Autoenrollment Connector: Prerequisites

1. Verify or Install Active Directory

If Active Directory is already present in your environment, verify it is properly configured. If not, follow the installation steps below.

Configure the domain name at the ldap.server.host property of application.properties, where Active Directory runs.

Example: ldap.server.host=ad.demo.mtg

Install Active Directory Domain Services

Server Manager
serverManager

Choose Manage → Add Roles and Features.

Roles and Features
serverManager

A configuration wizard starts.

Configuration Wizard – First Page
serverManager

The first page of the wizard is shown. Click Next.

Configuration Wizard – Destination Choice
serverManager

Choose the server where Active Directory should be installed.

Configuration Wizard – Active Directory Services
serverManager

Choose the corresponding services for Active Directory.

Configuration Wizard – Add Features
serverManager

The Add Features window will appear. Click Add Features.

Configuration Wizard – Proceed with Wizard
serverManager

Click Next.

Configuration Wizard – Group Policy Management
serverManager

If it is not activated, activate Group Policy Management.

Configuration Wizard – Proceed with Wizard
serverManager

Click Next.

Configuration Wizard – Install Active Directory
serverManager

Click Install.

Configuration Wizard – Installed Active Directory
serverManager

Close the dialog after successful installation.

Promote to Domain Controller

Promote to Domain Controller
serverManager

You can promote the server to a domain controller. To do this, select Notifications → Promote this server to a domain controller.

Domain Controller Configuration Wizard – Deployment Configuration
serverManager

Choose Add a new forest and provide the root domain name (in this example demo.mtg).

Domain Controller Configuration Wizard – Provide Password
serverManager

Provide a password and click Next.

Domain Controller Configuration Wizard – Proceed with Wizard
serverManager

Proceed with the wizard.

Domain Controller Configuration Wizard – Resolve NetBIOS Name
serverManager

Wait for the NetBIOS name to be resolved.

Domain Controller Configuration Wizard – Provide NetBIOS Name
serverManager

Provide the NetBIOS domain name.

Domain Controller Configuration Wizard – Proceed with Wizard
serverManager

Proceed with the wizard.

Domain Controller Configuration Wizard – Proceed with Wizard
serverManager

Proceed with the wizard.

Domain Controller Configuration Wizard – Finish Installation
serverManager

Finish the installation. Your system will then restart.

Add Certification Authority Management Tools

Add Certification Authority Management Tools
serverManager

Under Server Manager → Manage → Add Roles and Features, run the wizard as shown above, and now add Certification Authority Management Tools.

2. Configure TLS for LDAP

For several security mechanisms to function properly, TLS must be active on LDAP.

Verify LDAP Connectivity

Start LDAP Client Tool and Check Connection
serverManager

Check that AD as an LDAP directory is running. To do this, open a cmd window and run ldp. Provide the domain of the server and 389 as a port (389 is the default port of LDAP). A connection should be established.

Connection Settings for SSL/TLS
serverManager

Trying the same for port 636 with SSL checked will fail (before configuration).

Import Certificates for TLS

Copy the root CA and sub CA certificate on the server, and a PKCS12 file containing the keys and certificates of the Active Directory server.

Microsoft Management Console – Add Snap-in
serverManager

Open cmd and type mmc to get the Microsoft Management Console. Click File and Add/Remove Snap in…​.

Add Certificates
serverManager

Select Certificates, click Add, and then click OK.

Certificates Snap-in for Computer Account
serverManager

Choose Computer account and click Next.

Certificates Snap-in for Local Computer
serverManager

Choose Local computer and then Finish.

Add Root CA Certificate as Trusted Root
serverManager

Import the root CA certificate under Trusted Root Certification Authorities. After adding the root, also add the sub CA certificate under Intermediate Certification Authorities.

Import Private Keys and Certificates
serverManager

Finally import the private keys and certificates of the Active Directory server under Personal.

You should now be able to connect to LDAP over TLS (port 636 with SSL enabled).