1.identity With Windows Server 2016
1.identity With Windows Server 2016
aspx
Introduction
Exercise 1 - Install AD Certificate Services
Exercise 2 - Configure Certificate Revocation Lists (CRLs)
Exercise 3 - Backup and Restore of Active Directory Certificate
Services
Summary
Introduction
The Install and Configure Enterprise Root CA module provides you with the
instruction and server hardware to develop your hands-on skills in the defined topics.
This module includes the following exercises:
Exam Objectives
Lab Diagram
1 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
During your session, you will have access to the following lab configuration.
In this module, you will be working on the following equipment to carry out the steps
defined in each exercise.
2 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
For further information and technical support, please see our Help and Support
page.
Copyright Notice
This document and its content is copyright of Practice-IT - © Practice-IT 2017. All rights reserved.
Any redistribution or reproduction of part or all of the contents in any form is prohibited other than
the following:
1. You may print or download to a local hard disk extracts for your personal and non-commercial use
only.
2. You may copy the content to individual third parties for their personal use, but only if you
acknowledge the website as the source of the material. You may not, except with our express written
permission, distribute or commercially exploit the content. Nor may you transmit it or store it in any
other website or other form of electronic retrieval system.
Windows Server 2016 implement PKI using Active Directory (AD) Certificate Services.
When AD Certificate Services is deployed in a corporate network, it is considered as an
internal resource as most users who will request certificates are members of the
organization. This type of resource is called an internal Certification Authority (CA).
For companies that transact business with the public like e-commerce or internet
banking, it will require the service of a trusted external CA to establish a trust with its
customers. The trusted CA proves the identity of an organization to the public as a
trustworthy and legitimate business.
In this exercise, you will add then install a parent/root CA which is the starting point of
a Windows PKI. The root CA generates a self-signed certificate. After which you will
add, install a subordinate CA which forms a hierarchy and trust path with the root CA.
3 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
The subordinate CA will have the authority to issue certificates validated by the root
CA.
To learn more about how to install and configure an Active Directory Enterprise
Certification Authority, please refer to your course material or use your preferred
search engine to research this topic in more detail.
In this task, you will add the Windows feature called Active Directory Certificate
Services using Windows PowerShell.
Please note that you can use Server Manager to add the same feature, however in the
interest of making the lab steps manageable, you will be using Windows PowerShell.
Step 1
Ensure you have powered on the required devices indicated in the Introduction.
In the Server Manager > Dashboard window, click on the Tools menu and select
Windows PowerShell.
Step 2
Please note that Windows PowerShell commands are not case-sensitive.
Press Enter.
4 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 3
Please wait while installation of the selected Windows features is in progress. This will
take a few minutes.
Important: You may encounter a bit of a system lag about 2 minutes as the
features are being installed. Installation may seem to have frozen or stopped
processing. Should this happen, click inside the Windows PowerShell window and
press Enter to refresh the screen. If you are using HTML5 client, a hovering
clipboard may appear at the right-hand corner of the screen when you press
Enter. Close the Clipboard window.
5 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
Windows PowerShell confirms the successful installation of the Active Directory
Certificate Services and Certification Authority Web Enrollment features.
In the earlier task, you simply added the AD Certificate Services and CA Web
Enrollment. It is essential that those two services be installed and configured with
their respective system settings to make them capable of issuing certificates to a
requesting user, computer or service.
6 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
To install and configure AD Certificate Services and CA Web Enrollment, perform the
following steps:
Step 1
On PLABDC01 server, the Windows PowerShell window is open.
Install-AdcsCertificationAuthority -CAType
EnterpriseRootCA
Press Enter.
Press Enter.
7 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 2
The installation of AD Certification Authority is successfully confirmed with an
ErrorId of “0.”
Install-AdcsWebEnrollment
Press Enter.
On the next prompt to install AD Certification Authority Web Enrollment with default
8 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
settings, type:
Press Enter.
Step 3
The installation of AD Certification Authority Web Enrollment is successfully
confirmed with ErrorId of “0.”
9 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
To verify that AD CS is working, in the Server Manager > Dashboard window, go
to Tools > Certification Authority.
10 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 5
In the Certification Authority window, expand PRACTICELABS-PLABDC01-
CA node.
11 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 1
Connect to PLABDM01.
12 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 2
To install AD Certificate Authority and Certificate Web Enrollment, type the following
command:
Press Enter.
13 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
certificate services.
Step 3
Please wait while installation of the selected Windows features is in progress. This will
take a few minutes.
Important: You may encounter a bit of a time lag about 2 minutes as the
features are being installed. Installation may seem to have frozen or stopped
processing. Should this happen, click inside the Windows PowerShell window and
press Enter to refresh the screen.
Step 4
Windows PowerShell confirms the successful installation of the Active Directory
Certificate Services and Certification Authority Web Enrollment features.
14 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
In an earlier task, you simply added the AD Certificate Services and CA Web
Enrollment using Windows PowerShell.
It is essential that those two services be installed with their respective system settings
to make them capable of issuing certificates to a requesting user, computer or service.
Step 1
The root or parent CA in PLABDC01 must be reachable on the network to ensure a
successful deployment of a subordinate CA.
15 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Install-AdcsCertificationAuthority -CAType
EnterpriseSubordinateCA -ParentCA
plabdc01.practicelabs.com\PRACTICELABS-PLABDC01-CA
Press Enter.
On the next prompt, to configure the subordinate CA with default system settings,
type:
Press Enter.
16 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 2
Windows PowerShell confirms the successful installation of the subordinate CA, as it
displayed an ErrorId of “0.”
In the next prompt, to configure AD Certificate Web Enrollment type the following
command:
Install-AdcsWebEnrollment
Press Enter.
17 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Press Enter.
Step 3
As before, Windows PowerShell will display ErrorId “0” indicating a successful
installation.
18 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
To verify that subordinate CA is working, in Server Manager > Dashboard
window, click Tools menu and select Certification Authority.
Step 5
In the Certification Authority window, click then expand PRACTICELABS-
PLABDM01-CA node.
19 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 6
In the PRACTICELABS-PLABDM01-CA Properties dialog box, from the
General tab, click View Certificate.
20 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 7
In the Certificate dialog box, click Certification Path folder tab.
Step 8
The Certification Path tab displays the relationship between PRACTICELABS-
PLABDC01-CA which is the Root or Parent CA with PRACTICELABS-
PLABDM01-CA which is the Subordinate CA.
21 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
By default, when you connect to a device in Practice Labs you are automatically logged
in - usually as the administrator. For this task, you will need to disable this feature and
log in manually.
Step 1
On the Practice Labs web page, click the Access your settings tab.
Under the Device heading there is an option named Server auto login, click the
Disable button.
Please note that this Server auto login setting is saved in your profile and will apply
22 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
in EVERY lab session that you will perform with Practice Labs.
At a later time, you can set the Server auto login back to Enable if you want to log
in to your devices automatically in the succeeding exercises.
Step 1
Connect to PLABWIN10.
Step 2
Connect again to PLABWIN10.
Step 3
Click in the Username text box, type:
matthew.bernstein
Passw0rd
Press Enter.
23 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
Click Agree when presented with the BGInfo License Agreement message box.
If the Application Install - Security Warning message box appears, click the [x]
Close button.
Step 5
When signed on, right-click Start and from the shortcut menu, select Run.
24 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 6
In the Run dialog box, type:
mmc
Press Enter.
Step 7
In the Console1 window, click File menu and select Add/Remove Snap-in.
25 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 8
In the Add or Remove Snap-in dialog box, under the Available snap-ins box,
click Certificates and click Add.
26 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 9
In the Add or Remove Snap-ins dialog box, you have added the Certificates
-Current User snap-in.
Click OK.
Step 10
Since the Certificate Authority (CA) servers were installed at the beginning of this
exercise, client workstations such as PLABWIN10 will have issues detecting the
presence of the CA servers.
27 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 11
In the Save As dialog box, click Desktop.
Click Save.
28 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 12
Close Console1 window.
Right-click Start on the taskbar, point to Shut down or sign out and select Restart
or Update and restart - whichever command is available to restart this computer.
29 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 13
Please wait for 5 minutes before reconnecting back to PLABWIN10. This will give the
said device sufficient time to install any pending updates and complete its restart.
Step 14
After 5 minutes, connect to PLABWIN10.
Step 15
30 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
matthew.bernstein
Passw0rd
Press Enter.
Step 15
When signed on, launch Console1 from the desktop.
Step 16
In the Console1 window, expand Certificates - Current User and click Personal.
Right-click Personal, point to All Tasks and select Request New Certificate.
31 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 17
The Certificate Enrollment window opens.
Step 18
In the Select Certificate Enrollment Policy page, click Next.
Step 19
In the Request Certificates page, select User check box.
32 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Then click down arrow beside the Details button to expand it.
Click Properties.
Step 20
In the Certificate Properties dialog box, click Certification Authority tab.
Step 21
Under the Certification Authority tab, notice the two CA servers that were installed
earlier.
33 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Click OK.
Step 22
Back in the Request Certificates page, click Enroll.
34 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 23
There will be a momentary pause while enrollment for the user is being processed.
Click Finish.
35 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 24
Back in Console1 window, under Certificates - Current User node > Personal,
click Certificates folder.
In the details pane at the right, notice the certificate issued to Matthew Bernstein by
PRACTICELABS-PLABDM01-CA which is the subordinate CA in the domain.
36 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Keep all devices powered on in their current state and proceed to the next
exercise.
37 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
the certificate is stolen or when the smartcard-based certificate is lost by a user. CRLs
are normally published through IIS which can be accessed by all computers with a web
browser and network connection.
In this exercise, you will configure certificate revocation lists in Certificate Services.
To learn more about setting up Certificate Revocation Lists among certificate authority
servers, please refer to your course material or use your preferred search engine to
research this topic in more detail.
In this task, you will change the CRL properties to see how certification authorities
propagate information about revoked certificates in the organization.
Step 1
Connect to PLABDC01.
Step 2
In the Certification Authority console, under PRACTICELABS-PLABDC01-CA
node, right-click Revoked Certificates and select Properties.
38 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 3
The Revoked Certificates Properties dialog box is open.
You will now change the CRL publication interval to lower values to see how CRLs
work between CA servers.
Under CRL Publishing Parameters tab, in the CRL publication interval box,
type:
39 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
30
Click Apply.
40 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
In the View CRLs folder tab, notice the current date and time displayed as a result of
the change in the value introduced in the previous step.
Click OK.
Step 5
Connect to PLABDM01.
41 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 6
You will apply the same CRL settings as configured earlier in PLABDC01 CA server.
You will now change the CRL publication interval to lower values to see how CRLs
work between CA servers.
Under CRL Publishing Parameters tab, in the CRL publication interval box,
type:
42 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
30
Click Apply.
43 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 7
In the View CRLs folder tab, the date and time settings are displayed as a result of the
change in CRLs.
Click OK.
44 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
In this task, you will revoke the certificate issued to a user named Matthew Bernstein.
Step 1
On PLABDM01 and the Certification Authority console window is open.
In the details pane at the right, notice the user certificate that was issued earlier to
Matthew Bernstein.
45 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 2
Right-click on the certificate issued to Matthew Bernstein, point to All Tasks and
select Revoke Certificate.
46 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 3
In the Certificate Revocation dialog box, access the Reason code drop-down list
and select Certificate Hold and then click Yes to proceed.
A Certificate Hold reason can be applied to a user account; this is useful if the user
has gone on extended leave and will report back to the organization at a later date.
47 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
On the Certification Authority console window, notice that the certificate issued to
Matthew Bernstein is not available anymore.
A certificate that was revoked for reasons of “Certificate Hold” can be unrevoked.
Right-click the user certificate and point to All Tasks and select Unrevoke
Certificate.
48 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 5
Notice that the certificate was removed from Revoked Certificates folder.
49 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 6
The Issued Certificates folder now contains Matthew Bernstein’s user certificate.
To revoke the certificate, right-click again on the certificate and point to All Tasks >
Revoke Certificate.
50 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 7
In the Certificate Revocation dialog box, access the Reason code drop-down list
and select Key Compromise.
Click Yes.
51 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 8
As before, the issued certificate will be moved to Revoked Certificates folder.
Step 9
In the Revoked Certificates folder, right-click the certificate and point to All Tasks
and select Unrevoke Certificate.
52 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 10
In the Microsoft Active Directory Certificate Services message box, the system
indicates that it was unable to unrevoke the certificate because of the reason code that
was selected earlier.
Click OK.
53 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
In this task, you will publish the revoked certificates to other CA servers. To publish
CRL to other CA servers, perform the following steps:
Step 1
On PLABDM01, the Certification Authority window is open.
Right-click on Revoked Certificates folder and point to All Tasks and select
Publish.
54 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 2
In the Publish CRL dialog box, verify that New CRL option button is selected.
This is the first time a CRL will be published. Therefore this option is the logical
choice.
Click OK.
55 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 3
Right-click on Revoked Certificates folder and select Properties.
56 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
The CRL Publishing Parameters tab displays the publication interval for New CRL
and Delta CRLs (recent updates of revoked certificates).
57 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 5
The View CRLs tab displays publication status of CRLs.
58 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 6
The Certificate Revocation List dialog box displays information about the newly
created CRL.
Click OK.
59 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Keep the devices you have powered on in their current state and proceed to the
next exercise.
60 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
To learn more about providing backing up and restoring AD Certificate Services, please
refer to your course material or use your preferred search engine to research this topic
in more detail.
Step 1
Connect to PLABDC01.
Since Server auto login was disabled earlier, you may be asked to sign back in.
Passw0rd
Press Enter.
Step 2
When signed in, launch File Explorer from the taskbar.
61 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 3
Restore Server Manager from taskbar.
In the Server Manager > Dashboard window, click Tools menu and select
Certification Authority.
Step 4
Right-click on PRACTICELABS-PLABDC01-CA and choose All Tasks > Back up
CA
62 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 5
In the Welcome to the Certification Authority Backup Wizard page, click
Next.
Step 6
In Items to Back Up page, check the following boxes:
63 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
c:\BackupCA1
Choose Next.
Step 7
To protect the keys from being restored by non-authorised users, a password must be
set.
In the Select a Password page, in the Password and Confirm password text
boxes, type:
64 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Passw0rd
Click Next.
Step 8
When Completing the Certification Authority Backup Wizard page appears,
click Finish to proceed with the backup.
65 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 9
The backup process message box will display momentarily and close itself when it is
successfully completed.
Step 10
When the backup is complete, launch File Explorer from the taskbar.
Notice the DataBase folder and private key are saved in the folder.
66 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 11
If time permits, perform the same task of backing up the enterprise subordinate CA in
PLABDM01 server.
Please note that you need to create first a destination folder in PLABDM01 where the
backup files will be saved.
First, you need to connect to PLABDM01 server then perform Step 3 to Step 9 to
back up the Certificate service.
67 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Another method to backup keys in Certification Authority server is via the command
line using certutil.exe tool.
Step 1
Connect to PLABDC01.
Right-click Start button and select Command Prompt (Admin) from the shortcut
menu.
Step 2
In the command prompt window, type the following command:
Press Enter.
In the Enter new password and Confirm new password prompts, type:
Passw0rd
Press Enter.
68 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 3
The backup is successfully completed.
69 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
After the keys and database have been backed up, you also need to export the
configuration of CA server.
Press Enter.
70 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 5
The backup of the configuration is successfully completed.
71 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 6
Launch File Explorer from the taskbar.
Verify that CAConfig registration file is saved in the target folder called
c:\BackpCA2.
72 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 1
On PLABDC01, click Certificate Authority console from the taskbar to restore it.
Step 2
In the Certification Authority console window, right-click PRACTICELABS-
PLABDC01-CA, point to All Tasks and select Restore CA.
73 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 3
In the Certification Authority Restore Wizard message box, click OK.
74 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
In the Welcome to the Certification Authority Wizard page, click Next.
Step 5
In the Items to Restore page, select Private key and CA certificate and
Certificate database and certificate database log check boxes.
75 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
C:\BackupCA1
Click Next.
Step 6
In the Provide Password page, in the Password text box, type:
Passw0rd
Click Next.
76 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 7
In the Completing the Certification Authority Restore Wizard page, a
summary of settings is displayed.
Click Finish.
77 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 8
The restore progress will briefly display.
78 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 9
The Active Directory Certificate services will be successfully started.
79 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 1
On PLABDC01, right-click Start button and select Command Prompt (Admin)
from shortcut menu.
Step 2
80 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Press Enter.
Step 3
Please wait while the Active Directory Certificate Services is stopping.
81 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 4
On the next prompt, to use certutil.exe to restore the CA server, type the following
command:
cd\
Press Enter.
Press Enter.
Passw0rd
Press Enter.
82 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 5
You get a confirmation that the restoration of the Certificate Services was successfully
completed.
Press Enter.
83 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Step 6
The Active Directory Certificate Services is successfully started.
84 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
By default, when you connect to a device in Practice Labs you are automatically logged
in - usually as the administrator. For this task, you will need to re-enable this feature
and so you will be logged in automatically in the next exercise.
Step 1
On the Practice Labs web page, click the Access your settings tab.
Under the Device heading there is an option named Server auto login, click the
Enable button.
Result - You have successfully completed the essential tasks for installing and
85 of 86 24-01-2020, 15:11
Print content https://www.practice-labs.com/authenticated/vNext/vn-print-content.aspx
Shutdown all virtual machines used in this lab by using the power functions
located in the Tools bar, before proceeding to the next module. Alternatively, you
can log out of the lab platform.
Summary
You have successfully completed the following exercises in this module:
86 of 86 24-01-2020, 15:11