This page documents the capabilities provided by the Microsoft Infrastructure related to certificate services.
The UW has other certificate service options, provided by the Certificate Services service. The options provided which are not deprecated include:
These other options require the customer to create a certificate request, submit it manually, wait some period of time (usually less than an hour), manually retrieve the signed cert and install it. Issued certificates expire and must be manually requested again-they do not renew. The AD-CS service option has the following notable differences:
Initially, we are releasing a single general purpose computer certificate template for auto-enrollment, which is good for client or server authentication, with digital signature and key encipherment, and a common name derived from the computer's dnsHostname attribute value. While the initial offering of this service option is limited in scope to delegated OU customers, we believe that scope could expand. AD-CS will consider issuing any certificate type and in addition to the standard set of certificate templates that Microsoft provides, we are willing to consider custom certificate templates. Allowing non-Windows clients and cross-forest are possible future extensions. Submit a request at help@uw.edu with AD-CS in the subject line to discuss future possibilities.
NOTE: UW-IT reserves the right to revoke any certificate to protect the UW's interests. We plan to revoke any certificate issued to a CN with netid.washington.edu in it. Naming a computer with netid.washington.edu as the DNS suffix violates the computer naming guidance for computers joined to the NETID domain.
Each delegated OU can choose to optionally add computers in their OU to a group for which they are the member managers. Membership in the group will trigger the Windows certificate agent to look for certificate templates they are allowed to auto-enroll for. The certificate agent then submits a request for the cert(s), the CA approves/signs the cert(s), and the certificate agent stores the cert in its certificate store. We've limited which certificates are available so that initially only the single certificate described above is available. We've also designed this offering so that you can only choose to opt-in computers in your own OU-no one else can opt your computers in. To get a certificate issued, a delegated OU admin would add computers to u_msinf_delou_<ou>_computers_adcs-autoenroll, where <ou> is your delegated OU name. Note that u_msinf_<ou>_oucontacts are member managers of this group, with UW-IT retaining administrator privileges. Also note that this group has a membership dependency on u_msinf_<ou>_computers, which is the set of all computers in your OU. For more detailed technical information on how the certificate enrollment process works, see the Troubleshooting Help section.
The UW Microsoft Infrastructure service supports the AD-CS certificate authorities used to provide this capability. You support the client computers using this capability. We have extensive troubleshooting guidance below which we encourage you to use. You can and should submit a request to help@uw.edu with AD-CS in the subject line if you have a certificate problem you need help with, however, if the problem is on the client-side, our assistance is limited.
A lot happens under the covers to enable the magic of automated certificate enrollment, and to be comprehensive would mean this section would be very lengthy. Note that there are three key components which enable the magic of automated certificate enrollment:
Some general help:
To enable cert logging:
In HKCU\Software\Microsoft\Cryptography\Autoenrollment and HKLM\Software\Microsoft\Cryptography\Autoenrollment, create a new DWORD value named AEEventLogLevel and set its value to 0.
To manually trigger auto-enrollment:
gpupdate /force
To check logs for error messages:
In the Application event log, refresh the log to see what happens during autoenrollment. Two computer autoenrollment messages (start, stop) should occur first, followed by two user autoenrollment messages (start, stop) in 30 sec. - 2 minutes. Any issued certs should appear in the log as Event ID 18's or 19's. Stop and Start messages are event IDs 2 and 3.
To dig deeper, we recommend reviewing:
as they are two excellent detailed descriptions oriented at troubleshooting that get at what might go wrong.
Problem
|
Background
|
Workaround(s)
|
---|---|---|
The client computer may not have auto-enrollment enabled | By default, any computer that is added to one of the u_msinf_delou_<ou>_computers_adcs-autoenroll groups will have a GPO at the NETID domain root applied which enables this. |
|
The client has connectivity issues reaching the issuing CA or AD which prevent a cert request/enrollment | A restrictive firewall or not being connected to the UW network will mean the client is unable to contact the NETID domain for certificate templates or the netid-issuing-CA to request and receive a cert. |
|
This is a 2-tier certificate authority with an offline root CA. An AD root CA named netid-root-CA is AD published, meaning domain-joined computers trust it by default. This is currently shroud.netid.washington.edu. This CA is offline to provide greater security but is brought online to republish the certificate revocation list (CRL). An AD integrated issuing CA named netid-issuing-CA is AD published, meaning domain-joined computers trust it by default and it can issue certificates. This is currently fulcrum.netid.washington.edu. If you need to get a copy of the CA certs, they are available at:
Note: our older/retired CA certs are also still available at:
At this time, we are not providing AD-CS web services (this provides a web service API to request and retrieve certs which enables non-Windows and cross-forest client scenarios). This means clients are limited to those which are domain-joined and leverage the secure-channel trust provided within a forest.
CDP config:
CRL publishing schedule: 5 years
Publish CRLs and Delta CRLs to this location:
http://thrawn.uw.edu/CertEnroll/<CaName><CRLNameSuffix><DeltaCRLAllowed>.crl
AIA config:
ldap:///CN=<CATruncatedName>,CN=AIA,CN=Public Key Services,CN=Services,<ConfigurationContainer><CAObjectClass>
http://thrawn.uw.edu/CertEnroll/<ServerDNSName>_<CaName><CertificateName>.crt
CDP config:
CRL publishing schedule: 1 week
Publish delta CRLs: 1 day
Publish CRLs and Delta CRLs to this location (no line break):
ldap://CN=<CATruncatedName><CRLNameSuffix>,CN=<ServerShortName>,
CN=CDP,CN=Public Key Services,CN=Services,<ConfigurationContainer><CDPObjectClass>
http://thrawn.uw.edu/CertEnroll/<CaName><CRLNameSuffix><DeltaCRLAllowed>.crl
AIA config:
ldap:///CN=<CATruncatedName>,CN=AIA,CN=Public Key Services,CN=Services,<ConfigurationContainer><CAObjectClass>
http://thrawn.uw.edu/CertEnroll/<ServerDNSName>_<CaName><CertificateName>.crt