3.manage Certificates Part 1 PDF
3.manage Certificates Part 1 PDF
3.manage Certificates Part 1 PDF
aspx
Introduction
Exercise 1 - Managing Certificate Templates
Exercise 2 - Configuring Certificate Auto Enrollment
Exercise 3 - Implementing Key Archival
Exercise 4 - Enrolling for User Certificate
Exercise 5 - Managing Key Recovery
Summary
Introduction
The Manage Certificates Part 1 module provides you with the instruction and
server hardware to develop your hands on skills in the defined topics. This module
includes the following exercises:
Lab Time: It will take approximately 1 hour to complete the exercises in this lab.
Exam Objectives
Lab Diagram
During your session you will have access to the following lab configuration.
In this module you will be working on the following equipment to carry out the steps
defined in each exercise.
To start, simply choose a device and click Power on. In some cases, the devices may
power on automatically.
For further information and technical support, please see our Help and
Support page.
Copyright Notice
This document and its content is copyright of Practice-IT - © Practice-IT 2017. All rights reserved.
Any redistribution or reproduction of part or all of the contents in any form is prohibited other than
the following:
1. You may print or download to a local hard disk extracts for your personal and non-commercial use
only.
2. You may copy the content to individual third parties for their personal use, but only if you
acknowledge the website as the source of the material. You may not, except with our express written
permission, distribute or commercially exploit the content. Nor may you transmit it or store it in any
other website or other form of electronic retrieval system.
In this exercise, you will first install AD Certificate Services and its required
components and later customize the certificate template properties.
To get more information about managing certificate templates, please refer to your
course material or use your preferred search engine to research this topic in more
detail.
Step 1
Ensure you have powered on the required devices indicated in the Introduction.
In the Server Manager > Dashboard window, click on the Tools menu and select
Windows PowerShell.
Step 2
Please note that Windows PowerShell commands are not case-sensitive.
Press Enter.
Step 3
Please wait while installation of the selected Windows features is in progress. This will
take a few minutes.
Important: You may notice a bit of a time lag about 2 minutes as the features
are being installed. Installation may seem to have frozen or stopped processing.
Should this happen, click inside the Windows PowerShell window and press
Enter to refresh the screen. If you are using HTML5 client, pressing Enter will
display the Clipboard window. Close the clipboard window if it opens while
working in the labs.
Step 4
Windows PowerShell confirms the successful installation of the Active Directory
Certificate Services and Certification Authority Web Enrollment features.
In the earlier task, you simply added the AD Certificate Services and CA Web
Enrollment features into Windows. It is essential that those two services be installed
and configured with their respective system settings to make them capable of issuing
certificates to requesting user, computer or service.
To install and configure AD Certificate Services and CA Web Enrollment, perform the
following steps:
Step 1
In PLABDM01, Windows PowerShell is open.
Install-AdcsCertificationAuthority -CAType
EnterpriseRootCA
Press Enter.
Press Enter.
Step 2
The installation of AD Certification Authority is successfully confirmed with ErrorId of
“0.”
Install-AdcsWebEnrollment
Press Enter.
On the next prompt to install AD Certification Authority Web Enrollment with default
settings, type:
Press Enter.
Step 3
The installation of AD Certification Authority Web Enrollment is successfully
confirmed with ErrorId of “0.”
Step 4
Click Server Manager icon from taskbar.
In the Server Manager > Dashboard window, click Tools and select
Certification Authority.
Step 5
The certsrv - [Certification Authority (Local)] window opens.
The details pane of the Certificates Template folder at the right, indicates the type
of certificates can be issued by PLABDM01.
Keep the devices you have powered on in their current state and proceed to the
next exercise.
Enrollment for machine or user certificate can be done manually by using certificates
request wizard through the Microsoft Management Console (MMC) in a small
organization. For big companies that maintain hundreds of network users, certificate
enrollment can be streamlined by customizing a certificate template. A customized
certificate template allows you to set properties such as auto enrollment and simplify
certificates deployment to domain users by using Group Policy Objects.
In this exercise, you will learn how to manage certificates by setting the different
properties for a custom template such security that indicate which user or security
group has access to the certificate, timeline that illustrate validity of an issued
certificate and other properties relating to a certificate templates.
To learn more about managing certificate templates and enrollment, please refer to
your course material or use your preferred search engine to research this topic in more
detail.
Step 1
On PLABDM01, the Certification Authority console window is open.
Step 2
The Certificate Templates Console window opens.
Scroll down the templates list and right-click on User, then select Duplicate
Template.
Step 3
On the Properties of New Template dialog box, click General tab.
Step 4
In the General tab, click in the Template display name text box and type-over the
existing text with the following:
SecureUser
Click Apply.
Step 5
In the Request Handling tab, select Prompt the user during enrollment
option.
Click Apply.
Note: For the purpose of this lab, we will use this option Prompt the user during
enrollment. In an actual deployment, users are not prompted by any message
when they are automatically enrolled for a certificate.
Figure 2.4 Screenshot of PLABDM01: The Properties of New Template dialog box is
displayed.
Step 6
In the Security tab, ensure that Authenticated Users security group is selected.
Click Apply.
Step 7
In the Superseded Templates folder tab and click Add.
Step 8
In the Add Superseded Template tab, scroll down the list of Certificate templates.
Step 9
Back in the Superseded Templates tab, the User template is now added.
Click Apply.
Step 10
In the Subject Name tab, clear the following check boxes:
Click OK.
Note: You cleared the two check boxes as AD users in Practice Labs domain do
not have those attributes defined in their accounts.
Step 11
Close Certificate Templates Console window.
Step 12
Next is to include SecureUser certificate template in the list of certificates that can
issued by PLABDM01.
Ensure that you are back on the Certification Authority console window.
Step 13
In the Enable Certificate Templates dialog box, scroll down the list of templates
and select SecureUser and click OK.
Step 14
If you get a system message indicating that the certificate couldn’t be added this time,
click Cancel. This can happen due to some system delays in the Certification Authority
Server.
Start over with Step 13 to attempt to add the new certificate template.
You have just added SecureUser template as one of the certificate templates that can
be issued by PLABDM01 server.
In this task you will create a Group Policy Object to automate the deployment of user
certificates to domain network users.
To create a GPO for user certificate auto-enrollment, perform the following steps:
Step 1
Connect to PLABDC01.
In the Server Manager > Dashboard window, click Tools menu and select Group
Policy Management.
Step 2
In the Group Policy Management console window, expand Forest:
PRACTICELABS.COM > Domains > PRACTICELABS.COM > APAC and click
IT organizational unit.
Right-click on IT OU and select Create a GPO in this domain and link it here…
Step 3
In the New GPO dialog box, type:
Click OK.
Figure 2.14 Screenshot of PLABDM01: The New GPO dialog box is displayed.
Step 4
Expand the IT OU then right-click on Certificate Auto Enrollment group policy
object link.
Note: If the Group Policy Management Console message box appears indicating
you have selected a link to a Group Policy Object (GPO), click Do not show this
message again check box then click OK.
Select Edit.
Step 5
The Group Policy Management Editor window opens.
Expand User Configuration > Policies > Windows Settings > Security
Settings then click Public Key Policies.
Observe the Public Key Policies details at the right. Then right-click on Certificate
Services Client - Auto-Enrollment and select Properties.
Step 6
In the Certificate Services Client-Auto-Enrollment… dialog box, change the
Configuration Model drop-down list to Enabled.
Step 7
A number of check boxes will become available as a result.
Click OK.
Step 8
Close Group Policy Management Editor application window.
Step 9
Right-click on Start and select Command Prompt from the shortcut menu.
Step 10
To propagate the new user Group Policy settings to the domain, type:
gpupdate /force
Press Enter.
exit
Press Enter.
After configuring the certificate auto enrolment policy in the previous task, you will
now sign on as a domain user located in the IT organizational unit and verify that a
certificate is issued to the user.
Step 1
You need to temporarily disable server auto login to be able log on to the lab devices
using another user account.
Click the Access your settings tab, under Device > Server auto login, click the
Disable button. Please note that this Server auto login setting is saved in your
profile and will apply in EVERY lab session that you will perform with Practice Labs.
Please note that you can select Enable button again in the Device > Server auto
login to have the convenience of being automatically logged on as the default
administrator after this exercise.
Step 2
Connect to PLABWIN10 computer.
Important: Since Server auto logon was disabled previously, you may see the
PRACTICELABS\Administrator already signed in. If this is the case, please
sign out PRACTICELABS\Administrator from PLABWIN10.
Step 3
In the User name box, type:
lisa.scott
Passw0rd
Press Enter.
Step 4
If the Application Install - Security Warning message box appears, click Close
[x] button.
Step 5
When signed on, access the system tray and click the arrow to expand.
You should get a certificate icon. Then click on the certificate icon to proceed with the
enrollment of the user certificate for Lisa Scott.
Important: There will be a slight delay about 1 minute, before the certificate
icon appears at the system tray. If you don't get a certificate, open a command
prompt and type gpupdate /force. A certificate icon will appear on the system
tray. If no certificate icon appears, sign out and sign back in as lisa.scott.
Step 6
In the Certificate Enrollment, Before you begin page, click Next.
Step 7
34 of 128 24-01-2020, 15:47
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
The Request Certificates page will display SecureUser certificate template that
you created earlier.
Click Enroll.
Step 8
Please wait while certificate enrolment is being processed.
Step 9
Lisa Scott will enroll successfully for the SecureUser certificate template.
Click Finish.
The certificate issued to Lisa Scott can be used for a number of tasks like protecting her
personal files using EFS and send encrypted e-mail messages, if there is an existing
e-mail server in the network.
Step 10
Right-click Start and mouse over Shut down or sign out.
Keep the devices you have powered on in their current state and proceed to the
next exercise.
In this exercise, you will learn to how set up key archival by first enabling a key
recovery agent in certification authority and issue a recovery agent certificate to the CA
administrator.
To get additional information about how to configure key archival, please refer to your
course material or use your preferred search engine to research this topic in more
detail.
The Key Recovery Agent role is security-sensitive role that must be manually
configured to be able to recover lost keys issued by the Certification Authority to users
in the domain network. In this task, you will enable the administrator account for Key
Recovery Agent role.
Step 1
Connect to PLABDM01 device.
Step 2
In the Certificate Authority window, right-click on Certificate Templates folder
and select New > Certificate Template to Issue.
Step 3
In the Enable Certificate Templates dialog box, scroll down the list.
To request for a Key Recovery Agent Certificate for the administrator account, do the
following steps:
Step 1
In the next few steps, you will enroll the PRACTICELABS\Administrator account
to use a Key Recovery Agent certificate.
Step 2
mmc
Click OK.
Step 3
In the Console1 window, click File and select Add/Remove Snap-in.
Step 4
In the Add or Remove Snap-ins window, select Certificates and click Add.
Step 5
In the Certificates dialog box, ensure that My user account option is selected.
Click Finish.
Step 6
Click OK to close Add/Remove Snap-ins dialog box.
Step 7
Back on the Console1 window.
Then right-click on Personal folder, point to All Tasks and select Request New
Certificate.
Step 8
Click Next in the Before you begin page.
Step 9
In the Select Certificate Enrollment Policy page, click Next.
Step 10
In the Request Certificates page, select Key Recovery Agent check box.
Click Enroll.
Step 11
Please wait while enrolment for Key Recovery Agent is being processed.
Click Finish when Certificate Installation Results page reports a pending enrollment.
Step 12
Minimize Console1 window.
To approve the issuance of the Key Recovery Agent Certificate, perform the following
steps:
Step 1
On PLABDM01, restore the Certification Authority window from the taskbar.
Step 2
Click on the Issued Certificates folder, right-click on the certificate based on Key
Recovery Agent template.
Step 3
In the Certificates dialog box, click Details tab.
Step 4
Under the Details tab, click Copy to File.
Step 5
In the Welcome to the Certificate Export Wizard page, click Next.
Step 6
In the Export File Format page, the default DER encoded binary X.509 (.CER)
format option is selected.
Step 7
In the File to Export page, click in the File name box and type:
c:\AdminKRA
Click Next.
Step 8
Click Finish when you see Completing the Certificate Export Wizard box.
Step 9
Click OK when the message box "The export was successful" appears.
Step 10
Restore the Console1 window from the taskbar.
Right-click on Personal folder then point to All Tasks and select Import.
Step 11
In the Welcome to the Certificate Import Wizard page, click Next.
Step 12
In the File to Import page, click in the File name box and type:
c:\AdminKRA.cer
Click Next.
Note: Please note that you can use Browse… button to find the
AdminKRA.cer certificate file.
Step 13
In the Certificate Store page, click Next to accept the default location for certificate
in the Personal store.
Step 14
When the Completing the Certificate Import Wizard page appears, click Finish.
Step 15
Click OK when prompted that the import was successful.
Step 16
Back in the Console1 window, expand Certificates - Current User > Personal
and click Certificates folder.
Notice the certificate issued to Administrator with the Intended Purpose -Key
Recovery Agent is now available.
In this task, you will configure the Certification Authority to keep a copy of all issued
certificates by enabling key archival.
Step 1
On PLABDM01 server, restore Certification Authority window from taskbar if not
yet open.
Step 2
In the PRACTICELABS-PLABDM01-CA Properties window, select Recovery
Agents tab.
Step 3
Under the Recovery Agents tab, click Archive the key option.
Click Add…
Step 4
The Key Recovery Agent Selection message box displays the certificate that was
issued earlier to the Administrator.
Click OK.
Step 5
Back in the PRACTITCELABS-PLABDM01-CA Properties dialog, click OK when
the certificate is added.
Step 6
In the Certification Authority message box, select Yes to restart Active Directory
Certificate Services.
Step 7
Please wait while the Active Directory Certificate Services is stopped and started.
In this task, you will create a duplicate of an existing certificate template, then
customize the properties of the new template and enable it for certificate archiving.
To enable a custom certificate template for archiving, perform the following steps:
Step 1
On PLABDM01, ensure that the Certification Authority window is open.
Select Manage.
Step 2
In the Certificate Templates Console window, scroll down and right-click on User
then select Duplicate Template.
Step 3
In the Properties of New Template window, click General tab.
Step 4
In the General tab, in the Template display name box, type-over the existing text
with the following:
EFSUser
Click Apply.
Step 5
Under the Request Handling tab, click on Archive Subject's encryption
private key check box.
Step 6
The Changing Key Archival Property message box appears saying "Key archive
is only enabled for future certificates" just click OK.
Step 7
Back in the Properties of New Template dialog box, click Apply.
Step 8
In the Subject Name tab, clear the following check boxes:
Note: The check boxes indicated above were cleared as the user accounts in the
domain lab do not have those attributes or properties.
Click Apply.
Go to Security tab.
Step 9
In the Security tab, select Authenticated Users, click Enroll check box.
Step 10
Close the Certificate Templates Console window.
Step 11
Ensure that you are back to Certification Authority console window.
Step 12
In the Enable Certificate Templates dialog box, select EFSUser and click OK.
Keep all devices powered on in their current state and proceed to the next
exercise.
In this task, you will test a new user to enroll for a custom certificate that was enabled
for certificate archiving.
To learn more about enrolling for a user certificate, please refer to your course material
or use your preferred search engine to research this topic in more detail.
In this task, you sign-in as a regular user and request for a certificate based on the
EFSUser custom template.
Step 1
Connect to PLABWIN10 device.
Step 2
In the User name text box, type:
paul.westin
Passw0rd
Press Enter.
Step 3
As before, click Agree when presented with the BGInfo License Agreement
window.
If the Application Install - Security Warning message box appears, click Close
[X].
Step 4
In the Run dialog box, type:
mmc
Press Enter.
Step 5
In the blank MMC console, click File menu and choose Add Remove Snap-in.
Step 6
In the Add or Remove Snap-ins dialog box, select Certificates and click Add.
Step 7
Click OK to close Add or Remove Snap-ins dialog box.
Step 8
In the Console1 window, expand Certificates-Current User node.
Step 9
In the Before you begin page, click Next.
Step 10
In the Select Certificate Enrollment Policy page, choose Next.
Step 11
In the Request Certificates page, select EFSUser check box and click Enroll.
Step 12
In the Certificate Installation Results page, click Finish.
Important: If you get a certification root not trusted error, click Close. This
error usually manifests itself when the PLABWIN10 computer is unable to detect
the newly-added custom certificate template called EFSUser. You can resolve
this error by first saving Console1 on desktop for easy access. Then restart
PLABWIN10. Start over with Task 1 - Request for new certificate.
The user has been successfully enrolled for a certificate that can be used for a number
of applications like encrypting file system (EFS).
In this task, you will encrypt a folder using the certificate that was issue to the domain
user.
Step 1
On PLABWIN10, user Paul Westin is signed in.
Step 2
In the File Explorer window, expand This PC node then click Local Disk C drive.
Step 3
Click EFSUser folder and create a text document.
Step 4
Open Confidential memo text file and type a one liner text, such as:
Step 5
Right-click on Confidential memo text document and select Properties.
Step 6
In the Confidential memo Properties dialog box, from the General tab, click
Advanced.
Step 7
In the Advanced Attributes window, select Encrypt contents to secure data.
Click OK.
Step 8
Similarly, click OK on the Confidential memo Properties dialog box to save
changes.
Step 9
In the Encryption Warning message box, verify that Encrypt the file and parent
folder (recommended) option is selected.
Click OK.
Step 10
You will notice a mini lock icon is added to the Confidential memo text document.
This indicates that the text document and the folder are now encrypted.
Right-click Start charm and mouse-over Shut down or sign out and click Sign
out.
In this task, you will test the functionality of the Key Recovery Agent user account by
deleting a user object, re-create it and then recover its lost keys.
Step 1
Connect to PLABDC01.
Click Tools menu and select Active Directory Users and Computers.
Step 2
Step 3
Click Yes to proceed with the deletion of the user account.
Step 4
To test recovery agent functionality, you will re-create a user named Paul Westin in
NAmerica/Operations OU using the same properties of the mentioned user.
While Operations OU is selected, right-click on the details pane and select New >
User.
Step 5
In the New Object - User dialog box, in the First name text box, type:
Paul
Westin
paul.westin
Click Next.
Step 6
In the Password and Confirm password text boxes, type:
Passw0rd
Clear User must change password at next logon check box.
Click Next.
Figure 4.19 Screenshot of PLABDC01: The New Object - User dialog box is
displayed.
Step 7
Click Finish when you reach the summary page.
Figure 4.20 Screenshot of PLABDC01: The New Object - User dialog box is
displayed with a summary about the new user.
To see the effects accessing the encrypted folder using a re-created the user account,
perform the following steps:
Step 1
Connect PLABWIN10 computer.
Step 2
As before, sign-in as:
paul.westin
Passw0rd
Press Enter.
Step 3
Click Agree if presented with BGInfo License Agreement window.
Click Close [X] if the Application Install - Security Warning message box
appears.
Step 4
Launch File Explorer from taskbar.
Then expand This PC > Local Disk (C:) drive and click EFSUser folder.
Step 5
You get an access denied message, because Paul Westin doesn't have the certificate to
unlock this file.
This is the result of deleting the user account that was performed in an earlier task.
Click OK.
In the next exercise, you will recover Paul Westin’s certificate that was used to encrypt
the EFSUser folder and the file contained within it.
Keep all devices powered on in their current state and proceed to the next
exercise.
To learn more about managing and recovering archived keys, please consult your
reference material or use your preferred search engine to research this topic in greater
detail.
In this task, you will import keys that are archived on the PLABDM01.
Recall that you have imported the file called AdminKRA.cer into PLABDM01 in an
earlier exercise.
Step 1
Connect to PLABDM01.
Under Certificates- Current User node, expand Personal then click Certificates
folder.
Notice on the details pane at the right, the Key Recovery Agent certificate.
Important: The file you imported in this MMC is just .cer file which is not
capable of decrypting the encrypted file as this is only a certificate. You will need
to export this file into .pfx format that includes a certificate and key that will
unlock an encrypted file.
Step 2
Right-click Administrator certificate and point to All Tasks and select Export.
Step 3
Click Next in the Welcome to the Certificate Export Wizard page.
Step 4
In the Export Private Key page, select Yes, export the private key option button.
Click Next.
Step 5
In the Export file format page, verify that Personal Information Exchange -
PKCS #12 (.PFX) option button is selected.
Verify that Include all certificates in the certification path if possible check
box is selected as well.
Click Next.
Step 6
In the Security page, select Password check box.
Passw0rd
Click Next.
Figure 5.5 Screenshot of PLABDM01: The Security page is displayed and the
password is entered.
Step 7
In the File to Export page, click File name box and type:
c:\adminKRA
Please note that the extension name .pfx will be added automatically.
Click Next.
Step 8
Click Finish when Completing the Certificate Export Wizard page is displayed.
Step 9
Click OK when Windows notifies you that the certificate export was successful.
Step 10
After exporting the .cer to .pfx in the previous example, you will import the .pfx file
back into Console1.
The Administrator needs the .pfx file to be able to recover archived keys from the CA
server.
From Console1, select Personal folder right-click Certificates point to All Tasks
then select Import
Step 11
In the Welcome to the Certificate Import Wizard, click Next.
Step 12
In the File to Import page, click in the File name text box and type:
c:\adminKRA.pfx
Click Next.
Step 13
In the Private key protection page, in the Password text box, type:
Passw0rd
Click Next.
Step 14
In the Certificate Store page, verify that Place all certificates in the following
store is selected.
Click Next.
Step 15
In the Completing the Certificate Import Wizard page, click Finish.
Step 16
Click OK when the system tells you that the import was successful.
Step 17
Notice that a second certificate has been added to the list.
Step 18
Restore the Certification Authority console window from taskbar if not yet open.
Locate the column Requester name by expanding the column header and find
PRACTICELABS\paul.westin.
Please note the requester name indicated above as you will recover the archived
certificate of this user account.
To run the certutil.exe to recover archived keys in the PLABDM01 server, perform the
following steps:
Step 1
On PLABDM01 computer, right-click Start and select Command Prompt
(Admin) from the shortcut menu.
Step 2
In the command prompt type the following:
Press Enter.
Step 3
On the command prompt window, click the Command prompt icon on the top left
corner.
Step 4
To create a certificate that can unlock the encrypted file, you need to create a .PFX file
from the retrieved key file.
Press Enter.
Passw0rd
Press Enter.
Passw0rd
Press Enter.
Step 5
The .PFX file called paul.pfx is successfully created.
Step 6
Open File Explorer, navigate to Local Disk C > Windows > system32 folder.
Scroll down the list and locate paul - Personal Information file type.
Note that the file will look like a certificate with a key appended to it.
Step 7
Create a folder on Local Disk C: called paulwestin and paste the .pfx certificate file
there.
Step 8
You will share paulwestin folder to allow the user to access the .pfx file over the
network.
Step 9
On the paulwestin Properties window, select Sharing tab.
Step 10
Under the Sharing tab and click on Advanced Sharing.
Step 11
In the Advanced Sharing window, click Share this folder box and then click OK.
To verify that user Paul Westin can access the file that was encrypted earlier, perform
the following steps:
Step 1
Connect to PLABWIN10 where paul.westin is signed in.
Step 2
In the Map network drive window, in the Folder text box, type:
\\plabdm01\paulwestin
Click Finish.
Step 3
A new File Explorer window opens indicating a successful connection.
Step 4
In the Welcome to the Certificate Import Wizard page, click Next.
Step 5
The File to Import page, displays the path of the .pfx file.
Click Next.
Step 6
In the Private key protection page, type:
Passw0rd
Click Next.
Step 7
In the Certificate Store page, the Automatically select the certificate store
based on the type of certificate option is selected.
Click Next.
Step 8
When Completing the Certificate Import Wizard page shows up, click Finish.
Step 9
Click OK when import is successful.
Step 10
Back on File Explorer window, navigate to Local Disk C then click EFSUser
folder.
Step 11
Paul should be able to read the contents of the confidential file.
By default, when you connect to a device in Practice Labs you are automatically logged
in - usually as the administrator. For this task, you will need to re-enable this feature
and so you will be logged in automatically in the next exercise.
Step 1
On the Practice Labs web page, click the Access your settings tab.
Under the Device heading there is an option named Server auto login, click the
Enable button.
Result - You have completed the necessary tasks for managing certificate archiving
and recovery.
Shutdown all virtual machines used in this lab, by using the power functions
located in the Tools bar before proceeding to the next module. Alternatively, you
can log out of the lab platform.
Summary
In this module you covered the following topics: