To enable automatic certificate enrollment for your users, go to "User Configuration -> Policies -> Windows Settings -> Security Settings -> Public Key Policies" and double click on the "Certificate Services Client - Auto-Enrollment" policy.
As before, Auto-Enrollment is not enabled by default.
Enable the Auto-Enrollment of user certificates by selecting "Configuration Model : Enabled", then check the first 2 boxes :
On the user side, an additional box will allow you to display a notification to the user for certificates that are about to expire in the user and computer certificate store, if desired.
In order for computer and user certificates to be issued (via auto-enrollment), you will first need to force the policy update on the desired computer or server.
Note that in production, this will be done automatically during the periodic automatic update of group policies (GPO).
To do this, log in with a user from your Active Directory domain.
In our case, we will use the "InformatiUser" user created at the beginning of the tutorial.
Then, force update the policy on your computer or server.
Batch
gpupdate /force
Then, launch the "mmc" console.
In the "mmc" console that appears, click : File -> Add/Remove Snap-in.
Add the "Certificates" component.
Select "Computer account" to see the certificate issued to your computer or server.
Warning : this is only possible if you have administrator rights on the computer or server to which you are connected.
By default, users belonging to the "Domain Admins" group also have administrator rights on computers and servers linked to your Active Directory domain.
Then, leave the "Local computer" option selected and click Finish.
Add the "Certificates" component again.
But, this time, select "My user account" and click Finish.
As you can see, the "Certificates" component will be added 2 times : 1 time for the local computer and 1 time for the current user.
Click OK.
Go to "Certificates - Local Computer -> Personal -> Certificates".
As you can see, a certificate (along with its associated private key) has been automatically issued to your computer or server by your own certificate authority.
In our case, we are connected to our "win10-pc" client computer which is a member of our "informatiweb.lan" domain.
If you double click on this certificate, you will see that this one :
If you select the "Subject" field in the "Details" tab, you will see that the common name (CN) of this certificate corresponds to the full name (DNS name) of the computer or server concerned.
If you select the "Certificate Template Name" field, you will see that the certificate template used is "Machine".
If you select the "Enhanced Key Usage" field, you will see that this certificate can be used for :
This corresponds to the roles visible in the "General" tab.
If you select the "Subject Alternative Name" field, you will see that the full name of your computer or server is also included as the DNS name.
For the user certificate, go to : Certificates - Current User -> Personal -> Certificates.
As you can see, a certificate (along with its associated private key) was also automatically issued for your Active Directory user account by your own certificate authority.
In our case, we are connected as InformatiUser on our "win10-pc" client computer which is a member of our "informatiweb.lan" domain.
If you double click on this user certificate, you will see that this one :
If you select the "Subject" field in the "Details" tab, you will see that the common name (CN) of this certificate corresponds to your user name and that your email address (defined in your Active Directory user account settings) is also present in this certificate.
If you select the "Certificate Template Information" field, you will see that the certificate template used is : User v2 (in our case).
That is, the certificate template for which this user has "Enroll" and "Autoenroll" rights.
If you select the "Enhanced Key Usage" field, you will see that this certificate can be used for :
Ce qui correspond aux rôles visibles dans l'onglet "Général".
If you select the "Subject Alternative Name" field, you will see that your username will appear there.
Windows Server 1/19/2024
Windows Server 11/17/2023
Windows Server 10/6/2023
Windows Server 10/20/2023
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment