Configure a Microsoft CA

To configure a Microsoft Certificate Authority (Microsoft CA), you must complete procedures on two different machines.

       Microsoft CA—The Microsoft CA is located on a Domain Computer or Domain Controller. For additional details on Microsoft certificate authorities see:  https://docs.microsoft.com/en-us/windows/win32/seccertenroll/about-certification-authorities.

Note: Identity as a Service supports only Microsoft Enterprise CA.

       Microsoft CA Proxy ServerThe interfacing component that communicates to the Microsoft CA. This component must be deployed on a domain-joined machine in the same domain as the Microsoft CA.

If you are publishing certificates to Active Directory, the subject dn of your generated certificates must correctly identify the associated user in Active Directory. If you are using AD Sync to sync users to Identity as a Service, the certificate subject DN is automatically set with the user's DN. See Configure a DN attribute for Microsoft CA for more information.

Overview

The use of a Microsoft CA with Identity as a Service involves the following components and interactions:

Prerequisites

Before you begin, you need a machine that will host the Microsoft Certification Authority Proxy with the following:

       Windows Server 2016 (x64) and above

       Java 11 version or later of Oracle Java, OpenJDK, or AdoptOpenJDK. To check the Java installation, run java -version

       Install the Microsoft CA Proxy on the Microsoft CA Proxy Server.

Create a domain administrator

You need to create a domain administrator account with the following Certificate Authority permissions:

  Issue and Manage Certificates

  Request Certificates

1.      Create a domain administrator account.

2.      Set the Certificate Authority permissions.

Upgrade to Microsoft Proxy 2.7.10

1.      Go to the directory where Microsoft CA Proxy 2.5.4 is installed (for example, c:\mscaproxy).

2.      Run the following command as an administrator:

MSCAProxy stop

MSCAProxy uninstall

3.      Rename the Microsoft CA Proxy 2.5.4 directory as follows:

move c:\mscaproxy c:\mscaproxy2.5.4

Note: If you get an error accessing the files, perform a reboot and run the command again to move the files.

4.      Install the Microsoft CA Proxy 2.7.10

5.      Complete the Microsoft CA Proxy 2.7.10 upgrade.

Install the Microsoft CA Proxy 2.7.10

1.      Download the Microsoft CA Proxy server installation file form Identity as a Service:

a.      Click > Resources > Gateways. The Gateways page appears.

b.      Click  Microsoft CA Proxy. The Microsoft CA Proxy Download URL dialog box appears.

c.      In the Microsoft CA Proxy Download URL dialog box, click  Microsoft CA Proxy to download the msca-proxy-install-2.7.10-158.zip  file.

2.      Copy the msca-proxy-install-2.7.10-158.zip file to your Microsoft CA Proxy server machine.

3.      Unzip the contents of the compressed file in a local directory of the Windows machine (for example, c:\mscaproxy).

4.      Run the following command as an administrator:

MSCAProxy install /p

Note: The /p option is required in order to be prompted to use a domain administrator account with the required permissions as mentioned below.

5.      At the username and password prompt, use a domain administrator account with the following permissions on the CA:

       Issue and manage certificates

       Request certificates

Note: When entering the domain administrator, the value should be of the form domain\username, for example, mydomain\myadmin.

Complete the Microsoft CA Proxy 2.7.10 upgrade

1.      Do the following to maintain the existing ssl keys, certificates, and configuration:

xcopy c:\mscaproxy2.5.4\config\* c:\mscaproxy\config /I

xcopy c:\mscaproxy2.5.4\ssl\* c:\mscaproxy\ssl /I

xcopy c:\mscaproxy2.5.4\tmp\* c:\mscaproxy\tmp /I (or xcopy c:\mscaproxy\client\* c:\mscaproxy\client /I)

2.      Update the keystore and truststore passwords. These will be re-encrypted using the latest MSCA Proxy version.

a.      Go to <msca_install>/config and open key-store-password.scrt with a text editor.

b.      Change encrypted=<encrypted-keystorepwd> to decrypted=<keystorepwd>  where <decrypted-keystorepwd> is the decrypted password of the JKS keystore used with the Microsoft CA Proxy Server.

c.      Save and close the file.

d.      Go to <msca_install>/config and open trust-store-password.scrt with a text editor.

e.      Change encrypted=<encrypted-truststorepwd> to decrypted=<decrypted-truststorepwd>  where <decrypted-truststorepwd> is the decrypted password of the JKS truststore used with the Microsoft CA Proxy Server.

f.        Save and close the file.

3.      As an administrator, run the following command:

MSCAProxy start

 

There are many topics in this section. It is important that you complete the procedures in the following order:

       Create a Microsoft CA Enrollment Agent

       Create a Microsoft CA Key Recovery Agent

       Configure Microsoft CA for PIV certificate templates

       Configure Microsoft CA Proxy

       Create PIV CS PKCS12 store (PIV PFX)

       Configure a Microsoft CA in IDaaS

       Edit, test, and refresh a Microsoft CA

       Configure a certificate subject DN attribute for Microsoft CA

       Export a Microsoft CA trust chain