CA server migration from Windows 2003 to Windows 2012 R2

I have an internal root CA server that runs on Windows 2003, standalone, not connected to the network to issue SHA-1 certificates. Is it possible for me to have another internal root CA server running on Windows 2012 R2, standalone, not connected to the network to issue SHA-2 certificates?

This is so I can generate SHA-1 for legacy applications using existing CA and generate SHA-2 using new CA for the application those are currently using SHA-1 but can support SHA-2.

What is the best practice for achieve this? Will both root CA servers run on different names or same name. Can someone please advise me the step by step to achieve this? I want to migrate to SHA-2 but at the same time I don't want to affect my existing root CA.

Also, How will I renew the certificates of the existing applications using the new Windows 2012 R2 CA so they can use SHA-2?

Many Thanks
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

yo_beeDirector of Information TechnologyCommented:
If you standup another Stand-Alone I do not think it will be an issue.
You will need to push out your new CA as a root CA for new renewals.
Once you have that pushed you can generate a new CSR to register for a new Cert.

What type of applications are you using this for?  If the only machine that has the cert is the server I am not seeing any issues.

I would like to have a little more insight on the project.
Member_2_7969993Author Commented:
The certificates are used for ISA/Exchange/Active Directory all 2003 bases where I will install the hotfix of SHA2. I also have couple of lagacy web based applications and old firewalls that will require SHA1 for the time being.
Can you please let me know the steps to push out your new 2012 CA as a root standalonr CA for new renewals.
Should it have the same name as the Windows 2003 CA server and it requires a CA config backup to be taken from 2003 and restored to 2012
OR this can be a new name with a fresh config.
My current CA server is not connected to any network and I use USB to copy the issued certificates.
yo_beeDirector of Information TechnologyCommented:
I would not recommend using the same name for the server.
When you standup the 2012 stand-alone CA you will have a secondary Root CA in your environment.

Since the original Root CA server is not integrated with your Domain there is no tie to the 2003 CA.
Think of this as if you went from Versign to GoDaddy.  

You should be able to just request a new Cert for each one of these servers and apply it.  
Make sure you have a backup exported private key of each certificate you are looking to replace.

Prior to applying the new certificate makes sure you put out your new Root CA cert to all clients on your network.  Once complete you then can start the process of requesting new certs from the new Root CA.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
OWASP Proactive Controls

Learn the most important control and control categories that every architect and developer should include in their projects.

Member_2_7969993Author Commented:
If you can please provide some more info on the following:

what are the steps to export the private key and replace the ceritifate?
what are the steps to issue out the new Root CA cert to all clients?

Also, can you please confirm the final steps:

Install new standalone server (2008 R2 or 2012 R2)

Install CA services and configire it as Root CA

Put new Root CA cert to the clients that will support SHA-2 (Please provide the steps or link if possible)

Export the private key and replace the ceritifate.(Please provide the steps or link if possible)

Issue out the new Root CA cert to all clients.(Please provide the steps or link if possible)

Keep using Windows 2003 CA for lagacy applications we are using now.

I know I am asking for a lot of information so I will try to maximize the points when closing the case.
yo_beeDirector of Information TechnologyCommented:
I am out of commission today, but I will try and help the best I can tomorrow
Member_2_7969993Author Commented:
thanks so much :)
Member_2_7969993Author Commented:
Hi yo_bee,

Can you please have a look at this today.

yo_beeDirector of Information TechnologyCommented:
I am pretty busy with my job and will not be able to.

Since this is a stand alone CA there are no harms buy standing up another Stand-alone CA in your infrastructure.

What I would do for testing is setup a test IIS server and request a cert from your current CA.
Once confirmed that the cert is valid request a new cert from your new CA.

Like I said since this is not integrated with your domain you have nothing to working about.
The only thing you want to do is use Group Policy to push out your new Root CA to all clients.
Member_2_7969993Author Commented:
Many Thanks
yo_beeDirector of Information TechnologyCommented:
Did it work?
Member_2_7969993Author Commented:
I am still in the planning phase so gathering as much information as I can.
Thanks a lot.
yo_beeDirector of Information TechnologyCommented:
Like I said if you stand up another server if will not hurt your environment.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Windows Server 2012

From novice to tech pro — start learning today.