{"id":1390,"date":"2022-08-05T17:47:39","date_gmt":"2022-08-05T22:47:39","guid":{"rendered":"http:\/\/zewwy.ca\/?p=1390"},"modified":"2022-08-05T17:47:39","modified_gmt":"2022-08-05T22:47:39","slug":"renew-subordinate-ca-certificate-to-offline-root","status":"publish","type":"post","link":"https:\/\/zewwy.ca\/index.php\/2022\/08\/05\/renew-subordinate-ca-certificate-to-offline-root\/","title":{"rendered":"Renew Subordinate CA Certificate to Offline Root"},"content":{"rendered":"<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Setup\"><\/span>Setup<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>If you follow other posts on renewing a sub-ca certificate, they usually have two tings to make their lives easier:<\/p>\n<ol>\n<li>A server with a GUI<\/li>\n<li>an Online Enterprise Root CA<\/li>\n<\/ol>\n<p>We have none of those. We have:<\/p>\n<ol>\n<li>an Offline Root CA (at least it has a GUI)<\/li>\n<li>A Server Core Sub CA<\/li>\n<\/ol>\n<p>Like many times in the past, MMC remote snap-in pointing to a remote core server is lacking the context menu or ability to do what you need.<\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Steps\"><\/span>Steps<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>For example <a href=\"https:\/\/docs.microsoft.com\/en-us\/answers\/questions\/296899\/no-option-to-34renew-ca-certificate34-under-34all.html\">this poor guy who posted in Windows QA<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Step_1_Log_Into_the_Server_Core_Sub_Sub_CA\"><\/span>Step 1) Log Into the Server Core Sub Sub CA.<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>RDP, direct console, whatever floats your boat on this one.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Step_2_Run_the_following_command\"><\/span>Step 2) Run the following command:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<pre>Certutil -renewCert ReuseKeys<\/pre>\n<p>Now you get a pop up, asking you to select an Online CA server to sign the Cert. In small writing on the pop up it says you can click cancel and manually sign the certificate saved under c:\\ path.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/LaHfR0H.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/LaHfR0H.png\" alt=\"\" width=\"692\" height=\"332\" \/><\/a><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Step_3_Copy_to_Request_File_to_Offline_CA\"><\/span>Step 3) Copy to Request File to Offline CA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now save the request file, and copy it onto your Offline Root CA. How you accomplish this in on your and your setup. If it&#8217;s all virtualized, do the vUSB trick I often do. If you have RDP access to the Sub CA, use this <a href=\"https:\/\/serverfault.com\/questions\/917358\/on-windows-server-core-how-can-i-copy-file-located-in-my-local-computer-to-the\">RDP resource and notepad trick.<\/a><\/p>\n<p>Step 4) Issue Certificate on Offline CA<br \/>\n&#8211; Open Certificate Authority Tool.<br \/>\n&#8211; Right Click Server Node -&gt; All Tasks -&gt; Submit New Request -&gt; Select the request file created in Step 2<br \/>\n&#8211; Click on Pending Requests Folder -&gt; Right Click Certificate -&gt; Issue<br \/>\n&#8211; Go back to Issued Certificates Folder -&gt; Double Click new Certificate -&gt; Details Tab -&gt; Copy to File -&gt; Save it<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Step_5_Copy_Issued_Certificate_back_to_Sub_CA\"><\/span>Step 5) Copy Issued Certificate back to Sub CA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Whatever means you did for Step3, do it in reverse.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Step_6_Install_the_new_Certificate_on_the_Sub_CA\"><\/span>Step 6) Install the new Certificate on the Sub CA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<pre>certutil -installcert &lt;path to signed certificate&gt;<\/pre>\n<p><a href=\"https:\/\/i.imgur.com\/RajSAA8.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/RajSAA8.png\" alt=\"\" width=\"639\" height=\"64\" \/><\/a><\/p>\n<p>OK, Stop the Service:<\/p>\n<pre>sc stop CertSvc<\/pre>\n<p><a href=\"https:\/\/i.imgur.com\/zVtE0Ay.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/zVtE0Ay.png\" alt=\"\" width=\"599\" height=\"546\" \/><\/a><\/p>\n<p>Then Start it back up:<\/p>\n<pre>sc start CertSvc<\/pre>\n<p><a href=\"https:\/\/i.imgur.com\/PxBUe0Z.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/PxBUe0Z.png\" alt=\"\" width=\"685\" height=\"398\" \/><\/a><\/p>\n<p>Then from a remote management machine with the Cert Authority MMC Snap-in added, check the properties on the Sub-CA. You should see the new certificate listed.<\/p>\n<p><a href=\"https:\/\/i.imgur.com\/QJfMdan.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/i.imgur.com\/QJfMdan.png\" alt=\"\" width=\"1061\" height=\"584\" \/><\/a><\/p>\n<p>Hope this Helps someone.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Setup If you follow other posts on renewing a sub-ca certificate, they usually have two tings to make their lives easier: A server with a GUI an Online Enterprise Root CA We have none of those. We have: an Offline Root CA (at least it has a GUI) A Server Core Sub CA Like many &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/zewwy.ca\/index.php\/2022\/08\/05\/renew-subordinate-ca-certificate-to-offline-root\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Renew Subordinate CA Certificate to Offline Root&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[8],"tags":[217,416,188,363],"class_list":["post-1390","post","type-post","status-publish","format-standard","hentry","category-server-administration","tag-ca","tag-cert","tag-certificate","tag-renew"],"_links":{"self":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/1390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/comments?post=1390"}],"version-history":[{"count":1,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/1390\/revisions"}],"predecessor-version":[{"id":1391,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/1390\/revisions\/1391"}],"wp:attachment":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/media?parent=1390"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/categories?post=1390"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/tags?post=1390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}