Quantcast
Channel: Lync News
Viewing all articles
Browse latest Browse all 4272

Legendary Techy: Publishing Lync 2013 URL via Web Application Proxy: Part 1 – Obtaining IIS Certificate (Within Lab with no Public Cert)

$
0
0

Hello Readers

So in this mini series I am going to be looking publishing Lync 2013 URLs via Web Application Proxy. So first of all the key servers we will be referring to in my lab are;

Server Name Role IP Address Roles Installed Version
DC01 Domain Controller 10.10.10.1 Active Directory Domain Services, Certificate Authority, DNS, Web Server (IIS) Windows 2008 R2
DC02 Domain Controller 10.10.10.2 Active Directory Domain Services Windows 2012 R2
AD01 ADFS Server 10.10.10.6 Active Directory Federation Services Windows 2012 R2
FE01 Lync 10.10.10.11 Lync Standard Edition Windows 2012 R2

 

So what’s next we because I have already installed ADFS on AD01 we can see it require a few perquisites before we can continue.

image

So we will require

  • An Active Directory domain administrator account –> I will be using Service Account called lyncme\svc.adfs
  • A publicly trusted certificate for SSL server authentication  –> Oh ……

As I am building ADFS within my lab I dont have a public certificate to use but not to fear this is a solution to create a IIS Certificate which can be used.

http://technet.microsoft.com/en-us/library/dn280939.aspx

All the information can be found on the above URL but I will now run through the process using screenshots.

We now need to get a Certificate Template that be used to obtain the IIS Certificate so on DC01 I have open Certificate Authority, right clicked “Certificate Templates” —> Manage

image

Now we need to Duplicate the Web Server Certificate and create the IIS Certificate Template

image

Select “Windows Server 2003 Enterprise” and Press OK

image

You will now need to give the certificate a name that is easily identifiable.

image

I will be using the template display name of “ADFSv1

image

We now need to configure the Security for the Certificate, you need to ensure the computer account has the ability to enroll. Press “Security” Tab

Press Add

Press Object Types

Tick Computers

image

Press OK

I will be allowing the following to Enroll the Cert

  • AD01
  • SVC.ADFS

image

Press OK, You will now need to ensure that the accounts you have selected have Allow Enroll ticked this will be a manual process to tick Enroll.

image

You will now need to click to the Subject Name tab configure as per below

image

On Cryptography tab and ensure that the template is set to use a Minimum key size of 1024 bits or higher; 2048 bits or higher is preferred. I have also ticked Allow private key exported, Click OK.

image

Press “Apply” and Press “OK

Close Certificate Template Console

Right Click Certificate Templates –> New –> Certificate Template to Issue

image

In the Enable Certificate Templates dialog box click the new certificate template that you just configured and then click OK.

image

Now we have configured a Certificate that can be used for ADFS but how do we get certificate? Well this can be done by logging on to the AD01.lyncme.local Server and requesting the certificate.

 

Open an MMC console. To do so, you can open a command prompt, the run dialog box, or Windows PowerShell, type mmc and then press ENTER.

In the new MMC console (Console1) click File, and then click Add/Remove Snap-in.

From the list of Available snap-ins, select Certificates and then click Add.

Select Computer account and then click Next.

In Select Computer the Local computer is selected by default. Click Finish and then click OK.

Expand Certificates (Local Computer) and then right-click Personal. Click All Tasks, and then click Request New Certificate.

image

On the Certificate Enrollment wizard, click Next.

image

On the Select Certificate Enrollment Policy page, ensure that Active Directory Enrollment Policy is selected and then click Next.

image

On Certificate Enrollment, click Enroll.

image

Click Finish.

You will need to export the certificate and store in a location on the ADFS Server.

This now completes Part 1 in this series

Regards

Andrew Price


Viewing all articles
Browse latest Browse all 4272

Trending Articles