Skip to content

Commit 30298a6

Browse files
authored
Merge pull request #280017 from johnmarco/jm-arc-change-esu-certs
Arc servers: Changes ESUs certs info
2 parents 22265fb + ad5b805 commit 30298a6

File tree

2 files changed

+19
-10
lines changed

2 files changed

+19
-10
lines changed

articles/azure-arc/servers/prepare-extended-security-updates.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to prepare to deliver Extended Security Updates for Windows Server 2012 through Azure Arc
33
description: Learn how to prepare to deliver Extended Security Updates for Windows Server 2012 through Azure Arc.
4-
ms.date: 01/03/2024
4+
ms.date: 07/03/2024
55
ms.topic: conceptual
66
---
77

@@ -68,6 +68,17 @@ Connectivity options include public endpoint, proxy server, and private link or
6868
> [!TIP]
6969
> To take advantage of the full range of offerings for Arc-enabled servers, such as extensions and remote connectivity, ensure that you allow the additional URLs that apply to your scenario. For more information, see [Connected machine agent networking requirements](network-requirements.md).
7070
71+
## Required Certificate Authorities
72+
73+
The following [Certificate Authorities](/azure/security/fundamentals/azure-ca-details?tabs=root-and-subordinate-cas-list) are required for Extended Security Updates for Windows Server 2012:
74+
75+
- [Microsoft Azure RSA TLS Issuing CA 03](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2003%20-%20xsign.crt)
76+
- [Microsoft Azure RSA TLS Issuing CA 04](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2004%20-%20xsign.crt)
77+
- [Microsoft Azure RSA TLS Issuing CA 07](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2007%20-%20xsign.crt)
78+
- [Microsoft Azure RSA TLS Issuing CA 08](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2008%20-%20xsign.crt)
79+
80+
If necessary, these Certificate Authorities can be [manually download and installed](troubleshoot-extended-security-updates.md#option-2-manually-download-and-install-the-intermediate-ca-certificates).
81+
7182
## Next steps
7283

7384
* Find out more about [planning for Windows Server and SQL Server end of support](https://www.microsoft.com/en-us/windows-server/extended-security-updates) and [getting Extended Security Updates](/windows-server/get-started/extended-security-updates-deploy).

articles/azure-arc/servers/troubleshoot-extended-security-updates.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to troubleshoot delivery of Extended Security Updates for Windows Server 2012 through Azure Arc
33
description: Learn how to troubleshoot delivery of Extended Security Updates for Windows Server 2012 through Azure Arc.
4-
ms.date: 05/22/2024
4+
ms.date: 07/03/2024
55
ms.topic: conceptual
66
---
77

@@ -79,20 +79,18 @@ Once the network changes are made to allow access to the PKI URL, try installing
7979
If you're unable to allow access to the PKI URL from your servers, you can manually download and install the certificates on each machine.
8080

8181
1. On any computer with internet access, download these intermediate CA certificates:
82-
1. [Microsoft Azure TLS Issuing CA 01](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2001%20-%20xsign.crt)
83-
1. [Microsoft Azure TLS Issuing CA 02](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2002%20-%20xsign.crt)
84-
1. [Microsoft Azure TLS Issuing CA 05](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2005%20-%20xsign.crt)
85-
1. [Microsoft Azure TLS Issuing CA 06](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20TLS%20Issuing%20CA%2006%20-%20xsign.crt)
82+
1. [Microsoft Azure RSA TLS Issuing CA 03](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2003%20-%20xsign.crt)
8683
1. [Microsoft Azure RSA TLS Issuing CA 04](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2004%20-%20xsign.crt)
84+
1. [Microsoft Azure RSA TLS Issuing CA 07](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2007%20-%20xsign.crt)
85+
1. [Microsoft Azure RSA TLS Issuing CA 08](https://www.microsoft.com/pkiops/certs/Microsoft%20Azure%20RSA%20TLS%20Issuing%20CA%2008%20-%20xsign.crt)
8786
1. Copy the certificate files to your Windows Server 2012 (R2) machines.
8887
1. Run any one set of the following commands in an elevated command prompt or PowerShell session to add the certificates to the "Intermediate Certificate Authorities" store for the local computer. The command should be run from the same directory as the certificate files. The commands are idempotent and won't make any changes if you've already imported the certificate:
8988

9089
```
91-
certutil -addstore CA "Microsoft Azure TLS Issuing CA 01 - xsign.crt"
92-
certutil -addstore CA "Microsoft Azure TLS Issuing CA 02 - xsign.crt"
93-
certutil -addstore CA "Microsoft Azure TLS Issuing CA 05 - xsign.crt"
94-
certutil -addstore CA "Microsoft Azure TLS Issuing CA 06 - xsign.crt"
90+
certutil -addstore CA "Microsoft Azure RSA TLS Issuing CA 03 - xsign.crt"
9591
certutil -addstore CA "Microsoft Azure RSA TLS Issuing CA 04 - xsign.crt"
92+
certutil -addstore CA "Microsoft Azure RSA TLS Issuing CA 07 - xsign.crt"
93+
certutil -addstore CA "Microsoft Azure RSA TLS Issuing CA 08 - xsign.crt"
9694
```
9795
9896
1. Try installing the Windows updates again. You may need to reboot your computer for the validation logic to recognize the newly imported intermediate CA certificates.

0 commit comments

Comments
 (0)