Install certificates in a Workgroup environment for communication with the Management Server or Recording Server

When operating in a Workgroup environment, it is assumed that there is no certificate authority infrastructure. To distribute certificates, it is required to create a certificate authority infrastructure. There is also a requirement to distribute the certificate keys to client workstations. Except for these requirements, the process of requesting and installing a certificate on a server is similar to both the domain and commercial CA scenarios.

Add a CA certificate to the server

Add the CA certificate to the server by doing the following.

  1. On the computer that hosts the XProtect server, open the Microsoft Management Console.

  2. In the Microsoft Management Console, from the File menu select Add/Remove Snap-in….

  3. Select the Certificates snap-in and click Add.

    Click OK.

  4. Expand the Certificates object. Right-click on the Personal folder and select All Tasks > Advanced Operations > Create Custom Request.

    Right click Personal certificate store, choose All Tasks > Advanced Operations > Create Custom Request.

  5. Click Next in the Certificate Enrollment wizard and select Proceed without enrollment policy.

    Click Next.

    Click Next to proceed without enrollment policy

  6. Select the (No template) CNG Key template and the CMC request format, and click Next.

    Keep the default CNG key template and choose the CMC request format. Then click next.

  7. Expand to view the Details of the custom request, and click Properties.

  8. On the General tab, fill in the Friendly name and Description fields with the domain name, computer name, or organization.

    The general tab of the certificate request properties menu.

  9. On the Subject tab, enter the required parameters for the subject name.

    In the subject name Type, enter in Common Name the host name of the computer where the certificate will be installed.

    Properties - Subject - Common Name

  10. On the Extensions tab and expand the Extended Key Usage (application policies) menu. Add Server Authentication from the list of available options.

    Properties - Extentions - Extended Key Usage - Server Authentication

  11. On the Private Key tab, expand the Key options menu.

    Set the key size to 2048 and select the option to make the private key exportable.

    Click OK.

    Certificate Properties window showing the Private Key tab and the selected properties.

  12. When all of the certificate properties have been defined, click Next on the Certificate Enrollment wizard.

  13. Select a location to save the certificate request and a format. Browse to that location and specify a name for the .req file. The default format is base 64.

  14. Click Finish.

    Final step of certificate request wizard. Define the location and file format.

  15. A .req file is generated, which you must use to request a signed certificate.

Upload the .req file to receive a signed certificate in return

You must copy the entire text of the .req file, including the begin and end lines, and paste the text to the internal Active Directory Certificate Services certificate authority in the network. See Install Active Directory Certificate Services.

Unless your domain has only recently installed Active Directory Certificate Services, or it has been installed just for this purpose, you will need to submit this request following a separate procedure configured by your Domain Administration team. Please confirm this process with them before proceeding.

  1. Browse to the location of the .req file and open it in Notepad.

    Copy the entire file contents.

  2. Copy the entire contents of the file. This includes the dashed lines marking the beginning and the end of the Certificate Request.

  3. Open a web browser and enter the address of the internal CA, which should be located at: [ ip.ad.dr.ess/certsrv ].

    Where, ip.ad.dr.ess is the IP address or DNS name of the internal network AD CS host server.

    Internal CA site to upload our copied text from the .REQ file.

  4. Click the Request a certificate link.

  5. Click the advanced certificate request link.

    Advanced Certificate Request.

  6. Choose to Submit a certificate request by using a base-64-encoded CMC file.

    Base64 Cert Request

  7. Paste the contents of the .req file into the form. If it is required to select a Certificate Template, select Web Server from the Certificate Template list.

    Paste the entire .req file contents into the form.

  8. Click Submit.

    The site shows a message that the certificate will be issued in a few days.

    • Internal CA servers can be used to manually issue certificates

    • Make a note of the date and time when the certificate request was submitted

Issue certificates manually

You can issue certificates manually from the computer that hosts the Active Directory Certificate Services (AD CS).

  1. Open the Microsoft Management Console (MMC).

  2. Navigate to the Certificate Authority snap-in.

  3. Expand the Certificate Authority object.

    In the Pending Requests folder, right-click on the matching Request ID, and from the All Tasks list, select Issue.

    Issue a cert manually from the MMC Certificate Authority snapin.

  4. Open a browser and go to the Internal CA IIS site located at [ ip.ad.dr.ess/certsrv ].

    Click the View the status of a pending certificate request link.

    Click the View the status of a pending certificate request link to download the issued certificate.

  5. If the certificate has been issued, a link will be available on the resulting page that contains the date of the certificate request.

    Click the link with a date and time that matches the date and time that the certificate request was submitted.

  6. Select DER encoded, and download the certificate chain.

    Choose to download the DER encoded certificate chain.

  7. Browse to the downloads folder, right-click the certificate, and select Install Certificate from the shortcut menu.

  8. Accept the security warning if it appears.

    Select to install the certificate for the current user and click Next.

    Import Certificate Wizard

  9. Choose a store location. Select Place all certificates in the following store, and click the Browse button to open the Select Certificate Store window.

    Navigate to the Personal certificate store and click OK.

    Click Next.

    Choose a custom store - browse - choose the Personal folder.

  10. Finish the Certificate Import Wizard.

  11. Go to the Microsoft Management Console (MMC) certificates snap-in.

  12. In the console, browse to the personal store where the certificate is installed. Right-click on the certificate and select All Tasks > Manage Private Keys.

    All Tasks > Manage Private Keys...

  13. Add the account that is running the Milestone XProtect Management Server, Recording Server, or Mobile Server software to the list of users with permission to use the certificate.

    Make sure that the user has both Full Control and Read permissions enabled.

    By default, XProtect software uses the NETWORK SERVICE account.

    Add permission for NETWORK SERVICE to use certs

Enable server encryption for Management Servers and Recording Servers

Once the certificate is installed with the correct properties and permissions, do the following.

  1. On a computer with a Management Server or Recording Server installed, open the Server Configurator from:

    • The Windows Start menu

    or

    • The server manager, by right-clicking the server manager icon on the computer task bar
  2. In the Server Configurator, under Server certificate, turn on Еncryption.

  3. Click Select certificate to open a list with unique subject names of certificates that have a private key and that are installed on the local computer in the Windows Certificate Store.

  4. Select a certificate to encrypt communication between the recording server, management server, failover server, and data collector server.
  5. Select Details to view Windows Certificate Store information about the selected certificate.

    The Recording Server service user has been given access to the private key. It is required that this certificate is trusted on all clients.

    The encryption tab in the Server Configurator with enabled encyption and installed certificates.

  6. Click Apply.

When you apply certificates, the recording server will be stopped and restarted. Stopping the Recording Server service means that you cannot record and view live video while you are verifying or changing the recording server's basic configuration.