How do I force an autoenrollment certificate?

Description

This article describes how to deploy silent auto-enrollment with PKI Client. Be sure to complete the following prerequisites before proceeding any further.

Prerequisites:

  1. Setup and configure your PKI Manager Administrator account.
  2. Download and import your Root/Intermediate Certificate Authority (CA) certificate(s) via Group Policy Object (GPO).
  3. Enterprise Gateway (EGW) has been installed on a local Windows Server.

Note: Check PKI Manager to verify what Certificate Authority (CA) you are using in your Certificate Profile. If you are using a Subordinate CA, you need to make sure the certificate has been imported into the “Trusted Root Certification Authority” within your domain environment.

Getting Started:

  1. Download the PKI Client software from PKI Manager.
  2. Install the PKI Client software on a single client machine and harvest the ADMX and ADML files needed for the configuration of your Group Policy Object (GPO) configuration.  Alternatively, both files are available below this article in the attachment section for your convenience.
    • Open the following local directory, “C:WindowsPolicyDefinitions” and copy the “SymPKIClient4.admx” file from the client computer and paste the ADMX file on the AD server “\<AD Server Name>C$WindowsPolicyDefinitions”.
    • Open the following local directory, “C:WindowsPolicyDefinitionsen” and copy the “SymPKIClient4.adml” file from the client computer and paste the ADML file on the AD server “\<AD Server Name>C$WindowsPolicyDefinitionsen”.
  3. Log on to the Active Directory server and configure the Symantec PKI Client group policy:
    • Open Group Policy Management
    • Create or edit a GPO
    • Expand Computer Configuration
    • Expand Policies
    • Expand Administrative Templates
    • Click on “Symantec PKI Client
    • Double-click on “Managed PKI Auto-Enrollment Settings” and click on enable
    • Under “Gateway URL:” type in the URL of your RA Service (e.g. https://hostname)
    • Check to make sure the port numbers match the EGW port number already configured.
    • Click on “Next Settings” above and configure the “PKI Client Agent Settings”.
    • Set the “Agent Scan Base Interval” to the desired amount of time and then adjust the “Agent Scan Maximum Random Offset” to the desired time and then click on OK.
  4. Log on to a single client system that falls under the GPO you just configured, open a command prompt, and then type “gpupdate /force”.
  5. Type in “rsop.msc” to display the Resultant Set of Policy. You should see all Symantec PKI Client policies applied.
  6. Open the Symantec PKI Client and click on the icon labelled “My Computer”.
  7. Verify that you have successfully enrolled for your certificate.
  8. Done!

KB ID 0000919

Problem

SHA CERTIFICATE WARNING: Note This article was written some time ago, ensure your CA environment does NOT use SHA1 for your certificates, if it does, Please visit the following link for migration instructions;

Upgrade Your Microsoft PKI Environment to SHA2 (SHA256)

I need to setup wireless authentication based on computer certificates, I’ve done similar jobs before by manually issuing certificates for Cisco AnyConnect, but this will be for NAP/RADIUS authentication to MSM. I’ll be working with Server 2008 R2 and Windows 7 clients. So task one was getting my head round ‘auto enrollment’. As stated I’m deploying Computer certificates but the process is practically the same for issuing User certificates (I’ll point out the differences where applicable).

Solution

Prerequisites: A Windows domain environment, with working DNS.

Setup a Certification Authority

1. Launch Server Manager (Servermanager.msc) Roles > Add Roles > Active Directory Certificate Services > Next > I’m going to accept all the defaults.

How do I force an autoenrollment certificate?

2. The only thing I’m going to change is the lifetime, I usually change that from 5 to 10 years (force of habit, after 5 years it will probably still be my problem, in 10 years it will be replaced, or in a skip!)

How do I force an autoenrollment certificate?

Create a Computer Certificate Template and Issue it.

3. Start > Administrative Tools > Certification Authority > Certificate Templates > Manage.

How do I force an autoenrollment certificate?

4. Locate and make a copy of the Workstation Authentication template. If you were using User certificates the you would copy the User template.

Note: I got an email a few months ago form someone who had an argument about whether to make copies or edit the originals, and was asking what I thought was best practice. Well I would ALWAYS copy a template and edit that copy. Then if you ‘stuff it up’ you still have the original. It’s always best practice to avoid looking like a cretin!

How do I force an autoenrollment certificate?

5. If you still have Server 2003 servers choose the default, if not pick 2008 > OK.

How do I force an autoenrollment certificate?

6. General Tab > Give the template a sensible name.

How do I force an autoenrollment certificate?

7. Subject Name Tab: Tick User principle name (UPN).

How do I force an autoenrollment certificate?

8. Security Tab: Ensure Domain Computers have the rights to Read and Autoenroll > OK > Close the template console.

How do I force an autoenrollment certificate?

9. Certificate templates > New > Certificate Template to Issue.

How do I force an autoenrollment certificate?

10. Pick the one you just created > OK.

How do I force an autoenrollment certificate?

11. Make sure it’s listed > Close the Certificate Authority management console.

How do I force an autoenrollment certificate?

Deploy Auto-enrolled Certificates via Group Policy

Note: You could just add this to the to the default domain group policy, and all computers would get a certificate, but for this exercise I’ve created an OU, and I’m going to create a new policy and link it there.

12. Select an OU or container that contains the computer objects you want to send certificates to.

Note: Obviously if you are sending out User certificates then link it to a user OU, (you would be surprised!)

How do I force an autoenrollment certificate?

13. Navigate to;

Computer Certificate Auto-Enrollment

Computer Configuration > Windows Settings > Security Settings > Public Key Policies > Certificate Services Client - Auto-Enrollment

User Certificate Auto-Enrollment

User Configuration > Windows Settings > Security Settings > Public Key Policies > Certificate Services Client - Auto-Enrolment

WARNING: If deploying user certificates read this article.

How do I force an autoenrollment certificate?

14. Enable the policy > Select the two options available > Apply > OK > Close the GPO management editor.

How do I force an autoenrollment certificate?

Test Windows Certificate Auto-Enrollment

15. Before we do anything else, you can see there are no certificates on the Windows 7 client machine, and there are no certificates ‘issued’ from the server.

Note: To see a computers certificates, you need to be logged in with administrative rights, run mmc and add in the certificates snap-in for ‘local computer’.

How do I force an autoenrollment certificate?

16. Now if I move this machine into the OU that I’ve linked the GPO to.

How do I force an autoenrollment certificate?

17. And then force that client to refresh its group policies, (or reboot it).

How do I force an autoenrollment certificate?

18. Now when you check, you can see it has received a certificate, and the server is now showing one certificate issued.

How do I force an autoenrollment certificate?

Now I’ve got to work out NAP and RADIUS and force them to use the certificates, but I’ve got a headache and I need a brew, watch this space….

Certificate Services Error – ‘The Email name is unavailable and cannot be added to the Subject or Subject Alternate name’

How do I trigger a certificate autoenrollment?

To manually trigger the autoenrollment we can use Certutil –pulse from an elevated command prompt. This will be useful while troubleshooting Autoenrollment issues..
During the restart of the machine..
During logon..
During GPO refresh interval..

What is certificate autoenrollment?

This one allows users to enroll for certificates with no user intervention needed (well, in most cases, that is). Long story short, Microsoft certificate auto-enrollment automates the whole process and allows certificates to be automatically renewed and updated.

How do I Auto register a user certificate?

To configure user certificate autoenrollment.
On the computer where AD DS is installed, open Windows PowerShell®, type mmc, and then press ENTER. ... .
In the MMC, on the File menu, click Add/Remove Snap-in. ... .
In Available snap-ins, scroll down to and double-click Group Policy Management Editor..

How do I register a certificate manually?

To manually request this certificate only takes a couple of steps. I can open the Microsoft Management Console, as we've done previously in the course, by right-clicking on the Start menu and selecting Run, and then type in mmc. The snap-in that I want to add to this console is certificates for the user.