You can use Group Policy to easily configure and manage these certificate validation settings. The following are some of the tasks you can perform with these settings:
Certificate path validation settings are available in Group Policy at the following location: Computer Configuration\Windows Settings\Security Settings\Public Key Policies.
When you double-click Certificate Path Validation Settings at this location, additional options are available by selecting the following tabs:
The following procedure describes how to configure certificate path validation settings. The sections following the procedure will describe the settings in each of these areas.
Membership in Domain Admins, or equivalent, is the minimum required to complete this procedure. For more information, see Implement Role-Based Administration.
To configure path validation Group Policy for a domain
On a domain controller, click Start, point to Administrative Tools, and then click Group Policy Management. Note: In Windows Server 2012, you can run the Group Policy Management console from Server Manager. Click Tools, then click Group Policy Management.
In the console tree, double-click Group Policy Objects in the forest and domain containing the Default Domain Policy Group Policy object (GPO) that you want to edit.
Right-click the Default Domain Policy GPO, and then click Edit.
In the Group Policy Management Console (GPMC), go to Computer Configuration, Windows Settings, Security Settings, and then click Public Key Policies.
Double-click Certificate Path Validation Settings, and then click the Stores tab.
Select the Define these policy settings check box.
Configure the optional settings that you need to apply.
When you are finished making changes, you can select a different tab to modify additional settings, or click OK to apply the new settings.
Some organizations want to prevent users in the domain from configuring their own set of trusted root certificates and to decide which root certificates within the organization can be trusted. The Stores tab can be used to accomplish this.
The following options are available on the Stores tab:
In addition, some organizations may want to identify and distribute specific trusted root certificates to enable business scenarios where additional trust relationships are needed. To identify the trusted root certificates that you would like to distribute to clients in your domain, see Use Policy to Distribute Certificates.
Software signing is being used by a growing number of software publishers and application developers to verify that their applications come from a trusted source. However, many users do not understand or ignore the signing certificates associated with applications that they install.
The policy options on the Trusted Publishers tab of the certificate path validation policy allow you to control who can make decisions about trusted publishers:
In addition, policy options on this tab allow you to require that trusted publisher certificates be checked that they:
To be effective, certificate-related data such as certificate revocation lists (CRLs) and certificates in the Microsoft Root Certificate Program must be updated regularly. However, problems can arise if validation checking and retrieval of certificate revocation data and cross-certificates are interrupted because more data is being transferred than originally anticipated.
To support revocation checking, Active Directory Certificate Services (AD CS) supports the use of CRLs and delta CRLs as well as Online Certificate Status Protocol (OCSP) responses distributed by Online Responders.
Path validation Group Policy settings allow administrators to optimize the use of CRLs and Online Responders, particularly in situations where extremely large CRLs or network conditions detract from performance.
The following settings are available:
Domain Group Policy can be used to manage the following types of certificate-related activities in an Active Directory Domain Services (AD DS) environment:
Credential roaming allows X.509 certificates, certificate requests, and private keys specific to a user in AD DS to be stored independently from the user profile and used on any computer on the network.
Digital certificates and private keys involve comparatively small amounts of data that need to be stored in a secure manner. Credential roaming policy provides a means for managing the use of these credentials on multiple computers in a manner that addresses the secure storage and size requirements of digital certificates and private keys. In Windows Server 2008 R2 and Windows Server 2008, credential roaming policy includes stored user names and passwords as well as certificates and keys.
For more information, see Enable Credential Roaming.
For more information about credential roaming and significant differences between its implementation in Windows Server 2008, Windows Server 2003, Windows Vista, and Windows XP, see Configuring and Troubleshooting Certificate Services Client–Credential Roaming (http://go.microsoft.com/fwlink/?LinkID=85332).
Many organizations use Group Policy to automatically enroll users, computers, or services for certificates.
For more information, see Configure Certificate Autoenrollment.
As certificate use for secure communication and data protection is increasing, administrators can use certificate trust policy to enhance their control of certificate use and public key infrastructure performance by using certificate path validation options.
Certificate path validation settings in Group Policy allow administrators to manage stores, trusted publishers, network retrieval, and revocation checking.
For more information, see Manage Certificate Path Validation.
The certificate distribution capabilities in Group Policy are useful for managing certificate-related trust in an organization. It allows you to ensure that certain certificates are trusted and that certificate chain building occurs with little or no user intervention. You can also block the use of certificates that you cannot directly revoke because they were issued by an external certification authority (CA).
For more information, see Use Policy to Distribute Certificates.
Ed Price - MSFT edited Revision 9. Comment: White space issues
Kurt L Hudson edited Revision 6. Comment: Updated Group Policy Management opening instructions for Windows Server 2012
Patris_70 edited Revision 5. Comment: added en-US tag and title
Kurt L Hudson edited Revision 4. Comment: Updated to include discussion of CTLs
Kurt L Hudson edited Revision 3. Comment: Updated further with domain Group Policy information
Kurt L Hudson edited Revision 2. Comment: Work in progress
Kurt L Hudson edited Revision 1. Comment: work in progress
Kurt L Hudson edited Original. Comment: changing to H1 and getting ready to populate content here
Ed Price - MSFT edited Revision 8. Comment: Removed "(en-US)" from the title. Tags.