Deploy a CA and NPS Certificate Server

Deploy a CA and NPS Certificate Server – Windows 2008 R2 Standard Server

Prerequisites:  Windows 2008 R2 Server, Active Directory Domain Services, Web Server (IIS).

  1. Install Web Server (IIS)
    1. Open Server Manager
  1. Right Click Roles and select Add Roles or Click on Roles Summary > Add Roles
  2. Check Web Server (IIS) click Next
  1. Click Next
  1. Accept the default web server role services, Click Next
  1. Confirm installation selections and make sure no errors are present.  Click Install
  1. Confirm installation results have no errors and resolve as necessary. Click Close

  1. Install Active Directory Certificate Services
    1. Open Server Manager
  1. Right Click Roles and select Add Roles or Click on Roles Summary > Add Roles
  2. Check Active Directory Certificate Services.  Click Next.
  1. Click Next.
  1. Check Certification Authority (default)
  2. Check Certification Authority Web Enrollment.  Click Add Required Role Services if prompted.
  1. Click Next
  1. Select Enterprise.  Click Next.
  1. Select Root CA.  Click Next.
  1. Select Create a new private key.  Click Next.
  1. Accept default encryption types, bit length, and hash algorithm.  Click Next.
  1. Leave default Common name and Distinguished name suffix.  Click Next.
  1. Modify validity period if desired.  Click Next.
  1. Accept certificate database defaults.  Click Next.
  1. IIS Introduction.  Click Next.
  1. Accept default web server roles services.  Click Next.
  1. Confirm installation selections and correct errors if necessary.  Note: you cannot change the name of your server after a Certificate Authority installation.  Click Install.
  1. Confirm installation results have no errors and resolve as necessary.  Click Close.
  1. Install NPS
    1. Open Server Manager
  1. Right Click Roles and select Add Roles or Click on Roles Summary > Add Roles
  2. Check Network Policy and Access Services.  Click Next.
  1. Review Introduction if desired.  Click Next.
  1. Check Network Policy Server.  Click Next.
  1. Review installation selections and correct errors as necessary.  Click Install.
  1. Review installation results and correct errors if necessary. Click Close.
  1. Configure NPS CertificateTemplate and Autoenrollment
    1. Open Server Manager
  1. Expand Roles > Active Directory Certificate Services > Certificate Templates. Select RAS and IAS Server.  Right Click and choose Duplicate Template.
  1. Select to Duplicate Template using your Domain Functional Level (from AD Directory Services Install).  If uncertain, choose default Windows Server 2003 Enterprise.  Click OK.
  1. Type a Template Display Name that you will recognize for NPS.  Adjust validity period to desired duration.  Check Publish certificate in Active Directory.
  1. Click the Security tab. In Group or user names, click RAS and IAS Servers.
  2. In Permissions for RAS and IAS servers, under Allow, select the Enroll and Autoenroll permission check boxes.  Click OK.
  1. From Server Manager.  Select Roles > Active Directory Certificate Services > Your CA > Certificate Templates.  Right Click in Certificate Templates task pane.  Select New > Certificate Template to Issue.
  1. Choose the name of the Certificate Template created previously.  Click OK.
  1. Open Group Policy Editor.  Click Start > Administrative Tools > Group Policy Editor.  Expand Forest > Domains > $yourdomain > Group Policy Objects.  Right Click Default Domain Policy.  Click Edit.
  1. Open Computer ConfigurationPoliciesWindows SettingsSecurity Settings, and then select Public Key Policies.
  2. In the details pane, double-click Certificate Services Client – Auto-Enrollment. The Certificate Services Client – Auto-Enrollment Properties dialog box opens.
  3. Change Configuration Model to Enabled.
  4. Select Renew expired certificates, update pending certificates, and remove revoked certificates
  5. Select Update certificates that use certificate templates
  6. Click OK.
  1. Register NPS in Active Directory.  In Server Manager.  Navigate to Roles > Network Policy and Access Services > NPS (Local).  Right Click NPS (Local) and choose Register server in Active Directory.  Review authorization notification.  Click OK.  Computer now Authorized.  Click OK.
  2. Force Group Policy Update.  Click Start > Run.  Type gpupdate /force.  Allow update to finish.
  1. Review Issued Certificates.  Navigate to Roles > Active Directory Certificates Services > Your CA > Issued Certificates.  We can now see the NPS Certificate has been issued to our machine RCDNCALO\W2K8-STATIC$.  This was auto-enrolled after registering NPS with Active Directory and forcing a Group Policy Update.  This will be the Server side certificate used for applicable EAP Authentication Methods.
  1. Create RADIUS Clients adding your WLC(s).  Open Server Manager Navigate to Roles > Network Policy and Access Services > NPS (Local) > RADIUS Clients and Servers > RADIUS Clients.  Right Click and click New.  Populate Friendly name, Address (IP or DNS).  For Shared Secret, leave Template to None.  Choose Manual and type Shared Secret and matching Confirm shared secret.  Click OK. (example uses cisco123).
  1. Create new 802.1X Configuration.  Navigate to Roles > Network Policy and Access Services > NPS (Local).  Click dropdown in Standard Configuration section then Select RADIUS server for 802.1X Wireless or Wired Connections.  Click Configure 802.1X.  For type of 802.1X Connections: select Secure Wireless Connections.  Provide a Name for the policy or accept default Secure Wireless Connections.  Click Next.
  1. Confirm RADIUS client is present. This client was added previously.  Add additional RADIUS clients as required.  Click Next.
  1. Select EAP method type for this policy.  For PEAP choose Microsoft:  Protected EAP (PEAP)For EAP-TLS choose Microsoft:  Smart Card or other Certificate (our example is configuring PEAP).  Select Configure.  Verify Certificate issued reflects the certificate that NPS autoenrolled.  Our NPS certificate template provided a one year validity period, where-as the Root CA certificate is for five years.   Notice the Certificate reflects the FQDN for the Windows Server we are installing NPS on:  w2k8-static.rcdncalo.wireless.  The other certificate is the actual Root CA that matches the name from the Root CA installation earlier which is not what we want to select.  Click OK.  Click Next.
  1. Add desired Windows Groups.  These can be machine or user groups.  We are adding default Domain Users group for example.  Click OK.  Click Next.
  1. Do not configure Traffic Controls at this time.  This can be used for VLAN assignment and other VSA Attributes to provide AAA override settings to the WLC.  Click Next.
  1. Click Finish.
  1. Add RADIUS server to WLC.  Navigate in the WLC GUI to SECURITY > AAA > RADIUS > Authentication.  Click New…  Provide Server IP Address for NPS server.  Provide Shared Secret and Confirm Shared Secret.  Click Apply.


Disqus Comments Loading...

Recent Posts

Bittorrent IP Blocklists

In addition to using a VPN service, as an extra precaution I've been using the blocklist feature of my bittorrent… Read More

October 26, 2019 3:31 pm

FreeNAS Error Creating Pool

command '('gpart', 'create', '-s', 'gpt', '/dev/da8')' returned non-zero exit status 1. If you get this error while trying to create… Read More

June 7, 2019 3:44 pm

Change Grub Default Boot Entry on Linux Mint

I'm dual booting Windows and Linux Mint on my laptop. The grub default is to boot into Linux Mint, however… Read More

April 23, 2019 7:45 pm

How to Reset Secure Channel On Active Directory Domain Controller

When you're a little too careless about virtualizing your domain controllers, cloning, migrating, backing up and restoring, returning from vacation… Read More

April 21, 2019 8:14 am

Run Systemd Script Before System Shutdown

I tried to retain the NGINX FastCGI cache and have it persist across system reboots instead of being ephemeral by… Read More

April 20, 2019 10:14 am

Learn Systemctl Usage to Manage Systemd Service in Linux

Systemd is new service manager for Linux. It's a replacement for all previous init systems (SysV/SysVinit & Ubuntu's Upstart) and… Read More

April 20, 2019 7:55 am