Updated on 2025-11-28 GMT+08:00

Issuing a Domain Controller Certificate via AD CS (Recommended)

Scenarios

If certificate-based authentication is enabled when an AD domain is interconnected with, the AD domain server must have a valid domain controller certificate, which can be issued by Active Directory Certificate Services (AD CS) of the AD server.

Procedure

Installing AD CS

  • Only members of Enterprise Admins can install AD CS.
  • If AD CS has been installed on the AD server, skip 2 to 21.
  1. Log in to the AD server using the account and password.
  2. Press Win+R, enter servermanager in the displayed Run dialog box, and press Enter to go to the Server Manager page.
  3. On the left of the Server Manager page, click Dashboard and click Add Roles and Features to go to the Add Roles and Features Wizard page.
  4. Select Role-Based or feature-based installation for Select Installation Type and click Next.
  5. Select Select a server from the server pool and click Next.
  6. On the Select Server Roles page, select Active Directory Certificate Services to go to the Add Roles and Features Wizard page.
  7. Click Add Features and click Next.
  8. Click Next and then click Next again.
  9. In the Role Services area, select Certification Authority and Certification Authority Web Enrollment, and click Next.
  10. On the Confirm installation selections page, click Install.

    Do not close the wizard during the installation.

  1. After the installation is complete, click Configure Active Directory Certificate Services on the Destination Server to go to the AD CS configuration wizard page.
  2. Click Next.
  3. In the Role Services area, select Certification Authority and Certification Authority Web Enrollment, and click Next.
  4. On the Setup Type page, select Enterprise CA and click Next.
  5. On the Specify the type of the CA page, select Root CA and click Next.
  6. On the Specify the type of the private key page, select Create a new private key and click Next.
  7. On the Cryptography for CA page, keep the default setting RSA#Microsoft Software Key Storage Provider and the default key character length (2,048).

    The default hash algorithm is SHA256. Click Next.

  8. On the CA Name page, specify the CA name and click Next.

    • Common name for this CA: You are advised to use the default name or change the name as required.
    • Distinguished name suffix: This parameter is left blank by default. You can determine whether to specify it.
    • Preview of distinguished name: You are advised to use the default name or change the name as required.

  9. On the Validity Period page, the default value of Specify the validity period is 5 years (recommended). You can change the value as needed. Click Next.
  10. In the Specify the database locations area on the CA Database page, specify the certificate database location and certificate database log location. If you specify a location other than the default one, ensure that you use an access control list (ACL) to protect folders by preventing unauthorized users or computers from accessing CA databases and log files. Click Next.
  11. On the confirmation page, click Configure. After the configuration is complete, click Close.

Issuing a domain controller certificate

  1. After AD CS is installed and configured in 1 to 21, the current AD server automatically issues a domain controller certificate.
  2. If there are multiple AD servers in the same domain, you can use one of the following methods to issue domain controller certificates for the remaining servers:

    • Restart the remaining AD servers to issue domain controller certificates.

      Restart the remaining AD servers in sequence during the maintenance period. You are advised to back up the AD servers before restarting them. To avoid impact on services, do not restart them in batches.

    • Manually issue domain controller certificates to the remaining AD servers.
      1. Use the account and password to log in to the remaining AD servers.
      2. Press Win+R. In the Run dialog box, enter certlm.msc and press Enter.
      3. In the navigation pane on the left, choose Certificates - Local Computer > Personal > Certificates.
      4. Right-click Certificates and choose All Tasks > Request New Certificate to go to the certificate enrollment wizard.
      5. Click Next. Click Next again and select Kerberos Authentication or Domain Controller.
      6. Click Enroll.

Verifying a domain controller certificate

  1. On the AD server, press Win+R. In the displayed dialog box, enter eventvwr and press Enter.
  2. On the Event Viewer page, choose Applications and Services Logs > Microsoft > Windows > Kerberos-Key-Distribution-Center > Operational.
  3. View the event whose ID is 302. Under General, a message is displayed, indicating that the Key Distribution Center (KDC) uses the following KDC certificate for smart card or certificate authentication.

    The domain controller certificate has been issued.

    If there are multiple AD servers in the same domain, perform 24 to 26 on the remaining AD servers to verify the domain controller certificates.

Multi-domain scenario

  • If there are multiple domains, repeat 1 to 26 above for each domain.
  • If multiple domains belong to the same parent domain, perform 1 to 20 below.
  1. Use the account and password to log in to an AD domain server to which the domain controller certificate has been issued.
  2. Press Win+R. In the Run dialog box, enter certlm.msc and press Enter.
  3. In the navigation pane on the left, choose Certificates - Local Computer > Personal > Certificates.
  4. Right-click the created CA certificate on the right and choose All Tasks > Export from the shortcut menu to go to the Certificate Export Wizard page, as shown in Figure 1.

    The CA certificate name is the one customized in 18.

    Figure 1 Exporting a certificate

  5. Click Next. The default prompt is displayed. Click Next again.
  6. Retain the default format of the exported file, and then click Next.
  7. Click Browse, select the export path, enter the name of the exported file (for example, adcsroot.cer), and click Save.
  8. Use the account and password to log in to the remaining AD domain servers.
  9. Copy the certificate exported in 7 to the AD server.
  10. Click in the lower left corner of the AD server, enter cmd, right-click Command Prompt and choose Run as administrator from the shortcut menu.
  11. Go to the directory where the exported certificate is stored and run the following command to install the root CA certificate:

    certutil -addstore root adcsroot.cer

    Replace adcsroot.cer with the actual certificate name.

    If there are multiple AD servers, repeat the preceding operations or apply the configuration to each AD server through the group policy. Procedure:

  1. On the taskbar in the lower left corner of the AD server logged in to in 8, click .
  2. On the right of the Start menu, click to open Server Manager.
  3. In the upper right corner of the Server Manager page, choose Tools > Group Policy Management.
  4. On the Group Policy Management page, choose Forest > Domains.
  5. Expand the domain name, choose Group Policy Objects, right-click Default Domain Controllers Policy, and choose Edit from the shortcut menu.
  6. On the Group Policy Management Editor page, choose Computer Configuration > Preferences > Windows Settings > Registry.
  7. Right-click Registry and choose New > Registry Item from the shortcut menu.
  8. On the New Registry Properties page, select the registry path HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\.
  9. Click the value of the Thumbprint field of the certificate downloaded in 7, select Blob, and click Select, as shown in the following figure.

    • Double-click the certificate downloaded in 7 and view the value of the Thumbprint field in the Details drop-down list, as shown in the following figure.

    • The default update period of the domain controller group policy is 5 minutes. It takes about 5 minutes to apply the update to all domain controllers.