Solved

Windows CA Removal & Re-installation

Posted on 2013-11-14
4
405 Views
Last Modified: 2013-11-15
Hi All,

We have a Windows 2008 CA server which we intend to remove and re-install CA onto a 2012 box.

Decided to go for non-migration approach as new server will have different name to existing server and we don't particularly like the naming scheme of the existing root-ca.

Can currently see certificates issued for Basic EFS, SubCA, Domain Controller, User and WebServer so would someone be able to check my logic on the list below and confirm if I'm wrong?

1. Basic EFS - Only a problem if the users have encrypted files. I've checked and they haven't
2. SubCA  - Can be replaced. (in our case only issued to one device for SSL passthrough)
3. Domain Controller - Auto enrolled so if not available will not be a problem. Once new CA setup new certs will be auto-created.
4. User - In our case only issued for a few users and can be replaced.
5. Webservers - Can be replaced.

My main concern is the certs issued to the Domain Controllers - is my point 3. correct?

Our plan is as follows - backup existing CA, uninstall on 2008 box, add roles on 2012 box creating new root CA.

Would appreciate any advice from someone who has carried out a similar task or can see a glaring mistake I'm about to make.

Thanks,

R
0
Comment
Question by:arakis
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 37

Expert Comment

by:Mahesh
ID: 39647701
You can install new CA right on windows server 2012 and later on can demote old 2008 CA if wanted to.
There is no dependency between CA servers.
In case of basic EFS, I suggest you to export those certificates with private key prior to demotion of windows 2008 CA as a safety measure.
In case of Domain Conntrollers auto enrolled certificates, new CA will take care of them if it is AD integrated.
you can revoke existing DC certificates if wanted to prior to demotion of 2008 CA OR you can simply delete those certificates from domain controllers post CA demotion.
Your plan seems to be perfect.

I have migrated windows 2008 CA to Windows 2012 server by keeping same hostname and obviously without changing CA name (You cannot change CA name).
http://technet.microsoft.com/en-us/library/ee126140(v=ws.10).aspx
Hope that helps
0
 

Author Comment

by:arakis
ID: 39649787
Hi Mahesh,

Thanks for the feedback.

Are you certain you can have two CA Roots in the same AD? I thought you could only have one root CA role per AD domain?

Thanks again,

R.
0
 
LVL 37

Accepted Solution

by:
Mahesh earned 400 total points
ID: 39650126
You can have multiple Root CAs in AD
Please check below
http://technet.microsoft.com/en-us/library/cc731183.aspx
0
 

Author Closing Comment

by:arakis
ID: 39650875
Hi Mahesh,

OK  thanks for the pointers. I will setup the new 2012Root CA before decommissioning the old one.

Thanks again,

R.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article describes my battle tested process for setting up delegation. I use this process anywhere that I need to setup delegation. In the article I will show how it applies to Active Directory
This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question