Custom certificate requests must be created with specific parameters in order to work
with Security Center. All certificate requests must be made from the server where the
certificate is going to be applied.
Before you begin
Custom certificates must conform to the following parameters. If
they don’t, you could encounter errors when trying to import and use the certificate on a
Security Center server or workstation.
- Certificate type
- x509
- Hashing algorithm
- SHA-256
- Private key length
- 2048 bits minimum
- Common name
- The Common name must be one of the following:
- The fully qualified domain name (FQDN) of the server – for example,
myserver1.mycompany.com
- A wildcard plus the server domain name – for example,
*.mycompany.com
- The server host name only – for example, myserver1
- Export format
- PKCS #12 (*.pfx)
Procedure
-
On your main server, start Microsoft Management Console (mmc.exe) and add the
Certificates snap-in.
-
In the Console window, click .
-
In the Add or Remove Snap-ins dialog box that appears, click
Certificates and then click Add.
-
In the Certificates snap-in dialog box, click .
-
In the Console window, expand
Certificates.
-
Under Certificates (Local Computer), right-click
Personal, and then click .
-
In the Certificate Enrollment dialog box, click .
-
In the Custom request page, select the options as shown
below.
IMPORTANT: For
Template, select Legacy key. The default
choice, CNG key, isn’t supported by .NET Framework 4.8, which is
what Security Center uses.
-
Click Next
-
In the Certificate Information page, expand
Details, and click Properties.
-
In the Certificate Properties dialog box, click the
Subject tab, and enter the value of Common
name under the Subject name.
-
Click the Extensions tab, and set the following
properties.
- Key Usage
- Add Digital signature and Key
agreement.
- Extended Key Usage
- Add Server Authentication and Client
Authentication.
-
Click the Private Key tab, and set the following
properties.
- Key Type
- Select Exchange. This property must be set up first.
- Cryptographic Service Provider
- Select only Microsoft RSA SChannel Cryptographic Provider
(Encryption). It’s the last option in the list.
- Key Options
- The Key size should be at least 2048.
-
Click .
-
Enter the File Name and click
Finish.
After you finish
Send the request (.csr) to your IT department or the external
certificate authority (CA) for processing. Once the certificate has been
generated,
import and apply it to your
server.