Need guidance on updating Root CA CDP/AIA

AndyH16 1 Reputation point
2022-02-16T15:27:24.287+00:00

Hi, I'm currently looking to implement Always On VPN and as this relies on certificates quite a bit I want to make sure things are good with our setup before proceeding.

The VPN server is off the domain (workgroup) and so is unable to perform the checks on CRL, etc. As these were set to LDAP #1, both our sub CAs had a HTTP entry at #2 but it didn't appear to be checking this. Reading a guide by Vadims it recommends putting HTTP first and suggesting removing LDAP entirely - I'm not sure if this is recommended in an existing CA deployment, or possibly just recreating so that HTTP is #1.

Anyway, I have adjusted the CDP and AIA on one sub-CA, removing LDAP, so HTTP is now #1 and this seems fine. More of the "certutil -verify" checks done on the VPN server appear to come back successful. However, it still outputs issues with our Root CA's CDP and AIA. I have fired up the Root CA and made the adjustments to the Extensions tab (removing LDAP and adding HTTP) and copied the new CRLs to the HTTP host. PKIVIEW still shows these as LDAP and I believe this is due to the lookup coming from the sub-CAs? Does this mean I need to renew the certificate on the sub-CAs for this change to take effect? Is this likely to have any impact to existing certificates issued to clients? In particular we currently use DirectAccess, which uses a device authentication certificate. The HTTP entry on the sub-CAs has existed for a couple of years, so I'm assuming they'd fall back to that ok? It's just the Root CA I'm not sure on, but I can always add LDAP entry back as #2.

I appreciate any help you can offer. Go easy on me, as this setup of CA has been configured long before I joined the company! :)

Windows Server Security
Windows Server Security
Windows Server: A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.Security: The precautions taken to guard against crime, attack, sabotage, espionage, or another threat.
1,746 questions
0 comments No comments
{count} votes

1 answer

Sort by: Most helpful
  1. Vadims Podāns 9,111 Reputation points MVP
    2022-02-16T16:01:58.65+00:00

    I'm not sure if this is recommended in an existing CA deployment, or possibly just recreating so that HTTP is #1.

    it is still my recommendation. I believe you are referring to my article: Designing CRL Distribution Points and Authority Information Access locations. If you have configured both, LDAP and HTTP, then you clear checkboxes from LDAP URL which instruct CA to include the URL in certificates and CRLs, i.e.:
    175013-image.png
    this is how checkboxes must be set for LDAP. This way CA will continue to publish CRLs there so existing certificates (that include LDAP URL) can download CRL from LDAP until they get replaced. No new certificate will contain LDAP, they will contain only HTTP.

    However, it still outputs issues with our Root CA's CDP and AIA

    you can solve this only be editing Root CA URLs and renewing your subordinate CA with new key pair.

    PKIVIEW still shows these as LDAP

    after updating URLs you have to revoke the most recent certificate based on "CA Exchange" certificate template and re-run the PKIView.msc.

    1 person found this answer helpful.