You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Feb 28, 2023. It is now read-only.
#. Transfer the files ``C:\R1.crt`` and ``C:\R1.crl`` to ``C:\inetpub\pki`` on {{ server.name }}.
233
+
#. Transfer the files ``C:\{{ servers.root_ca.cn }}.crt`` and ``C:\{{ servers.root_ca.cn }}.crl`` to ``{{ server.www_root | default('C:\inetpub')}}\pki`` on {{ server.name }}.
Copy file name to clipboardExpand all lines: roles/installation_manual/files/chapters/system-overview.rst.j2
+38-6
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,11 @@ The following servers are a part of the PKI. For details, refer to *Appendix B*.
34
34
Topology
35
35
--------
36
36
37
-
The PKI has been implemented as a two-tier CA hierachy with one root CA and one issuing CA.
37
+
{%ifservers.issuing_cas | length == 1 %}
38
+
The PKI has been implemented as a two-tier CA hierachy with a root CA and a single issuing CA.
39
+
{%else%}
40
+
The PKI has been implemented as a two-tier CA hierachy with a root CA and {{ servers.issuing_cas | length | pronounce }} issuing CAs.
41
+
{%endif%}
38
42
39
43
The root CA signs the CA certificate for the issuing CA, and is stored offline when not in use. If the private key for the issuing CA is compromised, it is possible to revoke the issuing CA using the root CA without having to create a new CA hierarchy.
40
44
@@ -88,10 +92,24 @@ The following endpoints are used for distribution of *Certificate Revocation Lis
#. Transfer the file ``C:\R1.crt`` to ``C:\inetpub\pki`` on {{ server.name }}.
172
+
#. Transfer the file ``C:\{{ servers.root_ca.cn }}.crt`` to ``{{ server.www_root | default('C:\inetpub') }}\pki`` on {{ server.name }}.
173
173
{%endfor%}
174
174
175
175
#. Turn off ``{{ servers.root_ca.name }}``.
@@ -214,7 +214,7 @@ Renew the root CA
214
214
215
215
#. Click on **OK** to add the snap-in.
216
216
217
-
#. Expand **Certification Authority (Local)** the left pane, right-click on **R1** and choose **All Tasks → Renew CA Certificate...**.
217
+
#. Expand **Certification Authority (Local)** the left pane, right-click on **{{ servers.root_ca.cn }}** and choose **All Tasks → Renew CA Certificate...**.
#. Transfer the files ``C:\R1.crt`` and ``C:\R1.crl`` to ``C:\inetpub\pki`` on {{ server.name }}.
232
+
#. Transfer the files ``C:\{{ servers.root_ca.cn }}.crt`` and ``C:\{{ servers.root_ca.cn }}.crl`` to ``{{ server.www_root | default('C:\inetpub') }}\pki`` on {{ server.name }}.
233
233
{%endfor%}
234
234
235
-
#. Transfer the file `C:\R1.crt`` to {{ servers.issuing_cas[0].name }} and publish the root CA certificate to AD::
235
+
#. Transfer the file `C:\{{ servers.root_ca.cn }}.crt`` to {{ servers.issuing_cas[0].name }} and publish the root CA certificate to AD::
#. Transfer the file ``C:\{{ issuing_ca.cn }}-G2.crt`` to ``C:\inetpub\pki`` on {{ repository.name }}.
291
+
{%forserverinservers.repositories%}
292
+
#. Transfer the file ``C:\{{ issuing_ca.cn }}-G2.crt`` to ``{{ server.www_root | default('C:\inetpub') }}\pki`` on {{ server.name }}.
293
293
{%endfor%}
294
294
295
295
#. Update the CDP and AIA paths to point to the new CRL and CA certificate::
@@ -362,8 +362,8 @@ Renew {{ issuing_ca.cn }} with an existing keypair
362
362
CertUtil -crl
363
363
Start-ScheduledTask -TaskName "CopyCRL"
364
364
365
-
{%forrepositoryinservers.repositories%}
366
-
#. Transfer the file ``C:\{{ issuing_ca.cn }}.crt`` to ``C:\inetpub\pki`` on {{ repository.name }}. Replace the existing file.
365
+
{%forserverinservers.repositories%}
366
+
#. Transfer the file ``C:\{{ issuing_ca.cn }}.crt`` to ``{{ server.www_root | default('C:\inetpub') }}\pki`` on {{ server.name }}. Replace the existing file.
0 commit comments