Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Help with understanding Certificates in Active Directory Certificate Services

Posted on 2013-12-01
1
Medium Priority
?
313 Views
Last Modified: 2013-12-02
http://blogs.technet.com/b/meamcs/archive/2010/12/01/auto-enrollment-avoid-the-challenges-of-making-end-users-manage-their-certificates.aspx

The articles aboves says

"When a GPO with auto-enrollment configured is applied to a client, the client downloads all published certificate templates in the forest and stores them in the local registry in the following key HKEY_CURRENT_USER/Software/Microsoft/Cryptography/Certificate TemplateCache, each Template having its own registry key
The client checks the template for Read and Autoenroll permission, if these permissions are granted the client, it generates a key pair locally
If input is required from the user a balloon appears in the system tray asking the user for input
The Client creates a Certificate request and sends this request along with its public key to the Issuing CA. The request is based on the certificate template on which the user is granted Read and Autoenroll
the Issuing CA creates a certificate that has the Clients public key, stores it and issues it to the client
If the Publish Certificate in Active Directoryoptions is chosen, the certificate is also published in Active Directory and made available for other clients in the domain
The user now has a certificate associated with its private key and can now use it."

I need the following clarification:
"the Issuing CA creates a certificate that has the Clients public key, stores it and issues it to the client"

My understanding is:
The Issuing CA creates a new Private/Public Key pair, stores it, and then issues the entire new Private/Public Key pair to the Client (using the Client's other Public Key pair received earlier to encrypt and prevent repudiation).

The Client now has a new Private/Public key pair.
All AD Domain Members automatically Trust the Root CA, and therefore that new Private/Public key pair becomes useable/valid on the Domain.
The Client can now give out the Public Key to whatever host or service application wants it to encrypt information, as well as to identify the Client.

Multiple copies of both the Private Key and its associated Public are stored on various computers.

A copy of the Private is stored on the Issuing CA server, the Client, as well as AD if the "Publish to AD" option is chosen.

Is this correct?
0
Comment
Question by:JCTDD
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 53

Accepted Solution

by:
Will Szymkowski earned 1500 total points
ID: 39689684
The above is correct. I would also ensure that "Enroll" is enabled as well. There are some MS documentation which state Read and AutoEnroll are only needed but I have come across others as well which state Read, AutoEnroll and Enroll, which works for me.

I would also recommend that you create a "Key archival and recovery Agent" which is needed to recover and restore damaged or missing Private Keys.

Key archival and recovery - http://technet.microsoft.com/en-us/library/cc781351(WS.10).aspx

Will.
0

Featured Post

Office 365 Training for Admins - 7 Day Trial

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Know the reasons and solutions to move/import EDB to New Exchange Server. Also, find out how to recover an Exchange .edb file and to restore the file back.
A bad practice commonly found during an account life cycle is to set its password to an initial, insecure password. The Password Reset Tool was developed to make the password reset process easier and more secure.
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question