立即与支持人员聊天
与支持团队交流

Quick Connect for Active Directory 6.1 - Administration Guide

One Identity Quick Connect Overview Deploying One Identity Quick Connect Sync Engine Getting started Connections to external data systems Synchronizing identity data Mapping objects Automated password synchronization Synchronization history Scenarios of use Appendices

Specifying a custom certificate for encrypting password sync traffic

By default, Quick Connect uses a built-in certificate to encrypt password sync traffic between the Capture Agent and the Quick Connect Service. If necessary, you can use a custom certificate for this purpose.

This section illustrates how to use a custom certificate for encrypting the password synchronization traffic in Windows Server 2012 or 2012 R2.

Complete the following steps:

Step 1: Obtain and install a certificate

To obtain and install a certificate, you have to make a certificate request. There are two methods to request a certificate in Windows Server 2012 or 2012 R2:

  • Request certificates using the Certificate Request Wizard. To request certificates from a Windows Server 2012 or 2012 R2 enterprise certification authority, you can use the Certificate Request Wizard.
  • Request certificates using the Windows Server 2012 or 2012 R2 Certificate Services Web interface. Each certification authority that is installed on a computer running Windows Server 2012 or 2012 R2 has a Web interface that allows the users to submit certificate requests. By default, the Web interface is accessible at http://servername/certsrv, where servername refers to the name of the computer running Windows Server 2012 or 2012 R2.

This section provides steps to request certificates using the Windows Server 2012 or 2012 R2 Certificate Services Web interface. For detailed information about the Certificate Request Wizard, refer to the documentation on Certification Authority.

To request a certificate using the Windows 2012 or 2012 R2 Certificate Services Web interface

  1. Use a Web browser to open to http://servername/certsrv, where servername refers to the name of the Web server running Windows Server 2012 or 2012 R2 where the certification authority that you want to access is located.
  2. On the Welcome Web page, click Request a certificate.
  3. On the Request a Certificate Web page, click advanced certificate request.
  4. On the Advanced Certificate Request Web page, click Create and submit a certificate request to this CA.
  5. On the Web page that opens, do the following:
    1. Select the Store certificate in the local computer certificate store check box.
    2. Under Additional Options, select the PKCS10 option, and in the Friendly Name text box, specify a name for your certificate (such as My QC Certificate).

    Keep default values for all other options.

  6. Click Submit.
  7. On the Certificate Issued Web page, click Install this certificate.

After you install the certificate, it becomes available in the Certificates snap-in, in the Personal/Certificates store.

Step 2: Export custom certificate to a file

In this step, you export the issued certificate to a file. You will need the file to install the certificate on each domain controller running Capture Agent and on each computer running Quick Connect Service.

To export the certificate

  1. On the computer where you installed the certificate in step 1, open the Certificates - Local Computers snap-in.
  2. In the console tree, click the Personal/Certificates store.
  3. In the details pane, click the issued certificate you want to export.
  4. On the Action menu, point to All Tasks, and then click Export.
  5. Step through the wizard.
  6. On the Export Private Key page, select Yes, export the private key, and then click Next.

    This option is available only if the private key is marked as exportable and you have access to the private key.

  7. On the Export File Format page, do the following, and then click Next:
    • To include all certificates in the certification path, select the Include all certificates in the certification path if possible check box.
    • To enable strong protection, select the Enable strong protection check box.
  8. On the Password page, use the Password text box to type a password to encrypt the private key you are exporting. In Confirm password, type the same password again, and then click Next.
  9. On the File to Export page, use the File name text box to specify the PKCS #12 file to which you want to export the certificate along with the private key, and click Next.
  10. On the Completion page, revise the specified settings and click Finish to create the file and close the wizard.

Step 3: Import certificate into certificates store

In this step, you import the certificate to the Personal\Certificates certificate store by using the Certificates snap-in. You must complete this step on each domain controller running Capture Agent and on each computer running the Quick Connect Service that will participate in the password synchronization.

To import the certificate

  1. Open the Certificates - Local Computers snap-in.
  2. In the console tree, click the Personal\Certificates logical store.
  3. On the Action menu, point to All Tasks and then click Import.
  4. Step through the wizard.
  5. On the File to Import page, in File name, type the file name containing the certificate to be imported or click Browse and to locate and select the file. When finished, click Next.
  6. On the Password page, type the password used to encrypt the private key, and then click Next.
  7. On the Certificate Store page, ensure that the Place all certificates in the following store option is selected, and the Certificate store text box displays Personal, and then click Next.
  8. On the Completion page, revise the specified settings and click Finish to import the certificate and close the wizard.
相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级