Deploy Certificates for DNS Server Authentication
Updated: October 7, 2009
Applies To: Windows Server 2008 R2
This topic applies to DNSSEC in Windows Server 2008 R2. DNSSEC support is greatly enhanced in Windows Server 2012. For more information, see DNSSEC in Windows Server 2012.
Use the following procedures to configure and publish server certificates for IPsec authentication, and to enable certificate auto-enrollment on your DNS servers.
When choosing a certification authority (CA) to issue certificates for IPsec authentication, it is important that you consider whether or not other certificates will be issued by the same CA. For more information, see Certificate Selection.
You can deploy certificates to DNS servers through one of the following mechanisms:
Domain Controllers organizational unit (OU): If the DNS servers in your domain are Active Directory-integrated, you can deploy IPsec policy settings using the Domain Controllers OU. This option is recommended to make configuration and deployment easier.
DNS Server OU or security group: If you have DNS servers that are not domain controllers, then consider creating a separate OU or a security group with the machine accounts of your DNS servers.
Local firewall configuration: Use this option if you have DNS servers that are not domain members or if you have a small number of DNS servers that you want to configure locally.
Use the following procedures to deploy DNS Server certificates to the Domain Controllers OU using auto-enrollment. If you wish to deploy DNS Server certificates manually or issue certificates to a different group of computers, modify the permission settings on the security tab in certificate template properties.
Membership in the Domain Admins group, or equivalent, is the minimum required to complete this procedure. Review details about using the appropriate accounts and group memberships at Local and Domain Default Groups (http://go.microsoft.com/fwlink/?LinkId=83477).
Configure certificate templates
A certificate template must be created to provide authentication of DNSSEC protected communications. This certificate template will be configured with the Domain Name System (DNS) Server Trust application policy.
To configure and publish a certificate template for DNSSEC, the computer must be running Windows Server Enterprise Edition with the Active Directory Certificate Services (AD CS) role installed and configured as an Enterprise certification authority (CA).
To configure a certificate template
Click Start, click Run, type certtmpl.msc, and then press ENTER.
In the details pane, right-click RAS and IAS Server, and then click Duplicate Template.
Select Windows Server 2003 Enterprise, and then click OK.
Under Template display name, type DNS Server, and then select the Publish certificate in Active Directory check box.
Click the Request Handling tab, and select the Allow private key to be exported check box.
Click the Extensions tab, and then click Application Policies.
If the certification authority is running Windows Server® 2008 R2:
- Click Edit, click Add, click Domain Name System (DNS) Server Trust, and then click OK.
If the certification authority is running Windows Server® 2008 or an earlier operating system:
Click Edit, click Add, and then click New.
In the New Application Policy dialog box, under Name, type Domain Name System (DNS) Server Trust, and under Object identifier, type 126.96.36.199.4.1.3188.8.131.52, and then click OK twice.
Ensure that you enter the object identifier exactly as specified. This is required for servers to successfully negotiate IPsec with clients.
Click Add, click IP security IKE intermediate, and then click OK.
In Edit Application Policies Extension, verify that the following are listed under Application policies.
Domain Name System (DNS) Server Trust
IP security IKE intermediate
Click OK, click Key Usage, and then click the Edit.
Under Signature, select the Digital signature and Signature is proof or origin (nonrepudiation) check boxes.
Under Encryption, choose Allow key exchange only with key encryption (key encipherment), select the Allow encryption of user data and Make this extension critical check boxes, and then click OK.
Click the Security tab, click RAS and IAS Servers, and then click Remove.
Click Add, type Domain Controllers, and then click OK. ‘Alternatively, type the name of the OU or security group you will use to deploy DNSSEC server policy.
Select the Allow permission for Enroll and Autoenroll for the Domain Controllers security group or another security group you will use to deploy DNSSEC server policy.
Click OK and then close the certificate templates console.
Publish certificate templates
Use the following procedure to allow the CA to issue the new certificate template.
To publish certificate templates
Click Start, click Run, type certsrv.msc, and then press ENTER.
In the console tree, right-click Certificate Templates, point to New, and then click Certificate Template to Issue.
Click DNS Server, and then click OK.
In the console tree, click Certificate Templates, and in the details pane under Name, verify that DNS Server is displayed.
Close the Certification Authority console.
Enable certificate auto-enrollment
If you will use auto-enrollment to issue certificates for IPsec authentication, you must enable auto-enrollment in Group Policy. You do not need to perform this procedure to enroll certificates manually on your DNS servers.
To enable certificate auto-enrollment
On a domain controller or a computer with the Group Policy Management feature installed, click Start, click Run, type gpme.msc, and then press ENTER.
In the Browse for a Group Policy Object dialog box, double-click Domain Controllers.<domain.com>, click Default Domain Controllers Policy, and then click OK. The Group Policy Management Editor will open.
If you are using a different GPO to manage DNSSEC settings for your DNS servers, then enable certificate auto-enrollment in this GPO instead.
In the console tree, open Computer Configuration\Policies\Windows Settings\Security Settings\Public Key Policies.
In the details pane, double-click Certificate Services Client – Auto-Enrollment.
In the Certificate Services Client – Auto-Enrollment Properties dialog box, next to Configuration Model select Enabled from the drop-down menu, select the check boxes next to Renew expired certificates, update pending certificates, and remove revoked certificates and Update certificates that use certificate templates, and then click OK.
Close the Group Policy Management Editor.