Microsoft AD CS and NDES nShield HSM Integration Guide for Microsoft Windows Server
Table of Contents
- Introduction
-
Procedures
- Install the Security World software and create a Security World
- Generate the OCS or Softcard in the CA server
- Configure the CSP provider in the CA server
- Configure the CSP provider on the NDES server
- Install and configure AD CS on the CA server
- Create a virtual directory to serve as the public key infrastructure (PKI) repository
- Create domain user accounts to act as the NDES service account
- Add the SCEPAdmin account and SCEPSvc service account to the local IIS_IUSERS group
- Configure the SCEPAdmin account and SCEPSvc service account with request permission on the CA
- Configure the SCEPDeviceAdmin account with enroll permission to the IPsec (offline request) certificate template
- Install and configure NDES
- Configuring the NDES admin page to use an SSL certificate
- Troubleshooting
Introduction
This document describes how to integrate the Microsoft Network Device Enrollment Service (NDES) with the Entrust nshield hardware security module (HSM) as a Root of Trust for storage encryption, to protect the private keys and meet FIPS 140-2 Level 2 or Level 3. NDES implements the Simple Certificate Enrollment Protocol (SCEP), which defines the communication between network devices and a Registration Authority (RA) for certificate enrollment.
SCEP supports the secure issuance of certificates to network devices which do not run with domain credentials to enroll for x509 version 3 certificates from a Certification Authority (CA). Ultimately, the network device will have a private key and associated certificate issued by a CA. Applications on the device may use the key and its associated certificate to interact with other entities on the network. The most common usage of this certificate on a network device is to authenticate the device in an IPSec session.
Product configurations
Entrust tested the integration with the following versions:
Product | Version |
---|---|
Base OS |
Windows Server 2019 Datacenter |
Supported nshield hardware and software versions
Entrust tested the integration with the following nshield HSM hardware and software versions, and SQLEKM provider:
Product | Security World | Firmware | Netimage |
---|---|---|---|
Connect XC |
12.71.00 |
FIPS 12.50.11 |
12.60.10 |
Requirements
Familiarize yourself with:
-
Active Directory Certificate Services (AD CS): Network Device Enrollment Service (NDES) documentation ( https://docs.microsoft.com ).
-
The HSM Installation Guide and User Guide .
-
Your organizational Certificate Policy and Certificate Practice Statement, and a Security Policy or Procedure in place covering administration of the PKI and HSM:
-
The number and quorum of Administrator cards in the Administrator Card Set (ACS), and the policy for managing these cards.
-
The number and quorum of Operator cards in the Operator Card Set (OCS), and the policy for managing these cards.
-
The keys protection method: Module, Softcard, or OCS.
-
The level of compliance for the Security World, FIPS 140-2 Level 3.
-
Key attributes such as key size, time-out, or need for auditing key usage.
-
Procedures
Prerequisites:
-
A Windows domain controller.
-
Domain administrator privileges to add accounts and join clients.
-
A Windows server in the domain with Internet Information Services (IIS) installed Active Directory Certificate Service (AD CS) will be installed in this server per the instructions below.
-
A second Windows server in the domain with IIS installed. NDES will be installed in this server per the instructions below.
-
A Windows client in the domain to request CA hash and challenge password pairs.
Installation steps:
-
Install the Security World software and create a Security World
-
Create a virtual directory to serve as the public key infrastructure (PKI) repository
-
Create domain user accounts to act as the NDES service account
-
Add the SCEPAdmin account and SCEPSvc service account to the local IIS_IUSERS group
-
Configure the SCEPAdmin account and SCEPSvc service account with request permission on the CA
Install the Security World software and create a Security World
-
Log into the CA server using the domain name, <domain_name>\Administrator.
-
Install the Security World software by double-clicking on the
SecWorld_Windows-xx.xx.xx.iso
file. For detailed instructions, see the Installation Guide and the User Guide for the HSM available from the installation disc. -
Add the Security World utilities path
C:\Program Files\nCipher\nfast\bin
to the Windows system path. -
Open the firewall port 9004 for the HSM connections.
-
Install the nshield Connect HSM locally, remotely, or remotely via the serial console. See the following nshield Support articles, and the Installation Guide for the HSM:
-
Open a command window and run the following to confirm the HSM is
operational
.C:\Users\dbuser>enquiry Server: enquiry reply flags none enquiry reply level Six serial number 530E-02E0-D947 7724-8509-81E3 09AF-0BE9-53AA 9E10-03E0-D947 mode operational ... Module #1: enquiry reply flags none enquiry reply level Six serial number 530E-02E0-D947 mode operational ...
-
Create your Security World if one does not already exist, or copy an existing one. Follow your organization’s security policy for this. Create extra ACS cards as spares in case of a card failure or a lost card. ACS cards cannot be duplicated after the Security World is created.
-
Confirm the Security World is
usable
.C:\Users\dbuser>nfkminfo World generation 2 state 0x37270008 Initialised Usable ... ... Module #1 generation 2 state 0x2 Usable ...
-
Log into the NDES server using the domain name, <domain_name>\Administrator and repeat the above steps, but copying the Security World from the CA server.
Generate the OCS or Softcard in the CA server
The OCS or Softcard and associated passphrase will be used to authorize access to the CA server keys protected by the HSM. Typically, one or the other will be used, rarely both. Follow your organization’s security policy to select which one.
Create the OCS
-
Ensure the
C:\ProgramData\nCipher\Key Management Data\config\cardlist
file contains the serial number of the card(s) to be presented, or the wildcard "*". -
Open a command window as administrator.
-
Execute the following command. Enter a passphrase or password at the prompt. Follow your organization’s security policy for this for the values K/N, where K=1 as mentioned above. Use the same passphrase for all the OCS cards in the card set (one for each person with access privilege, plus the spares). After an OCS card set has been created, the cards cannot be duplicated. Notice
slot 2
, remote via a Trusted Verification Device (TVD), is used to present the card.>createocs -m1 -s2 -N MSaDCSnDESocs -Q 1/1 FIPS 140-2 level 3 auth obtained. Creating Cardset: Module 1: 0 cards of 1 written Module 1 slot 0: Admin Card #1 Module 1 slot 2: empty Module 1 slot 3: empty Module 1 slot 2: blank card Module 1 slot 2:- passphrase specified - writing card Card writing complete. cardset created; hkltu = 8b652e480d6307c32a1b1395a7a12c8ef07fbd24
Add the
-p
(persistent) option to the command above to have authentication after the OCS card has been removed from the HSM front panel slot, or from the TVD. The authentication provided by the OCS as shown in the command line above is non-persistent and only available while the OCS card is inserted in the HSM front panel slot, or the TVD. -
Verify the OCS created.
nfkminfo -c Cardset list - 1 cardsets: (P)ersistent/(N)ot, (R)emoteable/(L)ocal-only Operator logical token hash k/n timeout name 8b652e480d6307c32a1b1395a7a12c8ef07fbd24 1/1 none-NL MSaDCSnDESocs
The
rocs
utility also shows the OCS created.>rocs `rocs' key recovery tool Useful commands: `help', `help intro', `quit'. rocs> list cardset No. Name Keys (recov) Sharing 1 MSaDCSnDESocs 0 (0) 1 of 1 rocs> quit
Create the Softcard
-
Ensure the
C:\Program Files\nCipher\nfast\cknfastrc
file exists with the following content. Otherwise create it.> type "C:\Program Files\nCipher\nfast\cknfastrc" CKNFAST_LOADSHARING=1
-
Execute the following command. Enter a passphrase or password at the prompt.
>ppmk -n MSaDCSnDESsoftcard Enter new pass phrase: Enter new pass phrase again: New softcard created: HKLTU f2f7d34e4ddc950038db430ddbe06488f4c21ee7
-
Verify the Softcard created.
>nfkminfo -s SoftCard summary - 1 softcards: Operator logical token hash name f2f7d34e4ddc950038db430ddbe06488f4c21ee7 MSaDCSnDESsoftcard
The
rocs
utility also shows the OCS and Softcard created.>rocs `rocs' key recovery tool Useful commands: `help', `help intro', `quit'. rocs> list cardset No. Name Keys (recov) Sharing 1 MSaDCSnDESocs 0 (0) 1 of 1 2 MSaDCSnDESsoftcard 0 (0) (softcard) rocs>quit
Configure the CSP provider in the CA server
-
Log into the CA server using the domain name, <domain_name>\Administrator.
-
Select Start > nCipher > CNG configuration wizard .
-
Select Next on the Welcome window.
-
Select Next on the Enable HSM Pool Mode window, leaving Enable HSM Mode for CNG Providers un-checked.
-
Select Use existing security world on the Initial setup window. Then select Next .
-
Select the HSM (module) if more than one is available on the Set Module States window. Then select Next .
-
Select the protection method, on the Key Protection Setup window. Then select Next .
-
Choose from the Current Operator Card Sets or Current Softcards list. Notice these were created above. Then select Next and Finish .
-
Verify the provider with the following command.
>certutil -csplist | findstr nCipher Provider Name: nCipher Security World Key Storage Provider
Configure the CSP provider on the NDES server
-
Log into the NDES server using the domain name, <domain_name>\Administrator.
-
Select Start > nCipher > CNG configuration wizard .
-
Select Next on the Welcome window.
-
Select Next on the Enable HSM Pool Mode window, leaving Enable HSM Mode for CNG Providers un-checked.
-
Select Use existing security world on the Initial setup window. Then select Next .
-
Select the HSM (module) if more than one is available on the Set mode state window. Then select Next .
-
Select Module Protection on the Key Protection Setup window. Then select Next twice and Finish .
Install and configure AD CS on the CA server
-
Log into the CA server using the domain name, <domain_name>\Administrator.
-
Select Start > Server Manager to open the Server Manager.
-
Select Manage , then select Add Roles & Features . The Before you begin window opens. Select Next .
-
Select Role-based or feature-based installation on the Select installation type window. Select Next .
-
Select the local server from the pool on the Select destination server window. Select Next .
-
Select Active Directory Certificate Services role on the Select server roles window. The Add Roles and Features Wizard will appear. Select Add Features and then select Next .
-
Select Remote Server Administration Tools on the Select features windows. Select Next twice.
-
Select Certification Authority on the Select role services windows. Select Next .
-
Verify the information, then select Install on the Confirm installation selections window.
-
Do not select Close the Installation progress windows once the installation is complete Select the Configure Active Directory Certificate Services on the destination server link instead.
-
Verify the Administrator credentials, <domain_name>\Administrator on the Credentials text box on the Credentials windows. If needed select Change and specify the appropriate credentials. Select Next .
-
Select Certification Authority on the Role Services window. This is the only available selection when the certification authority role is installed on the server. Select Next .
-
Select Enterprise CA on the Setup Type window. Select Next .
-
Select Root CA on the CA Type window. Select Next .
-
Select Create a new private key on the Private Key window. Select Next .
-
Select a nCipher Security World Key Storage Provider on the Cryptography for CA window, one with the key length of 2048 or larger. Also check Allow administrator interaction when the private key is accessed by the CA if OCS or Softcard protection is used, our case in this integration. Then select Next .
-
Take the default CA name given, or modify if desire on the CA Name window. Select Next .
-
Enter the number of years for the certificate to be valid on the Validity Period window. Select Next .
-
Take the default locations for the database and database log files, or modify if desire on the CA Database window. Select Next .
-
Select Configure on the Confirmation window.
-
A Create new key wizard window appears on the task bar. It may be hidden behind the other windows. Open it and select Next .
-
Select the protection method for the new key. Select Next .
NoteYou will be prompted to enter the Softcard passphrase or present the OCS (token) if either protection method was chosen when the CNG provider was installed. There will be no prompt if Module protection was chosen. NoteIf you are using a FIPS 140-2 Level 3 Security World, you will need to present either a card from the ACS or OCS for FIPS authorization before the AD CS key can be generated, irrespective of your chosen protection method. -
Present the Softcard passphrase or OCS, and select the module if more than one nshield Connect is available. Select Finish to close the wizard. The following image shows when OCS protection is selected.
-
Select Next on the Load key window.
-
Select the module on the Choose modules you wish to load the key onto window. Select Next .
-
Enter the passphrase. Select Next .
-
Select Finish . Successful configuration is shown as follows.
-
The key generated can be verified by a CLI command.
>nfkminfo -l Keys protected by cardsets: key_caping_machine--75393afa6878b98e3d91b5ff360284f706a97572 `interop-MS-NDES-CA-CA`
The
rocs
utility shows the names and protection methods of the keys.>rocs `rocs' key recovery tool Useful commands: `help', `help intro', `quit'. rocs> list keys No. Name App Protected by 1 interop-MS-NDES-CA-CA caping MSaDCSnDESocs rocs> quit
-
Register
nFast Server
as a dependency of AD CS with thencsvcdep
tool in thenfast/bin
directory. This is needed as the nshield service must have started before CA, otherwise the nshield CNG providers will fail.Run the command:
>ncsvcdep -a certsvc
Output:
Dependency change succeeded.
-
Verify that the CA service has started successfully.
Run the command:
>sc query certsvc
Output:
SERVICE_NAME: certsvc TYPE : 110 WIN32_OWN_PROCESS (interactive) STATE : 4 RUNNING (STOPPABLE, PAUSABLE, ACCEPTS_SHUTDOWN) WIN32_EXIT_CODE : 0 (0x0) SERVICE_EXIT_CODE : 0 (0x0) CHECKPOINT : 0x0 WAIT_HINT : 0x0
Create a virtual directory to serve as the public key infrastructure (PKI) repository
-
Log into the CA server using the domain name, <domain_name>\Administrator.
-
Create a local directory for PKI repository, for example
C:\PKIRepository
. See the following Microsoft link for instructions, https://docs.microsoft.com/en-us/troubleshoot/windows-server/networking/create-virtual-directory-folder-remote-computer . -
Create a virtual directory. Notice the alias and physical path, and path credentials.
-
Test the virtual directory per the same link above.
Create domain user accounts to act as the NDES service account
-
Log into the Domain Controller as Domain Administrator.
-
Select Active Directory Users and Computers from the Start menu.
Add user SCEPAdmin , SCEPSvc , and SCEPDeviceAdmin .
-
Expand <domain_name>.com, right-click on Users and select New > User .
-
Enter the name SCEPAdmin and select Next . Follow your organization’s security policies to set the password. Never expires was selected for the purpose of this integration.
-
Create new users for SCEPSvc and SCEPDeviceAdmin by repeating the previous steps.
Add user SCEPAdmin to the Enterprise Admins and Domain Admins groups.
-
Right-click on Enterprise Admins on the right pane, and select Properties .
-
Select the Members tab and then select Add .
-
Enter the SCEPAdmin account, select Check Names , and if found then select OK .
-
Select Apply and OK .
-
Repeat the above steps for the Domain Admins group.
Add the SCEPAdmin account and SCEPSvc service account to the local IIS_IUSERS group
-
Log into the NDES server using the domain name, <domain_name>\Administrator.
-
Open Computer Management (
compmgmt.msc
). -
Expand Local User and Groups on the Computer Management console tree, under System Tools . Select Groups .
-
Double-click IIS_IUSRS on the details pane.
-
Select Add on the IIS_IUSRS Properties window.
-
Enter the SCEPAdmin account, select Check Names , and if found then select OK .
-
Select Apply and OK .
-
Repeat the above steps for the SCEPSvc service account.
Configure the SCEPAdmin account and SCEPSvc service account with request permission on the CA
-
Log into the CA server using the domain name, <domain_name>\Administrator.
-
Select Certification Authority from the Tools menu on the Server Manager window.
-
Right-click the certification authority (this CA server), and then select Properties .
-
Select the Security tab.
NoteNotice the accounts that have Request Certificates permissions. By default the group Authenticated Users has this permission. The SCEPAdmin account will be a member of Authenticated Users when it is in use, which has Request Certificates permission. However, if that is not the case, do as follows: -
Select Add .
-
On the Select Users, Computers, Service Accounts, or Groups text box, type the name of the SCEPAdmin account, select Check Names , and if found then select OK .
-
Select the SCEPAdmin account and verify the Allow check box that corresponds to Request Certificates is selected. Select Apply and then select OK .
-
Repeat the above steps for the SCEPSvc service account.
Configure the SCEPDeviceAdmin account with enroll permission to the IPsec (offline request) certificate template
-
Log into the CA server using the domain name, <domain_name>\Administrator.
-
Select Certification Authority from the Tools menu on the Server Manager window.
-
Expand the server on the left pane, then right-click on Certificate Templates and select Manage .
-
Right-click IPSec on the Template Display Name pane and select Properties .
-
Select the Security tab. Then select Add .
-
On the Select Users, Computers, Service Accounts, or Groups text box, type the name of the SCEPDeviceAdmin account, select Check Names , and if found then select OK .
-
Select the SCEPDeviceAdmin account and verify the Allow check box that corresponds to Enroll is selected. Select Apply and then select OK .
Install and configure NDES
-
Log into the NDES server using the domain name, <domain_name>\Administrator.
-
Select Start > Server Manager to open the Server Manager.
-
Select Manage , then select Add Roles & Features . The Before you begin window opens. Select Next .
-
Select Role-based or feature-based installation on the Select installation type window. Select Next .
-
Select the local server from the pool on the Select destination server window. Select Next .
-
Select Active Directory Certificate Services role on the Select server roles window. The Add Roles and Features Wizard appears. Select Add Features and then select Next .
-
Select Next on the Select features window.
-
Select Next on the Active Directory Certificate Services window.
-
Uncheck Certification Authority and check Network Device Enrollment Service on the Select role services window. The Add Roles and Features Wizard will appear.
-
Select Add Features and then select Next on the Select role services window.
-
Verify the information, then select Install on the Confirm installation selections window.
-
Do not select Close on the Installation progress windows once the installation is complete. Select the Configure Active Directory Certificate Services on the destination server link instead.
-
Change the Credentials to <domain_name>\SCEPAdmin on the Credentials windows. Select Change , enter new credential, then select Next .
-
Check Network Device Enrollment Service on the Credential window, then select Next .
-
Select the Specify service account on the Service Account window, then select Select… .
-
Enter the credential for the SCEPSvc service account and then select OK and Next .
-
Select CA name on the CA for NDES windows, then select Select… .
-
Choose the CA server on the Select Certificate Authority window, then select OK and Next .
-
Note the specified Registration Authority ( RA Name ) on the RA Information window. Complete any of the optional information as required. Then select Next .
-
Choose the Signature key provider and Encryption key provider on the Cryptography for NDES window. A key size of 2048 or larger is recommended.
NoteOnly Cryptographic Application Programming Interface (CryptoAPI) Service Providers are supported for the RA keys-Cryptography API. Next Generation (CNG) providers are not supported. The Entrust CNG configured on the NDES server will be used to Configuring the NDES admin page to use an SSL certificate . -
Select Next and review the chosen options at the Confirmation window. Then select Configure .
NoteThe NDES RA private keys will be protected on the issuing CA. -
Log into the CA server and present the OCS or enter the passphrase if either OCS or Softcard protection was selected. Look for an icon on the Taskbar if the Load key window is not present. You may be prompted to present the OCS or enter the passphrase more than once.
-
Go back to the NDES server. Notice the Configuration succeeded message on the Results window. Then select Close .
Test access to the NDES web site (unsecured).
-
Log into the Windows client.
-
Launch the browser and go to the following address: http://<NDES-server-address>/CertSrv/mscep_admin. Log in as <domain-name>\SCEPSvc.
-
Notice the hash value of the CA certificate and the challenge password. Refreshing the browser generates a new pair.
NoteAn HTTP address to access NDES server is not recommended, and is only done above for the purposes of demonstration. You may want to configure your HTTP address to be redirected to HTTPS for the devices requesting to be enrolled. Refer to Microsoft documentation to perform this configuration, if required.
Configuring the NDES admin page to use an SSL certificate
Create a template for the NDES Admin web service certificate request to ensure that the nCipher KSP is used to generate the key pair.
-
Log into the NDES server using the domain name, <domain_name>\Administrator.
-
Create a
request.inf
file using a text editor as follows. Change the Subject field to the Fully Qualified Domain Name (FQDN) of the NDES Server, for example:ms-ndes-serv.interop.com
.[Version] Signature= "$Windows NT$" [NewRequest] Subject = "CN=<FQDN-of-NDES-Server>" HashAlgorithm = SHA256 KeyAlgorithm = RSA KeyLength = 2048 ProviderName = "nCipher Security World Key Storage Provider" KeyUsage = 0xf0 MachineKeySet = True [EnhancedKeyUsageExtension] OID=1.3.6.1.5.5.7.3.1
For example:
[Version] Signature= "$Windows NT$" [NewRequest] Subject = "CN=ms-ndes-serv.interop.com" HashAlgorithm = SHA256 KeyAlgorithm = RSA KeyLength = 2048 ProviderName = "nCipher Security World Key Storage Provider" KeyUsage = 0xf0 MachineKeySet = True [EnhancedKeyUsageExtension] OID=1.3.6.1.5.5.7.3.1
-
Create a Certificate request file by running the following command.
certreq.exe -new <Path-to-Request.inf> <Name-of-Request>.req
Output:
>certreq -new NDES-SSL-Cert.inf NDES-SSL-Cert.req CertReq: Request Created
-
Copy the above certificate request file to the CA server.
Have the CA issue a certificate based on the Web service certificate template and the certificate request above.
-
Log into the CA server using the domain name, <domain_name>\Administrator.
-
Enable the Web Server certificate template option. Open the Certification Authority tool and expand the issuing CA node on the left hand pane.
-
Right-click on Certificate Templates and select Manage .
-
Right-click on Web Server and select Duplicate Template on the Certificate Template Console window.
-
Right-click on the newly created template and select Properties on the Certificate Template Console window.
-
Select the General tab. Type the name you want to use on the Template Display Name . Then select Apply and OK .
-
Select the Security tab.
-
Select Authenticated Users in Groups and user names . Then check Enroll in Permissions for Authenticated Users . Then select Apply and OK .
-
Right-click on Certificate Templates back on the Certification Authority window and select New and Certificate Template to Issue .
-
Run the following command to generated the certificate.
certreq -submit -attrib “CertificateTemplate:<New-Template-Name>” <Path-to-request.req>
Partial output before executing the following steps:
>certreq -submit -attrib "CertificateTemplate:NDES-SSL-Cert-Template" NDES-SSL-Cert.req NDES-SSL-Cert.cer Active Directory Enrollment Policy {96E14557-DDD4-48BD-BE1A-AA453F20D859} ldap:
-
Select the CA server from the Certification Authority List dialog, then select OK . Look for a cog icon which may be flashing on the Taskbar. Present the OCS and enter the passphrase, or enter the Softcard passphrase.
-
Enter the name for the certificate generated on the Save Certificate dialog.
The final output is shown below:
>certreq -submit -attrib "CertificateTemplate:NDES-SSL-Cert-Template" NDES-SSL-Cert.req NDES-SSL-Cert.cer Active Directory Enrollment Policy {96E14557-DDD4-48BD-BE1A-AA453F20D859} ldap: RequestId: 11 RequestId: "11" Certificate retrieved(Issued) Issued The certificate validity period will be shorter than the NDES-SSL-Cert-Template Certificate Template specifies, because the template validity period is longer than the maximum certificate validity period allowed by the CA. Consider renewing the CA certificate, reducing the template validity period, or increasing the registry validity period.
-
Copy the above certificate to the NDES server.
Install the certificate on the NDES server, matching it with the private key previously created using the nCipher CSP.
-
Log into the NDES server using the domain name, <domain_name>\Administrator.
-
Run the following command.
>certreq.exe -accept <Name-of-Certificate>.cer
Output:
>certreq -accept NDES-SSL-Cert.cer Installed Certificate: Serial Number: 7c0000000bf544d43dadb23a2f00000000000b Subject: CN=ms-ndes-serv.interop.com NotBefore: 10/7/2021 12:00 AM NotAfter: 10/7/2023 12:10 AM Thumbprint: a07344a115b23f7cd903851af3b66884e55aa3ea
-
Open
certlm.msc
by right-clicking on the Windows Start menu, then select Run , typecertlm.msc
, and select OK . -
Expand the Personal store on the left pane and then select Certificates .
-
Check the certificate installed above is available.
-
Open the IIS manager, expand the server and Sites on the Connections pane and select Default Web Site .
-
Select Bindings on the Actions pane.
-
Select Add on the Site Bindings dialog.
-
Select https in Type: on the Add Site Binding dialog. Choose the certificate previously created in SSL certificate . Then select OK and Close .
Increase the maximum number of allowed unique passwords generated by the NDES service to 30 before the service needs to be restarted.
-
Log into the NDES server using the domain name, <domain_name>\Administrator.
-
Open regedit by right-clicking on the Windows Start menu, then select Run , type
certlm.msc
, and select OK . -
Navigate to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\MSCEP .
-
Right-click on the right pane and select New > Key > DWORD (32-bit) . Name the key PasswordMax .
-
Right-click on the key and select Modify . Set Value data to 30 on the Edit DWORD (32-bit) Value dialog. Then select OK .
-
Restart the IIS server. Open the IIS manager, select the server on the Connections pane and select Restart on the Actions pane.
Test access to the NDES web site (secured).
-
Log into the Windows client.
-
Launch the browser and go to the following address: https://<NDES-server-address>/CertSrv/mscep_admin. Log in as <domain-name>\SCEPSvc.
-
Notice the hash value of the CA certificate and the challenge password. Refreshing the browser generates a new pair.
Troubleshooting
Use the following table to troubleshoot the error messages shown.
Problem | Cause | Resolution |
---|---|---|
Using the
|
This error occurs when the CSPs are not installed or not set up correctly. |
Ensure that the nCipher CNG CSP providers are correctly installed and set. (Do this by running the CSP Install Wizard and CNG Configuration Wizard under nCipher in the Start menu). |
The
AD CS Configuration Wizard
does not detect the OCS.
|
TokenSecureChannelError can occasionally be seen when presenting the OCS. |
Remove and re-insert the cards until it is picked up by
|
-
ProductsnShield Connect
-
ProductsnShield Edge
-
ProductsnShield as a Service