Domain Controller Authentication Certificate
It replaces the domain controller authentication template.
Domain controller authentication certificate. However certificates based on the domain controller and domain controller authentication certificate templates do not include the kdc authentication object identifier oid which was later added to the kerberos rfc. To publish the issuing ca certificate in the domain run the following command at a command prompt. By default the active directory certificate authority.
1 2 840 113549 1 1 5 sha1rsa algorithm parameters. Installing a certificate on the domain controller enables the key distribution center kdc to prove its identity to other members of the domain. Make sure that the issuing ca certificate of the user s certificate is installed in the enterprise ntauth store.
Clients need to trust domain controllers and the best way to do this is to ensure each domain controller has a kerberos authentication certificate. The purpose of the kerberos authentication template is to issue certificates to domain controllers which present the certificates to client computers during user and computer network authentication. Expand certificates local computer expand personal and then expand certificates.
This certificate is issued to the computer s fully qualified host name. The domain controller certificate must be installed in the local computer s certificate store. This provides clients a root of trust external to the domain namely the enterprise certificate authority.
Restart the domain controller. List domain controller authentication certificates now we can list all certificates we can even pick up the one with domain controller authentication template we just need to read the date when it expires and then mark it with some rag red amber green status based on how close it is to be expired for me i mark it red if it is to expire within 30 days because based on my cert template. Sample certificate x509 certificate.
Certificates issued via this new template contain two specific attributes. Client authentication 1 3 6 1 5 5 7 3 2 server authentication 1 3 6 1 5 5 7 3 1. Rather than relying on the dns name of the computer applications can verify the following.