation window, click Configure

image-20251105-123841.png

Figure 19: Confirmation window

24. Click Close to exit the AD CS Configuration wizard after viewing the installation results. A

private key for the CA will be generated and stored on the HSM

image-20251105-123845.png

Figure 20: Results window

If you are using Smartcard Authentication, the prompt will go on the PIN Pad device to insert

Smartcard and enter the pin. Then press OK button on the PIN Pad.

25. Open a command prompt and run the following command to verify that service is running:

> sc query certsvc

26. Open a command prompt and run the following command to verify the CA key

> certutil –verifykeys

If you are using Smartcard Authentication, the prompt will go on the PIN Pad device to insert

Smartcard and enter the pin. Then press OK button on the PIN Pad.

The result of the command shows the CA keys have successfully been verified.