Security Stuff
  • About
  • HackTheBox
    • Windows
      • Forest
      • Escape
      • Timelapse
      • Support
    • Linux
      • TwoMillion
      • Soccer
      • Pollution
      • Pilgrimage
      • Sandworm
  • Windows
    • Authentication
      • Overview
      • Logon
      • Kerberos
      • Credential
    • Active Directory
      • Domain Service
        • LDAP
        • AD Objects
      • Key Distribution Center
      • Certificate Service
    • Windows Protocols
      • SMB
    • Windows Server
      • MSSQL
    • Execution
      • Windows APIs
      • Remote Access
        • WinRM
    • Credential Access
      • Kerberos Ticket
        • Kerberoasting Attack
        • Golden/Silver Ticket Attack
        • AS-REP Roasting Attack
      • OS Credential Dumping
        • DCsync Attack
      • Certified Pre-Owned
  • Linux
    • Management
      • Package
    • Process
      • Namespace
      • Terminal
  • Web
    • Authentication
      • SAML
      • OAuth
    • Enumeration
  • Defense
    • Windows
      • Windows Event Logs
  • Development
    • Programming Language
    • Database
      • MySQL
    • Virtualization
      • Container
    • Cryptography
      • GnuPG
Powered by GitBook
On this page
  • Overview
  • Trust Store
  • Certification Authorities
  • Enrollment Services
  • NTAuthCertificates
  • AIA
  • Certificate Templates
  • Certificate Enrollment
  • Certificate Template
  • Extended Key Usages (EKU)
  1. Windows
  2. Active Directory

Certificate Service

PreviousKey Distribution CenterNextWindows Protocols

Last updated 1 year ago

Active Directory Certificate Services (AD CS), Microsoft’s Active Directory Public Key Infrastructure (PKI) implementation, provides everything including:

  • encrypting file systems

  • digital signatures

  • user authentication

AD CS is not installed by default but deployed widely.

Overview

A server role, introduced in Windows 2000, can be deployed in one of two configurations:

  • a standalone certification authority (CA)

  • an enterprise CA that integrates with AD

Trust Store

CN=Public Key Services, CN=Services, CN=Configuration, DC={forest root domain}

Certification Authorities

A container contains trusted root certificates propagated to the Trusted Root Certification Authorities certificate store on each Windows machine.

To consider a certificate as trusted, the certificate’s trust chain must eventually end with one of the root CA’s defined in this container.

Enrollment Services

This container is used to store Enterprise CA objects. Clients use this container to locate Enterprise CAs in the forest.

Enterprise CA certificates are propagated to the Intermediate Certification Authorities certificate store on each Windows machine.

NTAuthCertificates

This container defines CA certificates that enable authentication to AD

AIA

This container holds the AD objects of intermediate and cross CAs

Certificate Templates

This container contains enterprise certificate templates used by Enterprise CAs.

Certificate Enrollment

Users obtain certificates from CA based on the objects in the Enrollment Services container through the certificate enrollment process.

Certificate Template

AD CS Enterprise CAs issue certificates with settings defined by certificate templates.

AD CS specifies that a certificate template is enabled on an Enterprise CA by adding the template’s name to the certificatetemplates field of the AD object with objectClass of pKIEnrollmentService.

Extended Key Usages (EKU)

All ADCS-related containers are stored in under Public Key Services container, hence all domain controllers within a forest hold a replication of the content.

the configuration naming context
Understanding Active Directory Certificate Services containers in Active Directory - PKI Solutions LLCPKI Solutions LLC
What is Active Directory Certificate Services?MicrosoftLearn
Logo
Logo