NPS Server Certificate: CA Installation
Applies To: Windows Server 2008
CA installation
You can use this procedure to install Active Directory® Certificate Services (AD CS) so that you can enroll a server certificate to servers running Network Policy Server (NPS). If you deploy certificate-based authentication, NPS servers must have a server certificate. During the authentication process, NPS servers send their server certificate to client computers as proof of identity.
Membership in both the Enterprise Admins and the root domain's Domain Admins group is the minimum required to complete this procedure.
To install Active Directory Certificate Services
Log on as a member of both the Enterprise Admins group and the root domain's Domain Admins group.
Click Start, and then click Server Manager. The Server Manager console opens. In Roles Summary, click Add roles.
The Add Roles wizard opens. Click Next.
On the Select Server Roles page, in Roles, select Active Directory Certificate Services, and then click Next twice.
On the Select Role Services page, in Role services, click Certification Authority, and then click Next.
On the Specify Setup Type page, click Enterprise, and then click Next.
On the Specify CA Type page, click Root CA, and then click Next.
On the Set Up Private Key page, click Create a new private key, and then. click Next.
On the Configure Cryptography for CA page, keep the default settings, and then click Next.
On the Configure CA Name page, keep the suggested common name for the CA or change the name according to your requirements, and then click Next.
On the Set Validity Period page, in Select validity period for the certificate generated for this CA, type the number and select the time value (Years, Months, Weeks, or Days) that determines the date upon which certificates issued by the CA will expire. The default setting of five years is recommended. Click Next.
On the Configure Certificate Database page, in Certificate database location and Certificate database log location, specify the folder location for these items. If you specify locations other than the default locations, ensure that the folders are secured with access control lists (ACLs) that prevent unauthorized users or computers from accessing the CA database and log files. Click Next, and then click Finish.