JReam
asked on
Win2K3 TS Certificate newbie questions
Win2k3 TS, clients RDC RDP WinXP.
Looking at TLS 1.0 for server authentication
1a. Will ALL RDC clients have to obtain and use the certificate, or just those that choose to? Is there a cost for them?
1b. Will ALL RDC clients have to use RDC RDP 5.2 from the Win2k3, I think most XP PCs use 5.1?
Certifcate?: On the TS Box I found the MMC Certificate screens.
2a. I see a lot of cerificates already there (out of the box Win2k3), will any of these do TLS?
2b. Do I have to buy something? How? Where? $?
2c. I tried the Certificate Request Wizard via the MMC and get a red X dialog "There are no trusted CAs available". What does that mean I have to do?
2d. I'm gathering that there are more than one certificate to choose from. I'd lean toward easy and cheap. Does MS supply/sell certificates themselves?
2e. Is SSL in this picture?
2f. Does any of this add any significient resource drain on the server?
I've read the MS article "How to configure a Windows Server 2003 terminal server to use TLS for server authentication" (http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3B895433) , but I still confused about the basics of certificates. The MS link to "Microsoft Cryptographic Service Providers" (http://msdn.microsoft.com/library/default.asp?url=/library/en-us/seccrypto/security/microsoft_cryptographic_service_providers.asp) just left me more cunfused.
If I get further into this, and decide I gotta back out, can I undo everything?
Be gentle. Newbie with a lot of questions. 500 Points.
Looking at TLS 1.0 for server authentication
1a. Will ALL RDC clients have to obtain and use the certificate, or just those that choose to? Is there a cost for them?
1b. Will ALL RDC clients have to use RDC RDP 5.2 from the Win2k3, I think most XP PCs use 5.1?
Certifcate?: On the TS Box I found the MMC Certificate screens.
2a. I see a lot of cerificates already there (out of the box Win2k3), will any of these do TLS?
2b. Do I have to buy something? How? Where? $?
2c. I tried the Certificate Request Wizard via the MMC and get a red X dialog "There are no trusted CAs available". What does that mean I have to do?
2d. I'm gathering that there are more than one certificate to choose from. I'd lean toward easy and cheap. Does MS supply/sell certificates themselves?
2e. Is SSL in this picture?
2f. Does any of this add any significient resource drain on the server?
I've read the MS article "How to configure a Windows Server 2003 terminal server to use TLS for server authentication" (http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3B895433) , but I still confused about the basics of certificates. The MS link to "Microsoft Cryptographic Service Providers" (http://msdn.microsoft.com/library/default.asp?url=/library/en-us/seccrypto/security/microsoft_cryptographic_service_providers.asp) just left me more cunfused.
If I get further into this, and decide I gotta back out, can I undo everything?
Be gentle. Newbie with a lot of questions. 500 Points.
ASKER
Rich -
My objective remains: Getting a Certificate on Terminal Server via the Certificate Request Wizard.
Status: Frustrated. Hours/days burning by.
Here's the documented process:
If you plan to obtain a certificate by using the Certificate Web pages or Certificate Request Wizard, a public key infrastructure (PKI) must be configured correctly to issue SSL-compatible X.509 certificates to the terminal server. Each certificate must be configured as follows:
•The certificate is a computer certificate.
•The intended purpose of the certificate is server authentication.
•The certificate has a corresponding private key.
•The certificate is stored in the terminal server’s personal store. You can view this store by using the Certificates snap-in.
•The certificate has a cryptographic service provider (CSP) that can be used for the SSL (TLS) protocol (for example Microsoft RSA SChannel Cryptographic Provider).
Here's where I'm at.
- We set up an Ent CA on one of our Domain member Win2k3 Servers. OK so far I think. (Our DC and servers are Win2k3 Std, not EE.)
- I see all the Certs under Certificate Templates, such as "Computer" + "Server Authentication". This one seems to be the one I want, I think.. :(.
- I CAN"T seen to ISSUE this one. It does not appear on the "New Certificite to Issue" list of choices. I'm not even sure
I'm dying out here.
ASKER
How about this Idea for me next:
1. Forget the idea of setting up our own CA. I'll uninstall the Ent CA we set up today.
2. Buy one. Where?
2a. I need simple SSL for TS.
2b. Would prefer low hassle on CLient side. If I'm reading thing right, most CA vendors are already 'trusted' by most WinXP PCs.
Where should I go? Is this a better plan?
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
SOLUTION for: How to Install Win2K3 Terminal Server SSL Certificate
Short Answer to reply/close to various posts I made:
- Do not Install Windows Server 2003 Certificate Services.
- Produce a CSR (Certificate Signing Request) on any available IIS6 box, any website. Yes CSP, select MS RSA
- In CSR be sure to specify your FQDN intented for use by remote RDC Users, same as RDC “Server” text box.
- My FQDN is a Registered Whois Domain with resolves to IP like any other Domain.
- Buy a SSL Certificate from any CA. Apply your CSR at CA. Get CRT files, two in my case, Web Cert & Intermediate Certificate.
- Apply CRTs to IIS6 Box, ICert to MMC and WCert to IIS6.
- Export Certificate from IIS6 Website as .PFX file, remove CRTs from IIS6 Box.
- Apply both CRTs to TS Box via MMC.
- TS Configuration will should now properly see your SSL Certificate.
http://en.wikipedia.org/wiki/Certificate_authority
http://www.microsoft.com/windows2000/en/server/iis/default.asp?url=/windows2000/en/server/iis/htm/core/iiabcsc.htm
M$ OS's come with a variety of root certificates and the domain your in likely has some self-generated ones as well as your PC for things like EFS.
http://technet2.microsoft.com/WindowsServer/en/library/d6eab6a4-a680-40b0-9fde-4978be14ebf41033.mspx?mfr=true
TLS is simply SSL's replacement: http://en.wikipedia.org/wiki/Transport_Layer_Security
RDP is fairly secure, and stepping the bit's up from 56 to 128 is typically a good move, the overhead is the same really.
http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/distrib/dscj_mcs_ezsw.mspx?mfr=true
site:microsoft.com term-your-looking-for
http://www.google.com/search?hl=en&lr=&safe=off&client=firefox-a&rls=org.mozilla%3Aen-US%3Aofficial_s&q=site%3Amicrosoft.com+install+certificate+authority&btnG=Search
I'll look for the answers to some of the other q's...
-rich