4- Install Certificate Authority

Table of Contents
Certificate Authority Active Directory
We need Certificate Authority to secure LDAP , Remote Desktop & Remote PowerShell Connections.
It’s not recommended to install on Domain Controller in production.
First Install Certificate Authority:
Update Domain Controller Template MS1: #
- Open the Certification Authority management console with domain Admin user
- Right-click Certificate Templates > Manage
- In the Certificate Template Console, right-click the Kerberos Authentication template in the details pane and select Duplicate Template
- On the Compatibility tab:
- Clear the Show resulting changes check box
- Select Windows Server 2016 from the Certification Authority list
- Select Windows 10 / Windows Server 2016 from the Certificate Recipient list
- On the General tab
- Type Domain Controller Authentication (Kerberos) in Template display name
- Adjust the validity and renewal period to meet your enterprise’s needs
- On the Subject Name tab:
- Select the Build from this Active Directory information button if it isn’t already selected
- Select None from the Subject name format list
- Select DNS name from the Include this information in alternate subject list
- Clear all other items
- On the Cryptography tab:
- Select Key Storage Provider from the Provider Category list
- Select RSA from the Algorithm name list
- Type 2048 in the Minimum key size text box
- Select SHA256 from the Request hash list
- Select the Superseded Templates tab. Select Add
- From the Add Superseded Template dialog, select the Domain Controller certificate template and select OK > Add
- From the Add Superseded Template dialog, select the Domain Controller Authentication certificate template and select OK
- From the Add Superseded Template dialog, select the Kerberos Authentication certificate template and select OK -Add any other enterprise certificate templates that were previously configured for domain controllers to the Superseded Templates tab
- Select OK and close the Certificate Templates console
- Right-click Certificate Templates > New > Certificate Template to Issue
- Select Domain Controller Authentication (Kerberos) & Ok
Configure Group Policy to autoenroll certificates MS2: #
- Open the Group Policy Management console.
- In the navigation pane, expand Forest: YourForestName, expand Domains, expand YourDomainName, expand Group Policy Objects, right-click Default Domain Controllers Policy GPO, and then click Edit.
- In the navigation pane, expand the following path: Computer Configuration > Policies > Windows Settings > Security Settings > Public Key Policies.
- Double-click Certificate Services Client - Auto-Enrollment.
- In the Properties dialog box, change Configuration Model to Enabled.
- Select both Renew expired certificates, update pending certificates, and remove revoked certificates and Update certificates that use certificate templates.
- Click OK to save your changes. Computers apply the GPO and download the certificate the next time Group Policy is refreshed.
- On Domain Controllers run command ‘gpupdate /force’ on administrative PowerShell or CMD.
- In Certification Authority management console Check Issued Certificates.