Create the request
- Open an MMC window
- Add the Certificates snap-in
- Note: certain certificates can only be requested by user or computer accounts; set the snap-in account appropriately
- Expand Certificates then right click on Personal
- Select All Tasks then Advanced Operations then Create custom request then Request New Certificate...
- Click Next then select Active Directory Enrollment Policy
- Click Next then select the appropriate check the box next to the name of the desired template
- Utilize VMware SSL 6.5 for any VMware products or interaction
- Utilize Server (10 Year Duration) for long duration use cases (requires permissions from the AD team)
- Utilize Web Server with IPSEC for default use cases that require IPSec (such as printers that need IPsec and HTTPS)
- Utilize Web Server 2048 bit key for all other default cases
- Click Next
- Click on Details on the desired template to expand the request information and then click Properties
- Set the Subject name type drop down to Common name
- Set the Subject name value to the FQDN for the certificate then click Add to include the value on the certificate
- Set the Alternate name type drop down to DNS name
- Set the Alternate name value to the FQDN for the certificate then click Add to include the value on the certificate
- Repeat the previous step as necessary to add additional FQDNs to the certificate
- Click OK then click Next
- Specify a file name for the certificate request and click Finish.
- The commands below assume a file name of certreq.txt
Submit the request
- Determine the appropriate certificate authority for the request.
- Identify the short name of the certificate template from certificate request
- The template short name is the template display name without spaces unless it has the (10 year duration) suffix
- Ex. the Web Server 2048 bit key certificate template has a short name of WebServer2048bitkey
- The template short name for 10 year duration certificates is the portion outside of the parentheses with -10year appened
- Ex. the Server (10 year duration) certificate template has a short name of Server-10year
Open an administrative PowerShell session as the user that has permissions to request the certificate
In the same PowerShell session, set the $cert_template variable to the certificate template short name.
Code Block $cert_template = "WebServer"In the same PowerShell session, attempt to submit the certificate request directly:
Code Block certreq -submit -attrib CertificateTemplate:$cert_template certreq.txt- When prompted for a certificate authority, select the CA step identified in step 1
- If the process succeeds, continue to the next section
- If the process failed, send email to ad-requests@its.utexas.edu with the following information:
- The request file
- The name of the user that attempted to enroll for the certificate
- The name of the CA
- The name of the template
Process the request (certificate administrators only)
- Open an MMC window
- Add the Certification Authority snap-in
- See (AAD) Certificates - CA list and naming conventions for the list of current CAs
- Unless otherwise required, select the latest production CA
- Expand Certification Authority then right click on the CA
- Select All Tasks then Submit new request...
- In the Open Request File dialog, select the request file saved in the previous section
- In the Save Certificate dialog, specify the file name and location for the certificate
Combine the keys
- Open an MMC window
- Add the Certificates snap-in
- Note: certain certificates can only be requested by user or computer accounts; set the snap-in account appropriately
- Expand Certificates then right click on Certificate Enrollment Requests
- Select All Tasks then Import...
- Click Next
- In the File to Import pane, specify the certificate file saved from the CA
- Click Next twice then click Finish
...
- click Enroll
Export the keypair (optional)
- Open an MMC window
- Add the Certificates snap-in
- Note: certain certificates can only be requested by user or computer accounts; set the snap-in account appropriately
- Expand Certificates then Certificate Enrollment Requests then Certificates
- Right click on the certificate to export and select All tasks... then Export...
- Click Next then select Yes, export the private key
- Click Next twice
- Check the Password box and set a complex password
- Click Next
- Specify a file name for the certificate request
- Click Next then click Finish