Update Workflows/Windows/Windows Server/Roles/Active Directory Certificate Services/Deployment.md
All checks were successful
GitOps Automatic Deployment / GitOps Automatic Deployment (push) Successful in 7s

This commit is contained in:
2025-07-11 16:58:33 -06:00
parent a887ca5068
commit d2360a27a0

View File

@ -32,26 +32,28 @@ This document outlines the Microsoft-recommended best practices for deploying a
- Ensure the "**Include management tools (if applicable)**" checkbox is checked.
- Click "**Next**" > "**Next**" > "**Next**" > "**Install**"
Install AD CS role as a Standalone Root CA.
3. Use RSA 4096-bit key, SHA-256, 10-year validity.
4. Configure AIA and CDP extensions with HTTP paths.
5. Publish root cert and CRL to AD and internal HTTP.
3. Online Subordinate CA Setup
Steps:
1. Domain-join a Windows Server and install AD CS as Enterprise Subordinate CA.
2. Generate CSR, sign with Root CA, import signed cert.
3. Configure AIA/CDP extensions for CRL publication.
4. Enable role separation and auditing.
4. Certificate Templates and Autoenrollment
Configure certificate templates for the following use cases:
• - S/MIME Email: Use separate templates for signing and encryption. Enable key archival for encryption.
• - 802.1X Wi-Fi: Use 'RAS and IAS Server' for NPS, and 'Workstation Authentication' for clients.
• - LDAPS: Use 'Kerberos Authentication' template for domain controllers.
Enable autoenrollment via GPOs under Public Key Policies for both Computer and User configuration.
5. CRL and Revocation Management
Publish CRLs regularly, configure overlap periods, and monitor expiration. Enable Delta CRLs on the Subordinate CA, but not on the Root.
6. Security Recommendations
• - Harden CA servers; limit access to PKI admins.
• - Use BitLocker or HSM for key protection.
• - Enforce strong cryptographic settings: RSA 2048+, SHA-256.
• - Monitor issuance and renewals with audit logs and scripts.
!!! warning "Raw Unprocessed Documentation - Do Not Use"
Install AD CS role as a Standalone Root CA.
3. Use RSA 4096-bit key, SHA-256, 10-year validity.
4. Configure AIA and CDP extensions with HTTP paths.
5. Publish root cert and CRL to AD and internal HTTP.
3. Online Subordinate CA Setup
Steps:
1. Domain-join a Windows Server and install AD CS as Enterprise Subordinate CA.
2. Generate CSR, sign with Root CA, import signed cert.
3. Configure AIA/CDP extensions for CRL publication.
4. Enable role separation and auditing.
4. Certificate Templates and Autoenrollment
Configure certificate templates for the following use cases:
• - S/MIME Email: Use separate templates for signing and encryption. Enable key archival for encryption.
• - 802.1X Wi-Fi: Use 'RAS and IAS Server' for NPS, and 'Workstation Authentication' for clients.
• - LDAPS: Use 'Kerberos Authentication' template for domain controllers.
Enable autoenrollment via GPOs under Public Key Policies for both Computer and User configuration.
5. CRL and Revocation Management
Publish CRLs regularly, configure overlap periods, and monitor expiration. Enable Delta CRLs on the Subordinate CA, but not on the Root.
6. Security Recommendations
• - Harden CA servers; limit access to PKI admins.
• - Use BitLocker or HSM for key protection.
• - Enforce strong cryptographic settings: RSA 2048+, SHA-256.
• - Monitor issuance and renewals with audit logs and scripts.