PKI Reading Time: 7 minutes

How to migrate from old CA to a new Issuing CA

Issuing CA often needs to be decommissioned for a variety of reasons, such as

  • The operating system is reaching the end of its life
  • CA might be compromised
  • CA is having operational issues and is too complicated to clean up.

No matter the reason, migrating to a new issuing CA can seem easy. Still, it can come with new challenges, such as mitigating risks, minimizing operational impact, etc.

While migrating issuing CAs, we need to ensure,

  1. The current certificates that are issued remain operational until their validity runs out.
  2. The old issuing CA should not issue any more certificates.
  3. We can move to other CDP/AIA points according to the required changes, but the issuing CA would have a minimal operation and no impact on the PKI infrastructure.

Prerequisites

Before we begin, you need a new server that will act as the new issuing CA. The server should be configured, and issuing CA should be installed.

Steps to Migrate

These steps will help organizations migrate to new issuing CA.

If CDP/AIA points are not being changed, steps 2, 4, and 5 are optional and shouldn’t be followed.

  1. Log onto the old Issuing CA
  2. Identify CDP/AIA Distribution Points (optional)
    1. Open command prompt
    2. Type the command

      certutil -getreg CA\CACertPublicationURLs

      migrate to the new issuing CA
    3. Document the HTTP AIA points. Ignore LDAP and C:\%windir%

      As per the screenshot, the AIA point is http://pki.encon.com/CertEnroll/%1_%3%4.crt

      %1 refers to ServerDNSName

      %3 refers to CaName

      %4 refers to Certificate Name

      Actual URL: http://pki.encon.com/CertEnroll/iCA2016.encon.com_iCA2016.crt

    4. Type the command

      certutil -getreg CA\CRLPublicationURLs

    5. Document the HTTP CDP Points. Ignore LDAP and C:\%windir%

      As per the screenshot, the CDP point is http://pki.encon.com/CertEnroll/%3%8%9.crl

      %3 refers to CaName

      %8 refers to CRLNameSuffix

      %9 refers to DeltaCRLAllowed

      Actual URL: http://pki.encon.com/CertEnroll/iCA2016.crl

  3. Disabling the Delta CRL and issue a new long Certificate Revocation List (CRL)
    1. Open Certificate Authority Console
      Certificate Revocation List (CRL)
    2. Right-click on Revoked Certificates, and then click properties
      Revoked Certificates properties
    3. Uncheck “Publish Delta CRL”
      Uncheck Publish Delta CRL
    4. Edit the “CRL publication interval” to 99 years

      Click OK

    5. Open command prompt as administrator
    6. Type the following command

      certutil -crl

  4. Copy old CA’s certificate (crt) and Certificate Revocation List (CRLs) files to new CDP/AIA Points (optional)
    1. Navigate to %windir%\System32\CertSrv\CertEnroll
    2. Copy the old CA’s crt and CRL files to new CDP/AIA Points
      CRL files to new CDP/AIA Points
  5. Redirect AIA and CDP points of old CA to the new location

    This can be done using an

    1. IIS redirect, or
    2. DNS CNAME

      redirecting the AIA and CRL of the old Certification Authority.

  6. Document all certificate templates and stop certificate publishing on old Issuing CA
    1. Open the command line with elevated privileges
    2. Run

      Certutil -catemplates > c:\catemplates.txt

      and document all certificate templates published at the old Certification Authority

      Certification Authority

      In total, certificate templates are present.

    3. Launch the Certification Authority console
    4. Navigate to “Certificate Templates”
    5. Highlight all templates in the right pane, right-click and then click “Delete”
      CRL Distribution point

      The old Certification Authority cannot issue any certificates and has all of its AIA and CRLs redirected to a new CRL Distribution point. The next steps will detail how users can document the certificates templates published on the old issuing CA and how to make them available at the new issuing CA.

  7. Sort Certification Authority Database, identify and document all certificates issued based on certificate templates
    1. Open Certificate Authority Console.
    2. Highlight Issued Certificates.
    3. Move to the right and sort by “Certificate Templates.”
      Certificate Authority Console
    4. Identify the certificates that are issued by default certificate template types.
    5. Document the certificates issued by custom certificate templates i.e. any template other than the default certificate templates.
  8. Document certificates based on default certificate template types
    1. Open command prompt with elevated privileges
    2. Run

      Certutil -view -restrict “Certificate Template=Template” -out “SerialNumber,NotAfter,DistinguishedName,CommonName”> c:\TemplateType.txt

      Note: Replace the Template with the correct template name

    3. Review the output on TemplateType.txt and document all certificates that need immediate action (requiring issuance from the new CA infrastructure if needed, such as Web Server Certificate)
    4. Consult with application administrators using the certificates to determine the best approach to replace the certificates if needed
  9. Document certificates based on custom certificate types
    1. Open Certification Authority Console
    2. Right click on Certificate Templates, and click Manage
      custom certificate types
    3. Double-click the certificate template and click on the “Extensions” tab
    4. custom certificate types
    5. Click on “Certificate Template Information”
    6. Description of Certificate template information
    7. Copy the Object Identifier (OID) number – the number will look similar to

      1.3.6.1.4.1.311.21.8.5363900.15781253.12798358.11444918.12080715.141.12736713.11129372

    8. Open the command prompt with elevated privileges
    9. Run

      Certutil -view -restrict “Certificate Template= 1.3.6.1.4.1.311.21.8.5363900.15781253.12798358.11444918.12080715.141.12736713.11129372″ -out “SerialNumber,NotAfter,DistinguishedName,CommonName”> c:\CustomTemplateType.txt

      Note: Replace the OID number with the number identified in step 5

      Certutil
    10. Examine the output of c:\CustomTemplateType.txt and document all the certificates needing immediate action (requiring issuance from the new CA infrastructure if needed, such as custom SSL certificates).
    11. Consult with the application administrator using the certificates to determine the best approach to replace the certificates if needed
  10. Enable certificate templates needed on the results of steps 7 to 9 on new Issuing CA
    1. Login to new Issuing CA.
    2. Right-click on “Certificate Templates,” click New, and click “Certificate Templates to Issue.”
      Certificate Template to issue
    3. Choose all certificate templates needed in the “Enable Certificate Templates” windows and click >OK.
      Enable Certificate Templates

Conclusion

With these steps, organizations can migrate to the new issuing CA while decommissioning the old Issuing CA. With Windows 2012 ending in October 2023 organizations need something to help migrate to newer operating systems with minimal impact.

If your organization needs assistance with this migration, feel free to email us at [email protected], and we will ensure that your migration goes as smoothly as possible.

Free Downloads

Datasheet of Public Key Infrastructure

We have years of experience in consulting, designing, implementing & migrating PKI solutions for enterprises across the country.

Download

About the Author

Anish Bhattacharya is a Consultant at Encryption Consulting, working with PKIs, HSMs, creating Google Cloud applications, and working as a consultant with high-profile clients.

Explore the full range of services offered by Encryption Consulting.

Feel free to schedule a demo to gain a comprehensive understanding of all the services Encryption Consulting provides.

Request a demo