Skip to content

Commit 2f5d877

Browse files
authored
Update premium-deploy-certificates-enterprise-ca.md
1 parent cbc7068 commit 2f5d877

File tree

1 file changed

+16
-1
lines changed

1 file changed

+16
-1
lines changed

articles/firewall/premium-deploy-certificates-enterprise-ca.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,12 +28,27 @@ To use an Enterprise CA to generate a certificate to use with Azure Firewall Pre
2828
- an [Azure Key Vault](premium-certificates.md#azure-key-vault)
2929
- a Managed Identity with Read permissions to **Certificates and Secrets** defined in the Key Vault Access Policy
3030

31+
## Create a new Subordinate Certificate Template
32+
33+
1. Run `certtmpl.msc` to open the Certificate Template Console.
34+
2. Find the "Subordinate Certification Authority" template in the console.
35+
3. Right-click on the "Subordinate Certification Authority" template and select "Duplicate Template".
36+
4. In the "Properties of New Template" window, go to the "Compatibility" tab and set the appropriate compatibility settings or leave them as default.
37+
5. Go to the "General" tab, set the "Template Display Name" (e.g., "My Subordinate CA"), and adjust the validity period if necessary. Optionally, check the "Publish certificate in Active Directory" checkbox.
38+
6. In the "Settings" tab, ensure the required users and groups have read and enrol permissions.
39+
7. Navigate to the "Extensions" tab, select "Key Usage", and click "Edit".
40+
- Ensure that the "Digital signature", "Certificate signing", and "CRL signing" checkboxes are checked.
41+
- Check the "Make this extension critical" checkbox and click "OK".
42+
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/certificate-template-key-usage-extension.png" alt-text="Screenshot of certificate template key usage extensions":::
43+
8. Click "OK" to save the new certificate template.
44+
9. Ensure the new template is enabled so it can be used to issue certificates.
45+
3146
## Request and export a certificate
3247

3348
1. Access the web enrollment site on the Root CA, usually `https://<servername>/certsrv` and select **Request a Certificate**.
3449
1. Select **Advanced Certificate Request**.
3550
1. Select **Create and Submit a Request to this CA**.
36-
1. Fill out the form using the Subordinate Certification Authority template.
51+
1. Fill out the form using the Subordinate Certification Authority template created in previous section.
3752
:::image type="content" source="media/premium-deploy-certificates-enterprise-ca/advanced-certificate-request.png" alt-text="Screenshot of advanced certificate request":::
3853
1. Submit the request and install the certificate.
3954
1. Assuming this request is made from a Windows Server using Internet Explorer, open **Internet Options**.

0 commit comments

Comments
 (0)