Migrating the AD Certificate Authority Service server role from 2012 R2 to 2022

864 views
Skip to first unread message

selahattin şadoğlu

unread,
Sep 26, 2023, 1:09:19 PM9/26/23
to ntsysadmin
Hi,


I will follow below MS link.

https://learn.microsoft.com/en-us/troubleshoot/windows-server/identity/move-certification-authority-to-another-server

By the way, We have been using Cisco ISE 802.1x.

But I have some questions.


1- If the new server has a different computer name ,what kind of problems can there be?

2- Have you heard of any issues with migrating from 2012R2 to 2022?

3 -  after the migration, the hostname will be different. Can we just add another DNS alias to the new server’s IP to make sure there are no problems with certificates referencing the CDP?

4 - is it require on the new CA Server that you add Domain and Enterprise Admins to the Local Group “Certificate Service DCOM Access” ?

5- Would there be any special considerations to keep in mind after I migrate the CA servers?

6 - if things go wrong would i be able to restore the snapshot.

7 - In that case, how clients machine will understand the new certificate since the client machines are configured with OLD cA server name

8 -  If it is a must to rename the source server ServerA, what would be your suggestion/recommendations?

9 - Do i need to export the Certificate Templates from the 2012r2 server and import them into the new 2016 server?

10 -  Sounds like the best way to ensure some fallback plan (or management peace-of-mind, anyway) is to disable the NIC on the server hosting the old CA ?

11 - Any downtime for this? Considering doing this during the day.




Thanks a ton! I really appreciate all the help and knowledge you’ve shared with the community!

Michael B. Smith

unread,
Oct 1, 2023, 3:46:48 PM10/1/23
to ntsys...@googlegroups.com

[1] if you follow the instructions exactly, it’ll work just fine.

[2] no.

[3] Maybe? The right to do this is with a custom CDP; e.g., pki.fabrikam.com. Using server names is a recipe for future problems.

[4] Only if those groups need the access.

[5] Editing the registry incorrectly can break your CA. If  you have a multi-tier CA, you need to start from the root and work down.

[6] Absolutely not supported. And I doubt highly it would work. Too many moving parts are involved.

[7] In what case? You are migrating the CA name. It doesn’t change. Only the DNS-host-name of the computer hosting the CA database changes. It is not supported to change a CA name.

[8] You don’t have to rename the source server.

[9] Templates on enterprise CAs are stored in AD. You will have to republish them on the target CA, but you do not have to “export” anything but the list of names – and doing so is part of the instructions. Templates on standalone CAs are stored in the registry. And in a MSFT environment, the only template you should be using on a standalone CA is the SubCA.

[10] More unsupported territory. You have to literally REMOVE the old CA in order to upgrade it. You should practice this process in a lab, several times, until you are comfortable with the entire process. Or hire someone to help you who has done it before and is comfortable with the process.

[11] Yes. If you have an integrated CDP, then it’s down until it’s re-installed and DNS is updated on the new CDP server. And obviously, certificates can’t be requested at any time during the upgrade process.

 

Thanks.

 

Regards,

Michael B. Smith

Managing Consultant

Smith Consulting, LLC

--
You received this message because you are subscribed to the Google Groups "ntsysadmin" group.
To unsubscribe from this group and stop receiving emails from it, send an email to ntsysadmin+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/ntsysadmin/ac621e61-5627-4109-81c5-47dadce8f535n%40googlegroups.com.

maxcoder1

unread,
Oct 2, 2023, 11:49:58 AM10/2/23
to ntsys...@googlegroups.com
Thanks again, Lastly ,

lets say, I have workflow like below.

Old CA Server (2012R2 machine)
ip address : 10.90.10.11
hostname : CNTCA01
After , uninstalled ca then renamed the server, changed IP and switched off.
ip address : 10.90.10.13
hostname : CNTCA01_OLD

NEW CA Server (2022 machine)
ip address : 10.90.10.12
hostname : CNTCA02
After , power off old machine. I will change ip address&hostname like below.
ip address : 10.90.10.11 (same as old machine)
hostname : CNTCA01 (same as old machine)

Afrer, installed ADCS and followed instructions to restore.

correct ?

Get-ADDomain | fl Name,DomainMode
Get-ADForest | fl Name,ForestMode
Name : contoso
DomainMode : Windows2016Domain
Name : contoso.local
ForestMode : Windows2016Forest

Michael B. Smith

unread,
Oct 2, 2023, 1:09:26 PM10/2/23
to ntsys...@googlegroups.com

At a thousand foot view, that appears to be the proper process.

Brian Illner

unread,
Nov 7, 2023, 3:15:12 PM11/7/23
to ntsys...@googlegroups.com

Have you gone through this process yet? We’re still in the testing phase ourselves and running into all kinds of small issues.

 

Latest one is “ADCS could not use the default provider for encryption keys. Keyset does not exist 0x80090016 (NTE_BAD_KEYSET)”

 

BRIAN ILLNER

 

Senior Systems Administrator

864.250.9227 Office

864.679.2537 Fax

Canal Insurance Company

101 N. Main Street, Suite 400

Greenville, SC 29601

WARNING:  As the information in this transmittal (including attachments, if any) may contain confidential, proprietary, or business trade secret information, it should only be reviewed by those who are the intended recipients.  Unless you are an intended recipient, any review, use, disclosure, distribution or copying of this transmittal (or any attachments) is strictly prohibited.   If you have received this transmittal in error, please notify me immediately by reply email and destroy all copies of the transmittal.  While Canal believes this transmittal to be free of virus or other defect, it is the responsibility of the recipient to ensure that it is virus free and no responsibility is accepted by Canal (or its subsidiaries and affiliates) for any loss or damage arising therefrom.

 

From: ntsys...@googlegroups.com <ntsys...@googlegroups.com> On Behalf Of Michael B. Smith
Sent: Monday, October 2, 2023 1:09 PM
To: ntsys...@googlegroups.com
Subject: RE: [ntsysadmin] Migrating the AD Certificate Authority Service server role from 2012 R2 to 2022

 

CAUTION: This message was sent from outside of Canal Insurance. Please do not click links or open attachments unless you recognize the source of this email and know the content is safe. Please report all suspicious emails to "inf...@canal-ins.com" as an attachment.


Michael B. Smith

unread,
Nov 7, 2023, 3:19:40 PM11/7/23
to ntsys...@googlegroups.com

There are changes. What is the default provider?

 

               certutil -getreg ca\EncryptionCSP\Provider

Brian Illner

unread,
Nov 8, 2023, 8:32:54 AM11/8/23
to ntsys...@googlegroups.com

They’re both showing the same – Microsoft Software Key Storage Provider

 

I performed the registry export and import, so those settings should have come over.

Brian Illner

unread,
Nov 8, 2023, 10:40:11 AM11/8/23
to ntsys...@googlegroups.com

We aren’t actively using those certs to encrypt anything that I am aware of, but I’m concerned that something either didn’t migrate over, or we have something misconfigured.

 

In the CA, if I attempt to add a Recovery Agent on the test migration server, it gives me this message.

 

 

The live production one shows certificates in the computer’s Personal store as expected.

 

BRIAN ILLNER

 

Senior Systems Administrator

864.250.9227 Office

864.679.2537 Fax

Canal Insurance Company

101 N. Main Street, Suite 400

Greenville, SC 29601

WARNING:  As the information in this transmittal (including attachments, if any) may contain confidential, proprietary, or business trade secret information, it should only be reviewed by those who are the intended recipients.  Unless you are an intended recipient, any review, use, disclosure, distribution or copying of this transmittal (or any attachments) is strictly prohibited.   If you have received this transmittal in error, please notify me immediately by reply email and destroy all copies of the transmittal.  While Canal believes this transmittal to be free of virus or other defect, it is the responsibility of the recipient to ensure that it is virus free and no responsibility is accepted by Canal (or its subsidiaries and affiliates) for any loss or damage arising therefrom.

 

Reply all
Reply to author
Forward
0 new messages