To configure a Microsoft Certificate Authority (Microsoft CA), you must complete procedures on two different machines.
● Microsoft CA—The Microsoft CA is located on a Domain Computer or Domain Controller. For additional details on Microsoft certificate authorities see: https://docs.microsoft.com/en-us/windows/win32/seccertenroll/about-certification-authorities.
Note: Identity as a Service supports only Microsoft Enterprise CA.
● Microsoft CA Proxy Server—The interfacing component that communicates to the Microsoft CA. This component must be deployed on a domain-joined machine in the same domain as the Microsoft CA.
If you are publishing certificates to Active Directory, the subject dn of your generated certificates must correctly identify the associated user in Active Directory. If you are using AD Sync to sync users to Identity as a Service, the certificate subject DN is automatically set with the user's DN. See Configure a DN attribute for Microsoft CA for more information.
The use of a Microsoft CA with Identity as a Service involves the following components and interactions:
Before you begin, you need a machine that will host the Microsoft Certification Authority Proxy with the following:
● Windows Server 2016 (x64) and above
● Java 11 version or later of Oracle Java, OpenJDK, or AdoptOpenJDK. To check the Java installation, run java -version
● Install the Microsoft CA Proxy on the Microsoft CA Proxy Server.
Create a domain administrator
You need to create a domain administrator account with the following Certificate Authority permissions:
– Issue and Manage Certificates
– Request Certificates
1. Create a domain administrator account.
2. Set
the Certificate Authority permissions.
Upgrade to Microsoft Proxy 2.7.10
1. Go to the directory where Microsoft CA Proxy 2.5.4 is installed (for example, c:\mscaproxy).
2. Run the following command as an administrator:
MSCAProxy stop
MSCAProxy uninstall
3. Rename the Microsoft CA Proxy 2.5.4 directory as follows:
move c:\mscaproxy c:\mscaproxy2.5.4
Note: If you get an error accessing the files, perform a reboot and run the command again to move the files.
4. Install the Microsoft CA Proxy 2.7.10
5. Complete the Microsoft CA Proxy 2.7.10 upgrade.
Install the Microsoft CA Proxy 2.7.10
1. Download the Microsoft CA Proxy server installation file form Identity as a Service:
a. Click
> Resources
> Gateways.
The Gateways
page appears.
b. Click
Microsoft CA Proxy. The Microsoft
CA Proxy Download URL dialog box appears.
c. In the Microsoft CA Proxy
Download URL dialog box, click
Microsoft CA Proxy to download the msca-proxy-install-2.7.10-158.zip
file.
2. Copy the msca-proxy-install-2.7.10-158.zip file to your Microsoft CA Proxy server machine.
3. Unzip the contents of the compressed file in a local directory of the Windows machine (for example, c:\mscaproxy).
4. Run the following command as an administrator:
MSCAProxy install /p
Note: The /p option is required in order to be prompted to use a domain administrator account with the required permissions as mentioned below.
5. At the username and password prompt, use a domain administrator account with the following permissions on the CA:
● Issue and manage certificates
● Request certificates
Note: When entering the domain administrator, the value should be of the form domain\username, for example, mydomain\myadmin.
Complete the Microsoft CA Proxy 2.7.10 upgrade
1. Do the following to maintain the existing ssl keys, certificates, and configuration:
xcopy c:\mscaproxy2.5.4\config\* c:\mscaproxy\config /I
xcopy c:\mscaproxy2.5.4\ssl\* c:\mscaproxy\ssl /I
xcopy c:\mscaproxy2.5.4\tmp\* c:\mscaproxy\tmp /I (or xcopy c:\mscaproxy\client\* c:\mscaproxy\client /I)
2. Update the keystore and truststore passwords. These will be re-encrypted using the latest MSCA Proxy version.
a. Go to <msca_install>/config and open key-store-password.scrt with a text editor.
b. Change encrypted=<encrypted-keystorepwd> to decrypted=<keystorepwd> where <decrypted-keystorepwd> is the decrypted password of the JKS keystore used with the Microsoft CA Proxy Server.
c. Save and close the file.
d. Go to <msca_install>/config and open trust-store-password.scrt with a text editor.
e. Change encrypted=<encrypted-truststorepwd> to decrypted=<decrypted-truststorepwd> where <decrypted-truststorepwd> is the decrypted password of the JKS truststore used with the Microsoft CA Proxy Server.
f. Save and close the file.
3. As an administrator, run the following command:
MSCAProxy start
There are many topics in this section. It is important that you complete the procedures in the following order:
● Create a Microsoft CA Enrollment Agent
● Create a Microsoft CA Key Recovery Agent
● Configure Microsoft CA for PIV certificate templates
● Configure Microsoft CA Proxy
● Create PIV CS PKCS12 store (PIV PFX)
● Configure a Microsoft CA in IDaaS
● Edit, test, and refresh a Microsoft CA
● Configure a certificate subject DN attribute for Microsoft CA
● Export a Microsoft CA trust chain