Active Directory setup
Active Directory provides the directory services required for integrating Microsoft Certificate Authority (CA) and Network Device Enrollment Service (NDES). The following steps ensure that the Active Directory environment is properly prepared before configuring the certificate enrollment infrastructure.
1. Verify Active Directory Domain Availability
- Log in to a server that is joined to the domain
- Open Command Prompt.
- Verify domain connectivity by
running:
echo %USERDOMAIN% - Verify connectivity to a domain
controller:
nltest /dsgetdc:<your-domain-name> - Ensure the command returns a valid domain controller.
2. Join Infrastructure Servers to the Domain
The following infrastructure components must be joined to the Active Directory domain, as they integrate directly with Microsoft Certificate Services and Active Directory.
- Certificate Authority (CA) server
- NDES server (if deployed on a separate machine)
- NDES Proxy server
- LDAP Proxy server
These proxy components act as intermediaries between BigFix MCM Server and the internal certificate infrastructure and are usually placed in a restricted network for security.
Steps to Join a Server to the Domain:
- Open Server Manager.
- Select Local Server.
- Click Workgroup next to the computer name.
- Select Change.
- Choose Domain and enter the domain name.
- Provide domain administrator credentials when prompted.
- Restart the server after joining the domain.
3. Create Service Account for NDES
NDES requires a domain service account.
- Open Active Directory Users and Computers.
- Navigate to an appropriate Organizational Unit (OU).
- Right-click → New → User.
- Enter details such
as:
User name: svc_ndes - Set a strong password.
- Click Finish.
- The created service account
- Should be a member of local IIS_IUSRS group
- Should have request permissions on the configured CA
- Should have read and enroll permissions on the NDES certificate template.
- This account will be used during NDES role installation.
4. Verify DNS Resolution
DNS resolution must be available for components that interact directly with Active Directory services.
The following systems must be able to resolve Active Directory domain names and domain controllers:
- Certificate Authority (CA) server
- NDES server
- LDAP Proxy server
- NDES Proxy server
nslookup <domain-name>
nslookup <domain-controller-hostname>Both commands should resolve successfully.
5. Verify Connectivity to Domain Controllers
nltest /sc_verify:<domain-name>Expected
result:Trusted DC Connection Status Status = 0 0x0 NERR_Success
6. Verify Permissions for Certificate Enrollment
Ensure that the following accounts will later have access to certificate enrollment:
-
NDES service account
-
Administrators managing certificate templates