How to Configure UAG to Publish Your Private Certificate Revocation List
In order for SSTP (Secure Socket Tunneling Protocol) and DirectAccess to work properly the SSTP and DirectAccess client must have access to the CRL (Certificate Revocation List) of the server certificate (if you are using Client Certificate or Smart Card authentication you will also need access from the client to the CRL)
If you are using internal Microsoft Certificate Authority (CA) you can publish the CRL through UAG based on the following procedures:
Important Note:
If you are using Microsoft Certificate Authority (CA) make sure the Root CA certificate (If you are using in intermediate CA, also include the intermediate CA certificate) is located in the Trusted Root Certification Authorities of the Local Computer Store
Steps to Publishing the CRL through UAG
Open UAG management Console, navigate to HTTP Connections, right click, and choose New Trunk
On the Welcome to the Create Trunk Wizard page click Next.
On the Step 1 – Select Trunk Type page, select the Portal trunk option and click Next.
On the Step 2 – Setting the Trunk page, enter the Trunk name and enter the Public host name, this part is very important! You must enter the exact URL that you configured in the CDP (CRL Distribution Point) setting on your certificates, then click Next.
Note:
External clients must be able to resolve the public host name
On the Step 3 - Authentication page, choose any authentication repository (this is not relevant because in next phases we will disable the authentication for this Trunk because access to CRL doesn't require authentication) then click Next.
On the Step 4 – Endpoint Security page, click Next (you will disable Endpoint Security for this Trunk later so the choice made her is immaterial).
On the Step 5 Endpoint Policies page click Next.
On the Completing the Create Trunk Wizard page click Finish.
Configure the New Trunk
Now we will configure an Other Web Application (application specific hostname) application in the new trunk to publish the internal CRL.
In the UAG management console click Add.
On the Step 1 – Select Application page select the Web option and then select the Other Web Application (application specific hostname) option from the drop down list. Click Next.
On the Step 2 – Configure Application page enter the Application name and in the Application type text box, enter OtherWeb, then click Next.
On the Step 3 – Select Endpoint Policies page click Next.
On the Step 4 – Deploying an Application page click Next.
On the Step 5 – Web Servers page, in the Addresses text box, enter the name on your internal IIS server that hosts the CRL. Change Paths to the path defined for CRL Distribution Point, for example “/CertEnroll/* (your certificate distribution point will likely have a different name, enter the name that you have defined for your CDP). Define the Public host name as configured in the CDP (CRL distribution point). This name should be the same Public host name defined for the trunk. Click Next.
Note:
External clients should be able to resolve this name
On the Step 6 - Authentication page click Next.
On the Step 7 – Portal Link page click Next.
On the Step 8 - Authorization page click Next.
On the Completing the Add Application Wizard page, click Finish.
In the UAG Management Console navigate to the Initial application and choose the application you created (this will allow access directly to the CRL and not through the UAG default portal).
In the UAG Management Console navigate to Trunk Configuration and choose Configure
Disable Require users to authenticate at session logon onthe Authentication tab in the Advanced Trunk Configuration dialog box.
Enable the option “Disable component installation and activation” on Sessions tab of Advanced Trunk Configuration dialog box. You need to do this because UAG client components are not required for publishing CRL. Also enable the option “Disable scripting for portal applications”
This article was originally written by Tarun Sachdeva, Sr. Support Engineer.
Tom Shinder
tomsh@microsoft.com
Microsoft ISD iX/SCD iX
UAG Direct Access/Anywhere Access Group (AAG)
The “Edge Man” blog (DA all the time): https://blogs.technet.com/tomshinder/default.aspx
Follow me on Twitter: https://twitter.com/tshinder
Facebook: https://www.facebook.com/tshinder
Comments
Anonymous
January 01, 2003
The comment has been removedAnonymous
January 01, 2003
Are you thinking of the CRL for the certificate bound to the IP-HTTPS listener? There's no problem with the internal clients being able to reach that CDP, in fact, you'll need that to support NLS. The Test Lab Guide CRL Check Update post was referring to the original TLG. Use the one based on the TLG format that I created for UAG SP1 RC. Thanks! TomAnonymous
January 01, 2003
Hi Gokham, Great! Good to hear you got it working and thanks for the follow up! TomAnonymous
January 01, 2003
Hi Chris, You will need to include the FQDN for the CDP on your CA. TomAnonymous
January 01, 2003
Hello Tom/Markus, Looks like we have two trunks over here using the same IP address. Each trunk should have its own unique IP. Trunk 1: my https Trunk 2 my CRL Either disable one of the trunks (by right clicking on the trunk name and using "Disable" option) and activate the configuration or use another IP for the second trunk by using the steps below:
- Add another IP address to the external NIC,
- Use File menu, Reload configuration
- Select this new IP on one of these trunks
- Activate the configuration.
Anonymous
December 24, 2010
Hi Tom, perfect post...many thanks. Unfortunately I always get an error saying Error: Trunk "Filter of trunk my https trunk" cannot be activated due to the following: The trunk uses an IP address/port number combination already in use by the portal 'my CRL' trunk. What do I am missing on my set up? Thanks,MarkusAnonymous
December 27, 2010
Hi Markus, It might be that the original HTTPS trunk is using Port 80 too? Check the configuration of the other trunk and let me know. Thanks! TomAnonymous
December 29, 2010
Hi Tom, Thank you for the answer. I may forgot to add that I am a 100% new user on UAG and doing my first steps.. The only hint on the HTTPS trunk that I can see [as a new user] is under the application portal and its properities. Under the tab web servers is an entry with http ports = auto. Am I on the right path for a solution? Thanks,MarkusAnonymous
January 04, 2011
Hi Markus, Hmmm. Not sure. Let me see if I can find someone who can help us with this. Thanks! TomAnonymous
January 06, 2011
The comment has been removedAnonymous
January 07, 2011
OK then...thanks for this information. Good to know. Cheers, MarkusAnonymous
January 31, 2011
The comment has been removedAnonymous
January 31, 2011
Well, by nature the CRL for UAG is not reachable from the inside. Would this cause a problem if defined on the CA? Also, on your Test Lab Guide CRL Check Update document, you mention unchecking " Include in the CDP extension of issued certificates" for the ldap:...is this something I also need to do? Thanks, ChrisAnonymous
February 01, 2011
The comment has been removedAnonymous
February 01, 2011
The comment has been removedAnonymous
February 01, 2011
Well, by nature the CRL for UAG is not reachable from the inside. Would this cause a problem if defined on the CA? Also, on your Test Lab Guide CRL Check Update document, you mention unchecking " Include in the CDP extension of issued certificates" for the ldap:...is this something I also need to do? Thanks, ChrisAnonymous
December 19, 2011
after following these steps I am able to access some .crt files in the the directory, however file names with "(" or ")" are blocked as a restricted URL. If look in TMG and monitor the traffic I see the following error "user to trunk crltrunk; Secure=0 failed due to an error with a predefined global rule. The error code is Illegal character - (()."Anonymous
June 29, 2012
Hi, Can I use one of the DirectAccess ip-addressess to publish CRL?Anonymous
August 28, 2012
The comment has been removedAnonymous
November 30, 2012
Do we need to create policies/ACLs in TMG to secure UAG trunks?Anonymous
June 19, 2013
How to configure the UAG portal page