Many medium to large-scale companies deployed their own PKI Public Key Infrastructure system within their network to keep their infra secure. To keep their infra secure, companies will try deploying the certificates issued by the internal PKI on all the devices. Just deploying a digital certificate doesn’t work if the device is not signed with the root CA. It is mandatory to have the chain certificates (root CA and subordinate CA certificates) imported on all the machines to join the trusted internal network. Let’s look at the detailed procedure of how to import trusted root CA certificates from the internal certificate authority server.
The procedure showed here to import trusted root CA certificates will remain the same for the public certificates either. However, in the case of public certificates, the certificate provider will share the root CA certificate. But, what will you do with private PKI certificates? Two options will always be there, either you will get the root CA certificate from the internal PKI service team or you will have to download the root CA certificate yourselves from the internal PKI portal. To ease your process, we have covered the root CA certificate download process here before importing it into the trusted store on your machine.
Click on the ‘Download a CA certificate, certificate chain, or CRL’
You will see three options.1. Download CA certificate: Click on this option to download the certificate of the CA server that you have been accessing. If you log in to a root CA portal, you can download the root CA certificate from here. If you have been accessing any intermediate or subordinate CA portal, you will download the respective intermediate or subordinate CA certificate.
2. Download the CA certificate chain: This option will let you download the complete chain of certificates in the p7b archive. This is the recommended option as it downloads all the subordinate and root CA certificates for you.
3. Download the latest base CRL: This will not download any certificates. However, it will download the Certificate Revocation List of the CA server, which tells about the active, revoked, and expired certificates.
Here you can see the downloaded certificates. If you notice the certificate type, you can see two types of certificates are downloaded.1. The First file is just a single certificate as a cer file. You will get this from the first option in step 2.2. Is a p7b archive file with all the root and intermediate CA certificates obtained from the second option in step 2.
There are two ways to import root CA certificates to a Windows machine:1. Certificate Import Wizard2. MMC console
In the first method, just right-click on the downloaded certificate. Select ‘Install Certificate’
Certificate import wizard
Click Next in the certificate import wizard
2. Select certificate import store:
Select the second option and browse the Trusted Root Certificate Authorities store
3. Completing import root CA certificate process
Click Finish to complete the process.
Hit Win + R to open the Run utilityType mmc in the box.Press Ok.
Add Certificate Snap-in
Go to File > Add/Remove Snap-in..
2. Select Certificates and press Add
3. Select the User or Computer Certificate snap-in
Select the snap-in which you want to create the certificate. For demonstration we are choosing Compute account.Click Next.
4. Select Local Computer
Select the local computer as you are going to create CSR on the same computer.Click Finish.
5. Select Certificate (Local Computer) and click Ok
6. Load MMC
You will see the certificate in the personal store.
7. Import the certificate
Right-click on the Trusted Root Certificate Authority. Select All Task -> Import.
8. Certificate import wizard from MMC
Click Next.
9. Browse the root CA certificate
10. Select the certificate store
Select the second option and browse the Trusted Root Certificate Authorities store
11. Completing import root CA certificate process
Click Finish to complete the process.
This is how you can download and import the root CA certificate on the Windows machine from the internal Certificate Authority Server.
Thanks for reading the post. We believe this post has helped in importing root CA certificates on Windows machines.
You may also like these articles:
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.