Skip to content

Microsoft AD CS

Short Summary: Issue certificates from your on-premise Microsoft CA using the Agent as a DCOM bridge.

Unlike Cloud CAs, MSCA uses DCOM/RPC. The SSL-CLM Agent must run on a Windows Server joined to the domain to “proxy” these requests.

  • Agent OS: Windows Server 2016+.
  • Service Account: Domain User with Enroll permissions on the CA.
  • Firewall: Port 135 and Dynamic RPC between Agent and CA.

Edit application.properties:

agent.msca.enabled=true
agent.msca.config-string=CA-Hostname.corp.local\\My-Corp-CA
  1. Navigate: Admin > CA Gateways > Add New.
  2. Select Provider: Microsoft AD CS.
  3. Agent: Select the Windows Agent configured above.
  4. Templates: Click “Fetch Templates” to sync available certificate types (e.g., WebServer).

Issue: “RPC Server Unavailable” Fix: Check firewall rules. Use certutil -ping -config "HOST\NAME" on the Agent to verify connectivity.