Step 3: Import certificate into certificates store
In this step, you import the certificate to the Personal\Certificates certificate store by using the Certificates snap-in. You must complete this step on each domain controller running Capture Agent and on each computer running Synchronization Service that will participate in the password synchronization.
To import the certificate
- Open the Certificates - Local Computers snap-in.
- In the console tree, click the Personal\Certificates logical store.
- On the Action menu, point to All Tasks and then click Import.
- Step through the wizard.
- On the File to Import page, in File name, type the file name containing the certificate to be imported or click Browse and to locate and select the file. When finished, click Next.
- On the Password page, type the password used to encrypt the private key, and then click Next.
- On the Certificate Store page, ensure that the Place all certificates in the following store option is selected, and the Certificate store text box displays Personal, and then click Next.
- On the Completion page, revise the specified settings and click Finish to import the certificate and close the wizard.
Step 4: Copy certificate’s thumbprint
In this step, you copy the thumbprint of your custom certificate. In the next steps, you will need to provide the thumbprint to Capture Agent and Synchronization Service.
To copy the thumbprint of your custom certificate
- Open the Certificates - Local Computer snap-in.
- In the console tree, click the Personal store to expand it.
- Click the Certificates store to expand it.
- In the details pane, double-click the certificate.
- In the Certificate dialog box, click the Details tab, and scroll through the list of fields to select Thumbprint.
- Copy the hexadecimal value of Thumbprint to Clipboard.
You will need the copied thumbprint value to configure the Capture Agent and Synchronization Service.
Step 5: Provide certificate’s thumbprint to Capture Agent
This step assumes that:
- The same Group Policy object is linked to each OU holding the domain controllers on which the Capture Agent is installed. For more information on how to create and link a Group policy object, see the documentation for your version of Windows.
- The SyncServiceCaptureAgent.adm administrative template file is linked to that Group Policy object.
For instructions on how to add an administrative template file to a Group Policy object, see Step 2: Add administrative template to Group Policy object
To provide the thumbprint to Capture Agent
On any computer joined to the domain where Capture Agent is installed, open Group Policy Object Editor, and connect to the Group Policy object to which you added the Administrative Template in Step 2: Add administrative template to Group Policy object.
- In the Group Policy Object Editor console, expand the Group Policy object, and then expand the Computer Configuration node.
- Expand the Administrative Templates\Active Roles node to select Sync Service Capture Agent Settings.
- In the details pane, double-click Certificate to encrypt Capture Agent traffic.
- Select the Enabled option, and then paste the certificate’s thumbprint (the one you copied in Step 4: Copy certificate’s thumbprint) in the Thumbprint text box. When finished, click OK.
- For the changes to take effect, refresh the Group Policy settings by running the following command at a command prompt: gpupdate /force
Step 6: Provide certificate’s thumbprint to Synchronization Service
Step 6: Provide certificate’s thumbprint to Synchronization Service
Perform the next steps on each computer running the Synchronization Service that participates in the password sync operations.
To provide the thumbprint to Synchronization Service
- On the computer running the Synchronization Service, start Group Policy Object Editor, and then connect to the Local Computer Policy Group Policy object.
- In the Group Policy Object Editor console, expand the Local Computer Policy node, expand the Computer Configuration node, and select Administrative Templates.
- On the Action menu, point to All Tasks, and click Add/Remove Templates.
- In the Add/Remove Templates dialog box, click Add, and then use the Policy Templates dialog box to open the SyncService.adm file that holds the Administrative Template.
- By default, the SyncService.adm file is stored in <Active Roles installation folder>\SyncServiceCaptureAgent\Administrative Templates.
- Under Computer Configuration\Administrative Templates\Active Roles, select Sync Service Settings.
- In the details pane, double-click Certificate to encrypt Capture Agent traffic.
- Select the Enabled option, and then paste the certificate’s thumbprint (the one you copied in Step 4: Copy certificate’s thumbprint) in the Thumbprint text box. When finished, click OK.
- For the changes to take effect, refresh the Group Policy settings by running the following command at a command prompt: gpupdate /force