Using OpenSSL as a root cert is a fine idea, especially with a two-tier infrastructure where you keep the root mostly shut down.
Using a MSFT CA as a secondary is a really good idea - it doesn't just serve up IIS certs, it also serves up about every kind of cert needed for an infrastructure, including machine certs, user certs, network equipment certs, etc. I recommend you take a hard look at the MSFT offering in this space. Kurt On Tue, Oct 29, 2013 at 1:17 PM, Michael Leone <[email protected]> wrote: > On Tue, Oct 29, 2013 at 3:53 PM, Michael Leone <[email protected]> wrote: >> >> >> >> >> On Tue, Oct 29, 2013 at 2:26 PM, Ken Cornetet <[email protected]> >> wrote: >>> >>> You are making this WAY too hard. Install certificate servicer on one of >>> your windows servers. Make it a root CA for the domain. Use IIS management >>> console and/or the “certificates” MMC to request and install certificates. >>> Done. >> >> >> Nope, don't want a Windows server as a CA. I have CA that has been working >> for years. >> >> Note that I am NOT speaking about installing certs for IIS. Been doing that >> for years, and it's always worked. >> The problem was that the certificate I was issuing for IIS could NOT be >> brought into the "Deployment Options" for RDS; the error was "the specified >> certificate is not valid. The certificate properties must match the >> requirements of the role service."". > > To put it another way: > > I have been using this Linux CA (and this config) to issue local certs > for years. IIS is always happy with them; they show up as valid; the > traffic is always https; etc. The problem was that the properties of > the cert that IIS didn't mind, were *not* the properties that the RDS > Deployment wanted in a cert. So I had to change my Linux CA config to > add the properties that RDS wanted. That was the point of this email. > :-) > > If I knew openssl better, I'm sure I could have changed the config a > long time ago, to add any extended key capability that the requesting > cert asked for. I hadn't set it up that way (never knew I hadn't), and > it has never been an issue, not for any of the certs we've been using > internally for the last 3 years. > > My post was just a heads up for anyone else issuing their own certs, > using openssl, that the cert needs those extended key capabilities for > RDS to work,. They are not needed for IIS to work, based on the 3 > years I've been using my certs correctly without those extended keys. > :-) > >

