Windows Server 2008. Creating and configuring a certification authority

Requirements for working with Digital Signatures in ELMA:

  • installed Internet Explorer;
  • installed CAPICOM application;
  • activated ELMA ECM+ application;
  • in Web Application, in Administration – System – System Settings in the Digital Signature settings unit, Internal encryption provider must be selected;
  • in Web Application, in Administration – Document Management – Digital Signature Templates, all the signature templates must be filled in and saved;
  • a user must have access to signing documents. Permissions are assigned by the system administrator in Administration – Document Management - Permissions for Accessing "Documents" Section.

Main system requirements:

  1. You must work with certificates in Internet Explorer.
  2. To be able to configure a certificate template, add roles and set up additional system parameters, the user must be a member of the Domain Administrators, Enterprise Administrators or similar groups.
  3. To be able to work with digital signatures in ELMA, all the Windows users must be in the same domain.

Creating and configuring the certification center consists of several steps.

Adding roles Windows Server

Adding roles consists of several steps.

1. Start the Server Manager. Go to Start – All Programs – Administration – Server Manager.

2. In the console tree (in the left part of the window), right-click on Roles and select Add Roles (fig. 1).

Fig. 1. Console tree. Add Roles context menu option

3. In the opened Add Roles Wizard (fig. 2), click Next.

Fig. 2. Add Roles Wizard

4. In the Select Server Roles (fig. 3) window check the box Active Directory Services. After that additional wizard steps will be added. To continue, click Next.

Fig. 3. Select Server Roles

5. At the Introduction to Active Directory Certificate Services step (fig. 4), click Next.

Fig. 4. Introduction to Active Directory Certificate Services

6. At the Select Role Services step (fig. 5), check the box Certification Authority Web Enrollment. Required role services and components (such as IIS) will be identified automatically and the wizard will suggest adding them.

Fig. 5. Select Role Services

When you select the box Certification Authority Web Enrollment a dialog box will open (fig. 6), where you need to click Add Required Role Services. After that, click Next in Select Role Services.

Fig. 6. Adding required role services

7. At the Specify Setup Type (fig. 7), select Enterprise and click Next.

Fig. 7. Specify Setup Type

8. At the Specify CA Type step (fig. 8), select Root CA and click Next.

Fig. 8. Specify CA Type

9. At the Set Up Private Key step (fig. 9), select Create a new private key and click Next.

Fig. 9. Set Up Private Key

10. At the Configure Cryptography for CA step (fig. 10) click Next.

Fig. 10. Configure Cryptography for CA

11. At the Configure CA Name step (fig. 11), enter the required name and click Next.

Fig. 11. Configure CA Name

12. At the Set Validity Period step (fig. 12), specify the required period and click Next.

Fig. 12. Set Validity Period

13. At the Configure Certificate Database step (fig. 13), specify the required location for storing certificates and click Next.

Fig. 13. Configure Certificate Database

14. At the Confirm Installation Selections step (fig. 14), check the selections and click Install. If necessary, you can change the selections by going back to the required steps.

Fig. 14. Confirm Installation Selections

15. The installation progress will be displayed (fig. 15).

Fig. 15. Installation Progress

After the installation is finished, click Close (fig. 16).

Fig. 16. Installation Results

16. The console tree now contains Active Directory Certificate Services (fig. 17) with a certification center installed.

Fig. 17. Console tree

17. Next, connect extensions in the created CA settings. For this, right click on the CA and select Properties. Open the Extensions tab, and in the certificate revocation list select http://<ServerDNSName>/CertEnroll/<CaName><CRLNameSuffix><DeltaCRLAllowed>.crl and check all the available boxes for it (fig. 18).

Fig. 18. Extensions tab

Next, in the certificate revocation list select file://<ServerDNSName>/CertEnroll/<CaName><CRLNameSuffix><DeltaCRLAllowed>.crl and the boxes 3 and 4 (fig. 19).

Fig. 19. Extensions tab

To save the changes, click Apply. In the opened dialog box (fig. 22), click Yes.

Fig. 22. Certification Authority dialog box

After restarting the certification service, click OK. Restart your computer to apply the changes made.

Creating a certificate template

To create a certificate template, follow these steps.

  1. In the Server Manager go to Certificate Templates, right-click on an existing template and select Copy Template (fig. 21) (e.g. copy the User template.

 Fig. 21. Server manager. Certificate Templates. Copy template

2. In the opened dialog box (fig. 22) select Windows Server 2003 Enterprise. To confirm, click OK.

 Fig. 22. Copy template dialog box

3. In the opened template properties (fig. 23), on the General tab specify the template name and uncheck the Publish certificate in Active Directory box.

  

 Fig. 23. Template properties. General tab

4. Open the Request Handling tab (fig. 24) and in the Purpose field select Signature.

 Fig. 24. Template properties. Request Handling tab

5. Open the Subject Name tab (fig. 25) and make sure that everything is selected as in the figure below.

 Fig. 25. Template properties. Subject Name tab

6. Open the Security tab (fig. 26) and check the Enroll box in the Allow column for the Authenticated Users group.

 Fig. 26. Template properties. Security tab

7. Go to the Extensions tab (fig. 27) and change the settings of the Application Policies. To do so, click Change.

 Fig. 27. Template properties. Extensions tab

8. In the opened dialog box (fig. 28) select Document Signing and click OK. If there is no such item, click Add.

 Fig. 28. Editing application policies

9. In the opened dialog box (fig. 29) select Document Signing and click OK.

 Fig. 29. Adding an application policy

10. After configuring all the settings, click Apply OK (in the template creation window).

Next, add the template to the certification center:

1. In the Server Manager, open the context menu of the Certificate Templates, and select New – Certificate Template to Issue (fig. 30).

 Fig. 30. Server Manager. Template Certificates. Context menu

2. In the opened dialog box (fig. 31), select the created template and click OK.

 Fig. 31. Enable Certificate Templates

The certificate template is installed and configured.

Next, check the status of the ASP. NET State Service (fig. 32). This service must be running. If it is stopped, Start it.

 Fig. 34. Server Manager. ASP.NET State Service

Checking the certification authority

For the initial check of the CA, start the Certification Authority (Start – Administrative Tools – Certification Authority). If everything is configured correctly, the following window will be displayed (fig. 33).

 Fig. 33. Certification Authority

Obtaining the root certificate

Launch Internet Explorer, and enter the following URL: http://server_name/certsrv , where server_name – is the CA server name. If you connect from the same machine where the CA is installed, you can enter http://localhost/certsrv. The certification authority main page will open (fig. 34).

Fig. 34. Certification authority main page

First, you need to download a CA certificate and put it into the trusted root certification authorities storage. If your network has several CA, download and install a chain of certificates. To do so, select: Download CA certificate, certificate chain or CRL, then select Download CA certificate and save the certificate to any directory on this computer.

Now you can install the certificate. In the context menu of the certificate, select Install Certificate (fig. 35). The import wizard will open.

Fig. 35. Certificate context menu. Install Certificate

In the opened dialog box (fig. 36) click Next.

Fig. 36. Certificate Import Wizard

In the opened dialog box (fig. 37) select Place all certificates in the following store and click Browse….

Fig. 37. Selecting a certificates store

In the opened dialog box (fig. 38), select Trusted Root Certification Authorities and click OK.

Fig. 38. Select Certificate Store

In the Completing the Certificate Import Wizard (fig. 39) click Finish.

Fig. 39. Completing the Certificate Import Wizard

A notification with the import results will open (fig. 40). Click OK.

Fig. 40. Import results notification

Now this PC will trust all the certificates, issued by CA.

Obtaining client certificate

To get the client certificate, open the CA in Internet Explorer and select Request Certificate – Advanced certificate request Submit a certificate request.

When you attempt creating a certificate request, a warning may be displayed (fig. 41). Click OK. In this case, you need to add the current site to the Trusted sites zone and set a lower security level for the zone.

Fig. 41. Notification

To do so, open the Internet Explorer settings and click Internet Options (fig. 42).

Fig. 42. Internet Explorer settings. Internet Options

In the opened dialog box (fig. 43), go to the Security tab and set Medium Low in the Trusted sites zone.

Fig. 43. Internet options dialog box. Security tab

Next, add the current site to trusted sites. On the Security tab, click Sites. In the opened dialog box (fig. 44) click Add, and uncheck Require server verification (https:) for all sites in this zone. To save the changes, click Close.

Fig. 44. Internet options. Security tab. Trusted sites

You also need to enable downloading of unsigned ActiveX. For this, on the Security tab click Custom level… In the Security Settings window (fid. 45) find the group ActiveX controls and plug-ins and set all the switches to Enable. To save the changes, click OK.

Fig. 45. Security Settings

A warning will be displayed (fig. 46), where you need to click Yes.

Fig. 46. Warning

Next, click Apply OK.

 

Go to Internet Explorer and fill out the request form (fig. 47).

In the Certificate Template field, select Only user signature and click Issue.

Fig. 47. Internet Explorer. Advanced certificate request

A certificate issued message will be displayed (fig. 48), where you need to click Install this certificate.

Fig. 48. Internet Explorer. Certificate issued message

Certificate installed message will be displayed (fig. 49).

 Fig. 49. Internet Explorer. Certificate installed message

Note that after the client certificate expires, you need to delete and then obtain and install it again.

If everything is correct, the certificate will be successfully installed in the personal certificate store. All the issued certificates are displayed in the Certification Authority, Issued Certificates (fig. 50).

 Fig. 50. Certification Authority. Issued Certificates

If necessary, all the issued certificates can be revoked.

To view all the obtained personal certificates in Internet Explorer, open the settings and select Internet options (fig. 51).

 Fig. 51. Internet Explorer settings. Internet options

In the opened dialog box (fig. 52), open the Content tab and click Certificates and the Certificates unit.

 Fig. 52. Internet options. Content tab

In the opened dialog box (fig. 53), the Personal tab will display all the personal certificates, issued to the current user.

Fig. 53. Certificates dialog box

After configuring all the settings, download CAPICOM from the official Microsoft website. This software will be required to sign documents using a digital signature in ELMA Web Application.