Expiring Two-Tier PKI Enterprise CA and migration from 2012 R2 to 2022

J Moat 76 Reputation points
2024-03-11T18:17:38.8466667+00:00

We have quite a big change coming up regarding our PKI Infrastructure, and I'm not finding great articles regarding a two-tier migration to new servers as well as a Root CA expiry at the same time.

So, let's say the Root CA expires in July, but want to get the new Root CA and Issuing CA up in May, and we want all pre-existing certificates to continue to work.

I assume these are the steps I should follow:

  1. Backup the Root CA - Private key and CA certificate. Certificate Database and certificate database log.
  2. Backup CA Registry Settings - Edit the "CAServerName"="newservername.domain.com" in the registry.
  3. Restore CA Backup
  4. Import CA Registry Settings
  5. Backup Issuing CA/Issuing CA Registry
  6. Remove AD Certificate Service roles from Issuing CA/remove Issuing CA from domain
  7. Import Issuing CA/Issuing CA Registry - Edit the "CAServerName" to new server name
  8. Re-Deploy Certificate Templates

Now, since the Root CA Certificate will be expiring, I assume we then need to do Renew CA Certificate but do not generate a new public and private key pair (Renewal with existing key pair). Does this sound correct?

Windows for business | Windows Server | User experience | Other
0 comments No comments
{count} votes

Accepted answer
  1. Anonymous
    2024-03-12T01:55:01.73+00:00

    Hello J Moat,

    Thank you for posting in Q&A forum.

    Is your two-tier PKI Infrastructure an offline standalone root CA (in one workgroup) and an online enterprise issuing CA (in your domain)? If so, you can migrate it based on the steps below:

    For migrating root CA:

    1.Check the PKI health, open PKIview.msc to check.

    2.Back up root CA data (certificate authority database and its configuration, CA Registry Settings) as in the link below.

    3.Uninstall CA Service from old root CA.

    4.Install Windows Server 2022 Certificate Services on new root CA server that in workgroup (this new root CA machine name can be different as old root CA server name).

    5.Configure AD CS on new root CA server.

    6.Restore root CA Backup on new root CA server.

    7.Restore Registry info on new root CA server.

    For migrating issuing CA:

    1.Check the PKI health, open PKIview.msc to check.

    2.Back up issuing CA data (certificate authority database and its configuration, CA Registry Settings) as in the link below.

    3.Uninstall CA Service from old issuing CA.

    4.Install Windows Server 2022 Certificate Services on new issuing CA server that in domain (this new issuing CA machine name can be different as old issuing CA server name).

    5.Configure AD CS on new issuing CA server.

    6.Restore issuing CA Backup on new issuing CA server.

    7.Restore Registry info on new issuing CA server.

    8.Reissue Certificate Templates.

    For the migration steps, you can refer to steps below (similar steps as From Windows Server 2012 R2 to 2022)

    Step-By-Step: Migrating The Active Directory Certificate Service From Windows Server 2008 R2 to 2019

    https://techcommunity.microsoft.com/t5/itops-talk-blog/step-by-step-migrating-the-active-directory-certificate-service/ba-p/697674

    Now, since the Root CA Certificate will be expiring, I assume we then need to do Renew CA Certificate but do not generate a new public and private key pair (Renewal with existing key pair).

    A: Yes, you can migrate the two-tier PKI first and if the migration is successfully, then you can renew CA certificate before it expires.

    If you want to renew CA certificate with the existing public and private key pair, you can select "No" option below before clicking OK button.
    CA Validity Period Extension and CA Certificate Renewal Process ...

    Considerations for migrating a CA to a new machine:

    1. When migrating a CA, the computer name of the target computer may be different from the computer name of the source computer, but the CA name must keep the same.
    2. By default, Active Directory Certificate Services (AD CS) is configured with certificate revocation list (CRL) distribution point extensions, including the CA machine host name in the path. This means that any certificate issued by the CA prior to migration may contain a certificate verification path that contains the old host name. These paths may no longer be valid after migration. To avoid revocation checking errors, the new CA must be configured to publish the CRL to the old (pre-migration) path as well as the new path.
    3. During the installation process, we must choose to use the CA's existing certificate and private key instead of creating a new CA certificate and key.

    For CAservername, you can name it after this server is installed the operating system.

    I hope the information above is helpful.

    If you have any questions or concerns, please feel free to let us know.

    Best Regards,

    Daisy Zhou

    ============================================

    If the Answer is helpful, please click "Accept Answer" and upvote it.

    1 person found this answer helpful.

0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.