Add Microsoft AD CS
Table of Contents
Expand all | Collapse all
-
- Activate Next-Generation Trust Security
-
-
- Configure AWS connection
- Configure Azure Key Vault connection
-
- Workload Identity Federation authentication
- Workload Identity Federation - Azure Identity Provider authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Workload Identity Federation authentication
- Next-Gen Trust Security Generated Key authentication
- User permissions
- Supported OIDC claims
-
-
-
-
- Create an F5 BIG-IP LTM machine
- Create a Microsoft Azure Private Key Vault machine
- Create a Microsoft IIS machine
- Create a Microsoft Windows (PowerShell) machine
- Create a Microsoft SQL Server machine
- Create a Common KeyStore machine
- Create a Citrix ADC machine
- Create an Imperva WAF machine
- Create a VMware NSX Advanced Load Balancer (AVI) machine
- Create an A10 Thunder ADC machine
- Create a Cloudflare machine
- Create Kemp Virtual LoadMaster machine
- Create a Palo Alto Panorama machine
-
- Provision to an F5 BIG-IP LTM
- Provision to a Microsoft Azure Private Key Vault
- Provision to Microsoft IIS
- Provision to Microsoft Windows (PowerShell)
- Provision to Microsoft SQL Server
- Provision to a Common KeyStore
- Provision to a Citrix ADC
- Provision to an Imperva WAF
- Provision to VMware NSX Advanced Load Balancer (AVI)
- Provision to an A10 Thunder ADC
- Provision to Cloudflare
- Provision to a Kemp Virtual LoadMaster
- Provision to Palo Alto Panorama
-
-
- 47-Day Validity Readiness TLS Certificates dashboard
- About the Certificate Inventory
- Managing certificate lifecycle settings
- Reissuing certificates in Next-Gen Trust Security
- Downloading certificates, certificate chains, and keystores
- Retiring, recovering, and deleting certificates
- Finding certificates in the certificate inventory
- Importing certificates from a CA using EJBCA
- Notification Center overview
- Domain-based validation for external emails
- Managing user accounts
- Troubleshooting
Add Microsoft AD CS
Many organizations use Microsoft Active Directory Certificate Services (AD CS) to issue internally trusted certificates. Integrating Microsoft AD CS with Next-Gen Trust Security provides visibility into certificates issued by Microsoft AD CS and supports certificate issuance through that certificate authority.
How it works
Microsoft AD CS connects to Next-Gen Trust Security by using a
VSatellite and a
VSatellite Worker.
The VSatellite is installed on a Linux server and provides a secure connection point between your internal network and Next-Gen Trust Security.
The VSatellite Worker connects the VSatellite to your Microsoft AD CS server.
What’s next
The topics in this section describe how to set up and configure the AD CS integration with Next-Gen Trust Security.
Before you begin, ensure that you have servers available for the VSatellite and VSatellite Worker. For details, see the system requirements.
Your AD CS service must also meet specific configuration requirements. For details, see Setting up Microsoft AD CS.
After the servers are in place and AD CS is configured, follow the remaining setup steps described in Issuing certificates with Microsoft AD CS.