-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Kurt Buff
Sent: Tuesday, 1 April 2014 11:55 AM
To: [email protected]
Subject: Re: [NTSysADM] IIS certs expiration and autorenewal from a Windows CA

> I am of the opinion that there shouldn't be any reason why these web sites 
> don't autorenew their certs, once installed.

Auto-renewal isn't a process that looks at the details in the existing cert and 
says to the CA "give me a new cert with the same properties, except extend the 
expiry date"

Auto-renewal is a process that’s says "based on my user/computer properties, 
give me a cert with said properties"

The issue you have is that certs you've issued for your services are not tied 
to the user or computer properties per se - they have arbitrary Common Names 
(for starters).

That's not to say you can't setup an automated process that, once a pending 
cert expiry is detected, creates an appropriate CSR and submits it to your CA, 
and your CA can be configured to auto-issue the cert.

> I'm willing to be schooled on that, but after thinking about it for a while I 
> can't see any objections - 
> except perhaps "It can't be done."

I don't think it can be done with the built-in auto-renewal process in Windows, 
because it doesn't do what you think/want it to do.

> Asset management - that's a spreadsheet on which assets are tracked, right? :)

Not ideal. 

But you could improve on the idea: e.g. create some formulas that colour-code 
or highlight the contracts or assets that are reaching EoL. Write a VBScript 
that queries it every day, and generates an email with things that need to be 
renewed or a helpdesk ticket, or whatever.
Downside to Excel is it might be hard to model different types of items without 
using different tabs, and you don't get any real referential integrity, and 
version control is a PITA etc.

Cheers
Ken



> Cheers
> Ken
>
> -----Original Message-----
> From: [email protected] 
> [mailto:[email protected]] On Behalf Of Kurt Buff
> Sent: Tuesday, 1 April 2014 10:03 AM
> To: [email protected]
> Subject: [NTSysADM] IIS certs expiration and autorenewal from a 
> Windows CA
>
> All,
>
> We had a bit of a scramble when an IIS SSL cert generated by our internal CA 
> expired, and didn't autorenew.
>
> Now that I've fixed it, I'm wondering how to set up autorenewal,
>
> From my reading so far, it looks like I need to set up an SPN for the web 
> site on the machine account, vis:
> http://social.technet.microsoft.com/Forums/windowsserver/en-US/0b43513
> 5-5a90-4957-9bcc-a92b4c519fda/autoenrollment-for-web-server-certificat
> es
>
> and
>
> http://support.microsoft.com/kb/929650
>
> Is this correct, and sufficient? Or do I need to dig a little deeper?
>
> Kurt
>
>


Reply via email to