First, install Active Directory Certificate Services (AD CS) by doing the following:
Dashboard
→ Add roles and features
.Before You Begin
, simply select the button Next >
.Installation Type
, keep the radio button Role-based or feature-based installation
enabled and select the button Next >
.Server Selection
, choose the server that you wish to be the root CA and select the button Next >
.Server Roles
, tick Active Directory Certificate Services
, select the button Add Features
, and select the button Next >
.Features
, simply select the button Next >
.AD CS
, select the button Next >
.Role Services
, simply select the button Next >
.Confirmation
, simply select the button Install
.
Configure Active Directory Certificate Services on the destination server
.Credentials
, assuming you’re signed in as an administrator, simply select the button Next >
.Role Services
, check the tickbox Certification Authority
then select the button Next >
.In the section Setup Type
, choose your preferred CA type (prefered Entreprise CA ) then select the button Next >
.
In the section CA Type
, select the radio button Root CA
then select the button Next >
.
Private Key
, select the radio button Create a new private key
then select the button Next >
.Cryptography
, select :RSA#Microsoft Software Key Storage Provider
2048
(at least) or 4096
(recommended)SHA256
(at least)Next >
:CA Name
, change the defaults to DC01.example.local
, for example.CN=<server’s FQDN>
.Next >
:Validity Period
, simply select the button Next >
.Certificate Database
, simply select the button Next >
.Confirmation
, simply select the button Configure
.Results
, simply select the button Close
.
Once the certificate has been installed, the DC server’s bindings need to be updated.
renew.txt
with the following content:dn:
changetype: modify
add: renewServerCertificate
renewServerCertificate: 1
-
ldifde -i -f renew.txt
To check if LDAP ssl and 636 is open, in PowerShell run
ldp ldaps://yourhostname