Skip to content

Microsoft AD CS

Integrate Microsoft Active Directory Certificate Services (AD CS) with SSL-CLM to:

  • Discover existing certificates
  • Sync certificate templates
  • Issue certificates
  • Revoke certificates
  • Maintain continuous CA refresh

SSL-CLM integrates with Microsoft AD CS using a Windows Agent that executes native certificate enrollment operations locally and relays results securely to the platform.


The SSL-CLM Agent must run on a domain-joined Windows server.

SSL-CLM Platform
│ (mTLS, Pull-Based Jobs)
Windows SSL-CLM Agent
│ (WinRm Command Line)
Microsoft AD CS

Confirm AD CS role is installed and running.

Windows Server Manager - AD CS Installed

Open the Certification Authority console:

Certification Authority Console

You should see your CA (e.g., qcecuring-local-ca).


From the Windows Agent server:

Terminal window
certutil -ping -config "WIN-6RM7FR3L231\qcecuring-local-ca"

Successful output:

certutil CA ping success

If you receive RPC Server Unavailable:

  • Check TCP 135
  • Verify firewall
  • Ensure CA service is running
  • Confirm DCOM permissions

Navigate:

Configuration → Connector Configs → New Connector

Configure:

  • Vendor: MSCA Agent
  • Type: Agent Gateway

Create Connector Config

Example JSON:

{
"caIdentifier": "WIN-6RM7FR3L231\\qcecuring-local-ca",
"serverHost": "WIN-6RM7FR3L231"
}

Step 4 — Create Certificate Authority Instance

Section titled “Step 4 — Create Certificate Authority Instance”

Navigate:

Discovery → Certificate Authorities → New Certificate Authority

Select:

  • Type: Microsoft CA
  • Connector: MSCA Agent Gateway

Create CA Instance

Save the configuration.


Navigate:

Operations → Agents → Register New Agent

Generate bootstrap token.

Create Agent Bootstrap Token


On the Windows server:

Terminal window
set API_URL=https://102.124.1.11:8080
set AGENT_BOOTSTRAP_TOKEN=YVtsWExUfDqF9LhsYYmjJroud6PKidW5IebRT-X9EUK
set AGENT_MSCA_ENABLED=true
set AGENT_MSCA_CA_IDENTIFIER=WIN-6RM7FR3L231\qcecuring-local-ca
set ADCS_SERVER=WIN-6RM7FR3L231
set ADCS_USERNAME=DomainUser
set ADCS_PASSWORD=StrongPassword
java -jar ssl-clm-agent.jar

Agent startup:

Windows Agent Launch

Agent should appear as ACTIVE in dashboard.


In the CA instance, click Load Templates.

This triggers a CA_REFRESH job.

Load Templates

Templates such as:

  • WebServer
  • WebServer-SSL-CLM
  • EnrollmentAgent
  • CodeSigning

Will appear.


Navigate:

Enrollment → Guided CSR

Fill certificate details and submit.

Submit CSR


After issuance, certificate status becomes Issued.

Issued CSR View

Flow:

  1. CSR stored in platform
  2. ISSUE_CERT job created
  3. Agent enrolls via MSCA
  4. Certificate returned
  5. Inventory updated