ADCS¶
TrustView ADCS Issue and Retrieve services¶
Step 1¶
Download the TrustView installation package.
Note
If you do not have access to the ADCS module, contact our to get access to the installation package with the newest release of the ADCS module.
Step 2¶
Install the PowerShell PKI module by opening PowerShell and running the following command:
1 Install-Module -Name PSPKI -RequiredVersion 4.0.0
Note
Go to PowerShell Gallery to see the latest version of the PSPKI module and adjust the command accordingly.
Step 3¶
Create a new directory in the following location on the TrustView server:
C:\Program Files\TrustView-ADCS
Note
The directory can be named something different and placed elsewhere if needed.
Step 4¶
Create a service account for use with the ADCS module and assign the service account all permissions on the newly created ADCS directory.
Step 5¶
Copy the content of the \TrustView-ADCS
directory from the TrustView installations package and move it to the ADCS directory on the server:
C:\Program Files\TrustView-ADCS
Step 6¶
Adjust the trustview.properties
file:
Generate a unique API key to the file and use the same API key inside TrustView - (Settings
ADCS settings)Update
trustviewnendpoint
if TrustView is using a non-default port for localhost communication
Note
The trustview.properties
file is one of the files that needs to be moved to the TrustView-ADCS directory on the server.
Step 7¶
Install the ADCS Issue and optionally the ADCS Retrieve services:
1C:\Program Files\TrustView-ADCS> .\TrustView-ADCS-Issue-Service.exe install
1C:\Program Files\TrustView-ADCS> .\TrustView-ADCS-Retrieve-Service.exe install
Important
The ADCS Retrieve service can be seen as optional and is only needed, if you wish to retrieve certificates from your CA and import them automatically into TrustView to monitor them.
Step 8¶
Configure the installed service:
Run the service as the service account with permissions assigned on the ADCS instance
Make sure the service is set to be started automatically
Start the service
Configuration of service account for ADCS integration¶
The ADCS-frontend communicates with ADCS using a service account. This service account must be assigned the following permissions:
Read
,Issue and Manage Certificates
andRequest Certificates
on the ADCS instance (Properties Security)Read
andEnroll
on the relevant templates that will be issued using TrustView
Tip
You can choose any template and more than one, but typically the Web Server
is just used.
Configuration of the trustview.properties file¶
The file contains the following parameters that can be configured:
1apikey=<api key>
2trustviewendpoint=http://localhost:8080/AdcsConnection/
3trustviewmonitoredcertsendpoint=http://localhost:8080/CertificateImport/
4_cahost=adtest.local
5_caname=Adtest CA
6_guidhostnametemplate=WebServer
Note
The lines starting with the _
character (underscore) is commented out and therefore not used by default.
Remove the _
to utilize the properties.
By default the ADCS module will attempt to retrieve all available templates and any CA’s it finds (you can see what specific CA’s are found in the logs
directory of TrustView-ADCS
), but you can specify the CA and template you want to use (if necessary),
when issuing ADCS certificates through API or TrustView by removing the _
character and changing the cahost
, caname
and guidhostnametemplate
to fit your needs.
Setup certificate issuing from two or more separate CA’s¶
To be able to issue ADCS certificates from two or more separate CA’s from TrustView, you must install the TrustView-ADCS-Issue-Service.exe
for each
CA, you wish to use and perform the steps above for the TrustView-ADCS
directory, for each CA you wish to use. After that, each trustview.properties
file in the respective TrustView-ADCS
directory must contain the caname
and cahost
for the corresponding CA.
guidhostnametemplate
is optional for any of the CA’s.
Important
Each TrustView-ADCS-Issue-Service
installed must be named something unique.
Example:
If ADCS certificates in TrustView must be able to be issued from two CA’s, the following setup could be used:
TrustView-ADCS1 (name of the directory containing the setup for the first CA)
TrustView-ADCS2 (name of the directory containing the setup for the second CA)
Open the TrustView-ADCS-Issue-Service.xml
file in each TrustView-ADCS
directory and change the name of the services:
1 <id>TrustViewAdcsIssueService1</id>
2 <name>TrustView ADCS Issue Service1</name>
1 <id>TrustViewAdcsIssueService2</id>
2 <name>TrustView ADCS Issue Service2</name>
After that, each TrustView ADCS Issue Service must be installed as normal (see step 7) and will then use the new designated names for the services.
Adjust the caname
and cahost
in each trustview.properties
file to match the CA that is used for issuing certificates.
Note
This can also be done with the TrustView-ADCS-Retrieve-Service
, by following the same steps for the retrieve service.
Revoke ADCS certificates¶
Important
This feature is only available from version v1.13
or higher of the ADCS module. Contact our if you are
in need of an upgrade or unaware of your current version of the module.
ADCS certificates can be revoked from inside TrustView by opening the detail page of the CA certificate you want to revoke
and press Revoke certificate
.
You can follow the status of the revocation in the event log on the detail page.
Danger
A revocation of a ADCS certificate cannot be undone, once the action has been performed.