Replacing the SSL certificate 1. Obtain a new certificate with the following requirements a. Enhanced Key Usage is at least Server Authentication. If you are obtaining this from an internal MS Enterprise CA, the Web Server template will work fine. b. Subject or Subject Alternative Name (SAN) must contain the DNS name of your Federation Service or an appropriate wildcard name Example: sso.contoso.com or *.contoso.com c. You may wish to generate the certificate request and mark the private key exportable so that you can move the certificate from one server to others in the case when you have a Federation Server farm or at least one Federation Server Proxy. d. Take note of which server was used to generate the certificate request. The private key is generated and stored here. When you receive the certificate from the issuing CA, you will need to bring that file back to the server where the request was initiated so that you can create a private/public key pair. e. The issuing CA that you choose is important because your Federation Server(s), Federation Server Proxy(ies), and all clients accessing your Federation Service must be able to chain to a trusted root certification authority when validating the SSL certificate. Customers will typically use a 3rd party, public CA for the SSL certificate. 2. Bind the new SSL certificate to the web site in IIS which hosts the Federation Service (this includes all Federation Servers and Federation Server Proxies) a. In IIS6 on Windows Server 2003 R2, you will select the Properties of the web site, Directory Security tab, and select Server Certificate:
Maheshkumar S Tiwari edited Revision 2. Comment: corrected typo error, minor edit and added tags
Ed Price MSFT edited Original. Comment: Updated title casing and formatting per style guides.