Securing PKI (AD CS)

TheNewGuy-0614 60 Reputation points
2025-05-28T20:45:21.5966667+00:00

Hello,

I was reading an old document about Securing PKI

https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn786443(v=ws.11)

as well as the built-in security group Cert Publishers

https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-groups#cert-publishers

But I do not find details on the actual RBAC model and who can do what or how to delegate specific things.

For example, a certificate template is marked as "Issuance Requirements / CA certificate manager approval":

  • What is the actual role, or least privilege role, needed for that?
  • Can it be delegated?

Thank you!

Windows for business | Windows Server | Directory services | Certificates and public key infrastructure (PKI)
{count} votes

1 answer

Sort by: Most helpful
  1. Chen Tran 1,645 Reputation points Independent Advisor
    2025-05-29T11:24:58.2633333+00:00

    Hello TheNewGuy-0614,

    Thank you for posting question on Microsoft Windows forum!

    Based on your query of proper RBAC model for ADCS, The followings are some key aspects of RBAC model for your reference.

    1. Define Roles and Permissions:
    • Identify the various roles involved in PKI management, such as Certificate Authority administrators, enrollment agents, and certificate users. Like below examples.
    • Certificate Authority Administrator -> Permissions to manage CA settings, issue certificates, revoke certificates, and manage templates. 
    • Enrollment Agent -> Permissions to register users and computers for certificate enrollment. 
    • Certificate User -> Permissions to enroll for and use certificates.

    2.Assign Roles to Groups:

    • Assign roles to groups, not individual users, to streamline administration and ensure consistent permissions across multiple users. 
    • Create an "Enrollment Agents" group and grant them the necessary permissions to enroll users for certificates.

    3.Implement Least Privilege:

    • Ensure that each role has only the minimum necessary permissions to perform their tasks. 
    • Avoid granting "Domain Admin" access to users who only need to manage certificates. 

    4.Regularly Review and Update:

    • Periodically review and update the RBAC model to ensure it aligns with the organization's evolving security needs and regulatory requirements. 
    • Regularly audit user access and remove unnecessary permissions.

    You can refer to the following useful articles for the best practice of RBAC as well as Delegating Active Directory PKI Permissions.

    Hope the above information is helpful!

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.