1.0 Introduction
This article describes how to set up a Microsoft PKI service, namely Active Directory Certificate Services
with Fortanix-Data-Security-Manager (DSM).
Before starting, follow the steps in the CNG Developers Guide to install the Fortanix DSM CNG Key Storage Provider.
Use certutil
to verify the correct installation of the Fortanix CNG KSP.
2.0 Configure Fortanix DSM
A Fortanix DSM service must be configured, and the URL must be accessible. To create a Fortanix DSM account and group, refer to the following sections:
2.1 Signing Up
To get started with the Fortanix Data Security Manager (DSM) cloud service, you must register an account at <Your_DSM_Service_URL>. For example, https://eu.smartkey.io.
For detailed steps on how to set up the Fortanix DSM, refer to the User's Guide: Sign Up for Fortanix Data Security Manager SaaS documentation.
2.2 Creating an Account
Access the <Your_DSM_Service_URL> on the web browser and enter your credentials to log in to the Fortanix DSM.

Figure 1: Logging In
2.3 Creating a Group
Perform the following steps to create a group in the Fortanix DSM:
Click the Groups menu item in the DSM left navigation bar and click the + button on the Groups page to add a new group.
Figure 2: Add Groups
On the Adding new group page, enter the following details:
Title: Enter a title for your group.
Description (optional): Enter a short description for the group.
Click the SAVE button to create the new group.
The new group has been added to the Fortanix DSM successfully.
2.4 Creating an Application
Perform the following steps to create an application (app) in the Fortanix DSM:
Click the Apps menu item in the DSM left navigation bar and click the + button on the Apps page to add a new app.
Figure 3: Add Application
On the Adding new app page, enter the following details:
App name: Enter the name of your application.
ADD DESCRIPTION (optional): Enter a short description for the application.
Authentication method: Select the default API Key as the method of authentication from the drop down menu. For more information on these authentication methods, refer to User's Guide: Authentication documentation.
Assigning the new app to groups: Select the group created in Section 2.3: Creating a Group from the list.
Click the SAVE button to add the new application.
The new application has been added to the Fortanix DSM successfully.
2.5 Copying the API Key
Perform the following steps to copy the API key from the Fortanix DSM:
Click the Apps menu item in the DSM left navigation bar and click the app created in Section 2.4: Creating an Application to go to the detailed view of the app.
On the INFO tab, click the VIEW API KEY DETAILS button.
From the API Key Details dialog box, copy the API Key of the app to use it later.
3.0 Configuring Microsoft Active Directory Certificate Services
Open Server Manager and select Active Directory Certificate Services (AD CS) as one of the services to install.
Figure 4: Set Active Directory as Service
Select Certification Authority (CA) as one of the role services to install for AD CS.
Figure 5: Select role services
The CA installed in the previous step must have a private key to sign and issue certificates to clients. There are 3 ways to associate a private key with the CA:
By creating a new private key
By selecting an existing certificate and using its associated private key
By selecting an existing private key
The Fortanix DSM KSP supports all the above three options.
Figure 6: All three types of private key support
3.1 Creating a New Private Key
To create a new private key:
Select the Create a new private key option and click Next.
Figure 7: Create a new private key
If you select the option to create a new private key, you will next be asked to select the cryptographic provider. Select RSA#Fortanix SDKMS Provider as the cryptographic provider if you want to use an RSA key for the CA.
Figure 8: Select cryptographic provider
After confirming your selections, verify that a new key has been generated in the Fortanix DSM web UI. The CA is now ready to issue certificates.
Figure 9: Verify new key
NOTE
If you have a Quorum approval policy enabled on your group, then add the app in the OR section of the Quorum approval policy for it to authenticate; otherwise, you will see the error on the AD CS side.
3.2 Backing up, migrating, and restoring CA using an existing certificate and its associated private key
This section describes how to back up the CA and HSM data on the existing server (machine #1), and then migrate the CA and HSM onto a new server (machine #2).
Steps to Perform on Machine#1
Run the
certutil
command on the command prompt to extract the config info.Figure 10: Extract config info
After you have the Config info, back up the database with the below command.
certutil -config <CA_config_string> -backupdb <BackupDirectory>
For example:
Figure 11: Backup the database
Export the certificate from machine#1.
Run
mmc
.In the console, go to File → Add/Remove Snap-in.
Select the Certificates tab and click Add.
The certificate snap-in window opens. Select Computer Account and click Next.
Keep the default selection and click Finish, then click OK.
Go to the directory
Trusted Root Certification Authorities
→Certificates
.Right-click the CA certificate, click All Tasks → Export, then click Next.
Select Base-64 encoded X.509 (.CER) and click Next.
Specify the path and file name to save the certificate and click Next.
Click Finish.
Click OK to close the export success message.
Figure 12: Export the certificate from machine 1
Now you will be having two folders in your saved location, that is, the backup of the CA (
CABackup
) and the Export of the certificate (Export
). Copy these two folders on a new machine, that is, machine #2.Figure 13: Copy the folders on a new machine
3.2.1 Steps to Perform on Machine#2
Considering this is a clean Windows Server machine where no configuration has been done for ADCS, install the Fortanix CNG in machine#2 and configure it as per the readme file.
Figure 14: Install Fortanix CNG on Machine 2
Copy the
Backup1
andExport
folder to the Desktop location.Install the X.509 certificate into the local user Trusted Root CA Store on machine #2.
Right-click the certificate and click Install.
Click Next.
Select Place all certificates in the following store and click Browse.
Select Trusted Root Certification Authorities and click OK.
Click Next.
Click Finish.
Click OK to close the import success message.
You will see the certificate, that is, SDKMS-CA has been successfully imported into the Trusted Root CA.
Install the certificate into my store, by running the following command from the command prompt terminal:
certutil -addstore my <certificate name>
Example:
certutil -addstore my CA_Certificate.cer
Where
Certificate.cer
is the exported certificate in Base-64 encoded X.509 (.CER)Figure 15: Install the certificate
After you run the above command, you can find the exported CA in the Personal Trust Store as shown in the following screenshot.
Figure 16: Exported CA in personal trust store
Now repair the certificate store by running the following command from the console:
certutil -f -repairstore -csp "Fortanix KMS CNG Provider" my "<cert serial number>"
Where Fortanix KMS CNG Provider is the CA Provider and cert serial number.
You can find the cert serial number from the following command.
certutil -store my
For example:
Figure 17: Cert serial number
Now click Start → Server Manager to open the Server Manager on Machine#2.
Install and configure the CA.
Install and configure the AD CS with the following settings:
In the Set Up Private Key window, select Use existing private key and then select a certificate and use its associated private key.
In the Existing Certificate window, the imported certificate is shown. Select the certificate and select Allow administrator interaction when the private key is accessed by the CA.
Click Next.
In the Certificate Database window click Next.
In the Confirmation window click Configure.
When the CA installation is complete, click Close in the installation results window.
You can find the CA configured on Machine#2, as shown in the following screenshot.
Figure 18: Cert serial number
Figure 19: Cert serial number
Now you can restore the backup of the DB Certificate by running the following command.
certutil -restoredb <BackupDirectory>
Once the CA certificate is successfully configured, you can then check the Fortanix DSM Certificate logs.
Figure 20: Check logs in Fortanix-DSM