Skip to content

Root CA Setup

SettingValue
VM ID310
Hostnamesrv-rca-zrh-01
IP10.30.30.20
OSWindows Server 2025
DomainWORKGROUP (not domain-joined!)
Start at bootNO
Terminal window
New-NetIPAddress -InterfaceAlias "Ethernet" -IPAddress 10.30.30.20 -PrefixLength 24 -DefaultGateway 10.30.30.1
Set-DnsClientServerAddress -InterfaceAlias "Ethernet" -ServerAddresses 10.30.30.15
Rename-Computer -NewName "srv-rca-zrh-01" -Restart

Create C:\Windows\CAPolicy.inf BEFORE installing AD CS:

[Version]
Signature="$Windows NT$"
[Certsrv_Server]
RenewalKeyLength=4096
RenewalValidityPeriod=Years
RenewalValidityPeriodUnits=20
CRLPeriod=Weeks
CRLPeriodUnits=52
CRLDeltaPeriod=Days
CRLDeltaPeriodUnits=0
LoadDefaultTemplates=0
[CRLDistributionPoint]
URL=http://pki.microsoftlab.ch/crl/%3.crl
[AuthorityInformationAccess]
URL=http://pki.microsoftlab.ch/aia/%3.crt
VariableDescriptionResult
%3CA NameMicrosoftLab Root CA 01
CRL: http://pki.microsoftlab.ch/crl/MicrosoftLab Root CA 01.crl
AIA: http://pki.microsoftlab.ch/aia/MicrosoftLab Root CA 01.crt
Terminal window
# Install role
Install-WindowsFeature AD-Certificate -IncludeManagementTools
# Configure Root CA
Install-AdcsCertificationAuthority `
-CAType StandaloneRootCA `
-CACommonName "MicrosoftLab Root CA 01" `
-KeyLength 4096 `
-HashAlgorithmName SHA256 `
-CryptoProviderName "RSA#Microsoft Software Key Storage Provider" `
-ValidityPeriod Years `
-ValidityPeriodUnits 20 `
-Force
Terminal window
# Create export folder
New-Item -Path "C:\RootCA-Export" -ItemType Directory -Force
# Copy files
Copy-Item "C:\Windows\System32\CertSrv\CertEnroll\*.crt" "C:\RootCA-Export\"
Copy-Item "C:\Windows\System32\CertSrv\CertEnroll\*.crl" "C:\RootCA-Export\"
# Verify
Get-ChildItem "C:\RootCA-Export"

After exporting certificate and CRL:

Terminal window
Stop-Computer -Force

Important: Root CA should remain offline. Only start for CRL renewal (annually).