0010.html 3.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970
  1. <!DOCTYPE html>
  2. <html lang="en" xmlns="http://www.w3.org/1999/xhtml">
  3. <head>
  4. <title>Adding Self-Signed PKI to Windows Trusted Certificate Store via Group Policy</title>
  5. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  6. <meta charset="UTF-8">
  7. <meta name="keywords" content="PKI,Public Key Infrastructure,XCA,SSL,Web Server,OpenVPN,Certificates,Certificate Authority,Self-Signed,Tutorial">
  8. <meta name="author" content="i12bretro">
  9. <meta name="description" content="Adding Self-Signed PKI to Windows Trusted Certificate Store via Group Policy">
  10. <meta name="viewport" content="width=device-width, initial-scale=1.0">
  11. <link rel="icon" type="image/x-icon" href="includes/favicon.ico">
  12. <script type="text/javascript" src="https://code.jquery.com/jquery-3.5.1.min.js"></script>
  13. <script type="text/javascript" src="includes/js/steps.js"></script>
  14. <link href="css/steps.css" rel="stylesheet" type="text/css" />
  15. </head>
  16. <body>
  17. <div id="gridContainer">
  18. <div class="topMargin"></div>
  19. <div id="listName" class="topMargin">
  20. <h1>Adding Self-Signed PKI to Windows Trusted Certificate Store via Group Policy</h1>
  21. </div>
  22. <div></div>
  23. <div id="content">
  24. <p>This is part three of a series of creating your own self-signed PKI and some ways to utilize the PKI to setup SSL for your web server or create your own OpenVPN server.</p>
  25. <p>Disclaimer: I am not a security expert. This is just the easiest way I have found to create and utilize SSL for my homelab services.</p>
  26. <h2>Exporting Certificates from XCA</h2>
  27. <ol>
  28. <li>Launch XCA</li>
  29. <li>Open the PKI database if it is not already (File &gt; Open DataBase), enter password</li>
  30. <li>Click on the Certificates tab</li>
  31. <li>Right click the Intermediate CA certificate &gt; Export &gt; File</li>
  32. <li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
  33. <li>Click OK</li>
  34. <li>Right click the Root CA certificate &gt; Export &gt; File</li>
  35. <li>Set the file name with a .crt extension and verify the export format is PEM (*.crt)</li>
  36. <li>Click OK</li>
  37. </ol>
  38. <h2>Push Certificates Into Windows Certificate Store Via GPO</h2>
  39. <ol>
  40. <li>Launch Group Policy Management (Control Panel &gt; Administrative Tools &gt; Group Policy Management)</li>
  41. <li>Right click Default Domain Policy &gt; Edit...</li>
  42. <li>Expand Computer Configuration &gt; Policies &gt; Windows Settings &gt; Security Settings &gt; Public Key Policies</li>
  43. <li>Right click Trusted Root Certification Authorities &gt; Import..</li>
  44. <li>Click Next</li>
  45. <li>Click Browse &gt; Select the exported Root CA .crt file &gt; Click Next</li>
  46. <li>Verify Include all extended properties is checked</li>
  47. <li>Click Next</li>
  48. <li>Click Next</li>
  49. <li>Click Finish</li>
  50. <li>Right click Intermediate Certification Authorities &gt; Import..</li>
  51. <li>Click Next</li>
  52. <li>Click Browse &gt; Select the exported Intermediate CA .crt file &gt; Click Next</li>
  53. <li>Verify Include all extended properties is checked</li>
  54. <li>Click Next</li>
  55. <li>Click Next</li>
  56. <li>Click Finish</li>
  57. <li>Close the Group Policy Management Editor window</li>
  58. <li>Force Group Policy update by Right clicking the start button &gt; Run &gt; cmd</li>
  59. <li>Type gpupdate /force</li>
  60. </ol>
  61. </div>
  62. </div>
  63. </body>
  64. </html>