1. Introduction
Active Directory Certificate Services (AD CS) provides customizable services for issuing and managing public key certificates used in software security systems that employ public key technologies.
Azure AD domain Services allows limited access to the Active Directory instance for administrators, only a standalone Certificate Authority (CA) deployment will be possible.
More information about AD CS can be found here.
2. Assumptions
The following assumptions are made during the creation of this article:
- Azure AD Domain Services is up and running
- Active Directory Member sever, running windows 2012 R2
- Experienced in Microsoft Certificate Authority
- Experienced in Active Directory
3. Installation
Please follow the instruction below to install a Standalone CA:
Disclaimer:
This is a quick and basic installation and should be evaluated if it meet business and security requirements.
- Run the following PowerShell Command as Administrator
- “Install-WindowsFeature AD-Certificate,ADCS-Cert-Authority,ADCS-Web-Enrollment -IncludeManagementTools“
- Run the following PowerShell command as Administrator
- “Install-AdcsCertificationAuthority -CAType StandaloneRootCa“
- Run the following Powershell command as Administrator
- “Install-AdcsWebEnrollment“
4. Configuration
After the completion of section 3, the AD CS service should be up and running with default configuration. Here is some recommendation for making the AD CS more secure and a production ready service.
Steps to import the Root CA as trusted authority for all domain joined Servers/ machines.
- Download Root CA:
- Go to http://<Servername>/certsrv
- Click “Download a CA certificate, Certificate chain, or CRL”
- Click “Download CA certificate”
- Save the file for next steps
- Open Group Policy Management (Follow below to install Group Policy Management on a Member Server)
- Run the following PowerShell Command as Administrator
- “Install-WindowsFeature GPMC“
- Run the following PowerShell Command as Administrator
- Edit “AADDC Computers GPO“
- Go to “Computer Configuration\Windows Settings\Security Settings\Public Key Policies\Trusted Root Certification Authorities” section
- Import the Root CA into the section above
- Close the Group Policy
- To allow the group policy to take affect:
- reboot member servers, or
- run “gpudpate /force” as administrator
5. Conclusion
Azure AD domain Services domain joined servers will be able to install and trusted the new standalone CA Certificates.