Dell Data Protection | Encryption Manuel d'utilisateur Page 30

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 80
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 29
30 Enterprise Server Installation and Migration Guide
Open IIS Manager. Drill into
<Server>/Web Sites/CertSrv/
.
Right-click
mscep
and select
Properties.
Select the
Directory Security
tab and click
Edit
for Authentication and access control.
In the bottom half of the dialog, deselect
Integrated Windows authentication
and click
OK
.
From the
Administrative Tools
menu, open Certification Authority.
Right-click your Authority and select
Properties
.
Select the
Policy Module
tab and click
Properties
.
At the
Request Handling
window, select
“Follow the settings in the certificate template, if applicable.
Otherwise, automatically issue the certificate.”
option and click
Apply
.
d
Close IIS Manager.
e
Restart the server. To verify, open Internet Explorer and in the address bar, enter the URL you made a note of earlier. The
format is http://server.domain.com/certsrv/mscep/mscep.dll.
End of MSCEP Windows Server 2003 setup.
Windows Server 2008 R2 (must be Enterprise Edition, Standard Edition will not allow the MSCEP role to be
installed):
a
Open Server Manager. In the left menu, select
Server Roles
and check the box for
Active Directory Certificate
Services
.
Click
Next
. The Add Roles Wizard advances you to the next steps.
In
AD CS > Role Services
., check the boxes for
Certification Authority
and
Certification Authority Web Enrollment
role services. Select
Add Required Role Services for Web Server IIS
(if prompted). Click
Next
.
In
AD CS > Setup Type
, select
Standalone
. Click
Next
.
In
AD CS > CA Type
, select
Subordinate CA
. Click
Next
.
In
AD CS > Private Key
, select
Create a new private key
. Click
Next
.
In
AD CS > Private Key > Cryptography
., keep the defaults of
RSA#Microsoft Software Key Storage Provider
,
2048
and
SHA1
. Click
Next
.
In
AD CS > Private Key > CA Name,
keep all of the default values. Click
Next
.
In
AD CS > Private Key > Certificate Request
., select
Send a certificate request to a parent: CA
. Select
Browse by:
CA name
. Browse to and select
Parent CA
. Click
Next
.
In
AD CS > Certificate Database
, keep the default values. Click
Next
.
In
Web Server (IIS)
, click
Next
.
In
Web Server (IIS) > Role Services
, keep the default values. Click
Next
.
In
Confirmation
, click
Install
.
In
Result
s, review the results and click
Close
.
In
Server Manager > Roles
, select
Add Role Services
under
Active Directory Certificate Services
.
When the
Select Role Services
window displays, check the box for
Network Device Enrollment Service
. Click
Next
.
Add the user account that
Network Device Enrollment Service
should use when authorizing certificate requests to the
Users Group of IIS_IUSRS of the local server. The format is Domain\UserName. Click
OK
.
At the Specify User Account windows, select the user that was just added to the IIS_IUSRS group. Click
Next
.
At the
Specify Registration Authority Information
window, keep the default values for
Required Information
and
Add
Optional Information
as desired. Click
Next
.
At the
Configure Cryptography for Registration Authority
window, keep the default values. Click
Next
.
At the
Confirm Installation Selections
window, click
Install
.
At the
Installation Results
window, review the results and click
Close
.
Vue de la page 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35 ... 79 80

Commentaires sur ces manuels

Pas de commentaire