Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home ยป Windows Server ยป Migrate Microsoft Enterprise Root Certification Authority and Forest Domain to Azure
  • PersonalHow to Create Symbolic Links in Linux
    All You Need to Know About Symbolic Links in Linux Linux
  • LDAP
    LDAP: What is Lightweight Directory Access Protocol Windows
  • Windows 11 default Icons
    Windows Desktop Icon: How to Make Default System Icons Visible Windows
  • djhfhjhg
    What is the difference between iDRAC, IPMI, and ILO Network | Monitoring
  • banner
    How to Edit Windows Hosts File via PowerToy Editor Utility Web Server
  • MBRGPT
    Run MBR and GPT conversion with the best GPT converter Windows
  • banner
    How to deploy Folder Redirection in Windows Windows
  • nonRDP admin
    Allow RDP access for non administrators: Add User to Remote Desktop Users Group in Active Directory Windows Server

Migrate Microsoft Enterprise Root Certification Authority and Forest Domain to Azure

Posted on 12/11/202518/11/2025 Link State By Link State No Comments on Migrate Microsoft Enterprise Root Certification Authority and Forest Domain to Azure
Microsoft Enterprise Root Certification Authority and Forest Domain to Azure migration

Hello everyone, welcome to the second chapter on Migrating Active Directory Certificate Service (Certification Authority) technology. This article discusses the step-by-step to Microsoft Enterprise Root Certification Authority and Forest Domain Domain to Azure (Migrate Root CA and AD Domain to Azure). Please, see “Understanding User Roles & Access Control in Object First OOTBI“, and how to create a backup job for Proxmox VMs using VBR.

Table of contents

  • 1. Hybrid Planning
  • 2. Hybrid execution
    • 3. On-Premises Retirement
    • New Domain Controller VM on Azure
    • Provisioning a Certification Authority (CA) on a Virtual Machine
    • RDP Configuration and Security
  • Configure Point-to-Site VPN VPN (P2S)
    • Transferring Multiple FSMO Roles at Once
    • Install CA Roles
    • AD CS Configuration NDES and CES
    • Restore Certificate Database and Its Configuration
    • Configure new CRL & CDP
    • Troubleshooting and fix error during IPSEC SCEP certificate enrolment

The migration of Active Directory (AD) and Certification Authority (CA) to Azure consists of three key phases: Hybrid Planning, Hybrid Execution, and On-Premises Retirement. See Unveiling OOTBI Mini and New Features for v1.7 from Object First.

1. Hybrid Planning

Secure network connectivity (Point-to-Site VPN) is established between the local environment and an Azure VNet. A hybrid strategy is decided upon, extending the existing AD to Azure via Azure AD Connect and virtual machines (VMs) that will become Domain Controllers (DCs) in Azure (IaaS solution).

Please, see how to migrate Windows Servers from Hyper V to Proxmox Correctly, and Hyper V Disk allocation: Why Veeam reports full size after Shrinking.

2. Hybrid execution

Active Directory: Create a new DC as a VM in Azure and promote it within the existing domain. Proceed with verifying the AD replica and migrating the FSMO roles.

Certification Authority: Create a new CA server in Azure.

Certification Authority (CA) (On prem): Back up the on-premises CA (private keys and database) and restore it to a new server/DC in Azure. Update the CRL (Certificate Revocation List) distribution points to reflect the new paths in Azure.

Please, see Restore VM to Original location using Veeam Entire VM restore, Video Remoting was disconnected on Hyper V, and how to Fix Authentication failed: Invalid credential after installing VSA

3. On-Premises Retirement

Verify full functionality of Azure-certified authentication and services. Finally, demote the Domain Controllers and uninstall the CA role from the local environment, completing the migration and optimising cloud services.

New Domain Controller VM on Azure

First step create new Domain Controller VM on Azure

image

Check the functionality of Windows Server 2022 Datacenter: Azure Edition hotpatch.

I left RDP enabled from the public because in my case I need to reach the Domain Controller server through my on-premises infrastructure, and it will be protected with an NSG rule that only trusts the company’s IP address, as per security best practices.

image003-min

Disk

image005-min

Creating an additional disk for system state backup.

image007-min

proceed to the next window.

image009-min

Create new Azure Vnet & Subnet dedicate Domain Controller And CA

image011-min

Configure the Orchestration patch without rebooting

image013-min

TAG Configure tags according to company policy

image015-min

Configuration of the new VM Domain Controller completed. Next step: Set up new VM dedicated to CA

image017-min

Check the functionality of Windows Server 2022 Datacenter: Azure Edition hotpatch.

I left RDP enabled from the public because in my case I need to reach the CA server through my on-premises infrastructure, and it will be protected with an NSG rule that only trusts the company’s IP address, as per security best practices.

image019-min

Disk

image021-min

Assigning VNet\Subnet

image023-min

Provisioning a Certification Authority (CA) on a Virtual Machine

When provisioning the Virtual Machine (VM) that will host the Certification Authority (CA), it is essential ( in my case) to assign a public IP address (PIP).

This allocation is necessary to ensure that the certificate issuance and revocation service is publicly accessible and usable via this network interface.

Please, see OOTBI Security Best Practices: Enable Honeypot on Object First, and Unknown Error occurred when installing Veeam Software Appliance.

Network Security Group (NSG) configuration

In a subsequent phase, the Network Security Group (NSG) associated with the VM will be configured.

The NSG will be implemented with highly restrictive access rules (Inbound Security Rules) that will allow connectivity to the service only from the source public IP address ranges specifically authorised to interact with the CA. This ensures strict network segmentation and minimises the attack surface.

image

Default setting for Management\Monitoring\Advanced. TAG Configure tags according to company policy

image025-min

Finalise the creation of the VM CA

image027-min

RDP Configuration and Security

The exposure of the RDP service to the Internet environment was implemented through a Network Security Group (NSG).

This NSG was configured to allow Remote Desktop Protocol (RDP) access to the Virtual Machine (VM), limiting the source of traffic to the company’s public IP address (PIP) only.

image

Key Points

  • Exposed Service: Remote Desktop Protocol (RDP).
  • Target: Virtual Machine (VM).
  • Security Mechanism: Network Security Group (NSG).
  • Access Rule (Inbound): Allowlisting of the company’s public IP (PIP) for RDP access.
  • Purpose: Remote access and monitoring of the VM.

This configuration ensures that RDP access is only allowed from a trusted and predefined source, reducing the attack surface compared to indiscriminate RDP openness.

Please, see How to Install and configure Active Directory Certificate Services, and how to Import certificates into Trusted Root and Personal certificate store.

Configure Point-to-Site VPN VPN (P2S)

It is possible to create two types of VPN on Azure STS & PTS. In my case, a Point-to-Site IPSec VPN was created. Please, see this guide for more information.

Purpose: to promote the domain controller on Azure and replicate the Active Directory Forest/Domain.

  • Step 1: Create a Virtual Network
  • Step 2: Configuring the VPN Gateway
  • Step 3: Creating the Root Certificate
  • Step 4: Configuring the Point-to-Site connection
  • Step 5: Connect to the VPN

Step 1: Create a Virtual Network

I used the Vnet I had previously created for the new production infrastructure on Azure, and created the corresponding Gateway subnet.

image029-min

Add subnet

image031-min

Subnet added successfully

image033-min

Please, see Import certificates into Trusted Root and Personal certificate store, how to Install ROOT CA Enterprise and NPS Wifi Certificate, and “Change your root password: Manage the root user on your macOS“.

Step 2: Configuring the VPN Gateway

Create Virtual Network Gateway

image035-min

Enter the basic details

image037-min

Keep populating as you wish

image039-min

Virtual Network Gateway created

image041-min

Deployment VNG complete

image042-min

Check Vnet1GW proprieties Virtual Network Gateway

image044-min

Please, see How to Resize or Expand Proxmox Hard Drive, and Offline and Online Update for Object First Out-of-the-Box Cluster.

Step 3: Creating the Root Certificate

The next step is generating a root and client certificates for your P2S connection. I connected to my Onprem Domain Controller via RDP to create the preliminary certificate for the Point to Site VPN. Here is the Powershell command for generate root & client certificate

# Our root certificate
$cert = New-SelfSignedCertificate -Type Custom -KeySpec Signature -Subject "CN=AchrafRootCertificate002" -KeyExportPolicy Exportable -HashAlgorithm sha256 -KeyLength 2048 -CertStoreLocation "Cert:\CurrentUser\My" -KeyUsageProperty Sign -KeyUsage CertSign
# Our client certificate
New-SelfSignedCertificate -Type Custom -DnsName ClientAchrafCertificate -KeySpec Signature -Subject "CN=ClientAchrafRootCertificate002" -KeyExportPolicy Exportable -HashAlgorithm sha256 -KeyLength 2048 -CertStoreLocation "Cert:\CurrentUser\My" -Signer $cert -TextExtension @("2.5.29.37={text}1.3.6.1.5.5.7.3.2")
image046-min

Export certificate

image048-min

Choose the “No, do not export the private key”.

image050-min

Select the below option “Base-64 …)

image052-min

Enter export location

image054-min

Export complete

image056-min

Please, see “Configure VPN on Windows Server: How to allow remote VPN Access for Domain or Local Users, and Add Synology NFS Storage to Proxmox VE for VMs and Backups“.

Step 4: Configuring the Point-to-Site connection

Populate the with the details as you wish based on your environment.

image058-min

After completing the Point-to-Site VPN configuration, download the VPN client to install on the Domain Controller.

image060-min

Step 5: Connect to the VPN

Download and Installing the VPN client on the Domain Controller and connect to VPN

image062-min

VPN Added

image064-min

Connect to Azure VPN

image066-min

Now that we have established the VPN from the OnPrem Domain Controller to Azure, we can proceed to run DCpromo on the Azure VM.

Please, see How to setup Veeam Software Appliance v13, and Troubleshooting WinRM and Kerberos Delegation for WAC.

DC promo on VM Azure

Run DCpromo on the VM in Azure

image068-min

Check that replication has completed successfully with the command

#Open cmmd Administrator
repadmin /replsum

Check FSMO roles.

netdom query fsmo
image

Transferring Multiple FSMO Roles at Once

Please, see Move-ADDirectoryServerOperationMasterRole. It is possible to transfer several operation master roles at once:

Move-ADDirectoryServerOperationMasterRole -Identity dc2 โ€“OperationMasterRole DomainNamingMaster,PDCEmulator,RIDMaster,SchemaMaster,InfrastructureMaster

TIPS: After moving the FSMO roles, verify that the change has been implemented. As a best practice, the Forest and Domain FSMO roles should be divided between two different Domain Controllers.

Alternative method

FSMO Role Names and Numeric Values

image
Move-ADDirectoryServerOperationMasterRole -Identity dc2 โ€“OperationMasterRole 0,1,2,3,4

Please, see Setup Windows Admin Center Modern Gateway for Single Sign-On, What is taking up by Synology NAS Volume Space, and download and update Synology DiskStation NAS to DSM 7.3.

Enterprise Certification Authority Migration

Notes: To move a CA from a server that is running Windows 2000 Server to a server that is running Windows Server 2003, you must first upgrade the CA server that is running Windows 2000 Server to Windows Server 2003. Then you can follow the steps that are outlined in this article. Please, see how to move a certification authority to another server.

Notes: The new server must have the same computer name as the old server.

Backup CA use the Certification Authority snap-in to back up the CA database and private key.

To do this, open On-Prem CA

image070-min

Backup your old Ent Root CA

image071-min

Select items to backup

image073-min

Protect your CA DB and private key

image

Export certificate from Registry

image079-min

Choose the location and apply

image

After backup the CA, first step is remove and uninstall role & feature from Old CA

image082-min

First uninstall

NDES  โ€œNetwork Device Enrollmentโ€

image084-min

Let us proceed with the removal of the all remaining CA roles

image086-min

image088-min

image090-min

Install CA Roles

Now let’s proceed to the new CA server (it is recommended that the new CA server have the same FQDN as the old CA).

image094-min

Select Role service and configure

image096-min

image098-min

Choose the Enterprise CA

image100-min

Here, select Root CA

image102-min

Specify the type of the private key

image104-min

Import existing certificate

image106-min

image108-min

Check imported certificate private key

image110-min

Confirm path logs certificate Database

image112-min

Click on Configure

image

AD CS Configuration NDES and CES

In my case, I need to use and configure the NDES and CES roles. Let’s proceed.

image116-min

Populate the RA Certificate

image118-min

Configure cryptography for NDES

image120-min

Configure CA Certifcate Enrollment We Service (CES)

image122-min

Select the type Authentication

image124-min

Specify the service account

image

Please, see Add additional CC400W Cameras to Synology Surveillance Station, and Update Veeam Backup for Proxmox Plugin to support PVE 9.0.

Server Certificate

Specify a Server Auth Certificate

image128-min

Recap wizard confirmation

image130-min

Result window as shown below.

image132-min

Restore Certificate Database and Its Configuration

After configuring the new Ent Root CS, proceed with restoring the database.

image134-min

Select the All tasks and then the restore CA as shown below.

image136-min

Click on OK

image137-min

Proceed to select the CA backup previously performed.

image139-min

Enter the password entered to protect the CA backup

image141-min

Restore operation

image143-min

Post restore check your issued certificate

image145-min

Please, see How to update Proxmox VE 9.0 now Supported by Veeam, and Logon Failure: User has not been granted the requested logon type.

Configure new CRL & CDP

Create dir: C:\Dati

image147-min

Add the CA computer object to the share permission

image151-min

Add computer  CA on full permissions

image

Create CRLD

Go to IIS of the your CA and create a new Virtual Directory for CRL

image157-min

Enter the Alias and Path and click on OK

image158-min

Configure โ€œDirectory Browsingโ€ on Virtual Directory CRLD

image160-min

Configure โ€œDirectory Browsingโ€ on Virtual Directory CRLD

image162-min

Section drop-down list, choose system.webServer/security/requestFiltering.

In the allowDoubleEscaping drop-down list, choose True

image164-min

Configuration editor

image166-min

Copy   crl files from C:\Windows\System32\certsrv\CertEnroll to C:\Dati

image168-min

Copied as shown below

image170-min

Go to CA console dx and click โ€œProprietiesโ€

image172-min

Add new CRL Location

image174-min

Compose a new string for the CRL location and press โ€˜Insertโ€™

image175-min

Restart CA service

image177-min

Check pkiview for new CRL Location

image179-min

Verify the CRL File Exists and is Accessible via IIS

image181-min

Please, see Server Certificate could not be updated: Private key does not match, Fix Error 0x87E10BC6 on a PC running Windows non-core Edition, and What to know about โ€œFailed to perform Veeam Worker Upgradeโ€.

Troubleshooting and fix error during IPSEC SCEP certificate enrolment

You donโ€™t have sufficient permission to Enroll whit SCEP

image183-min

Order of handler mappings is not correct. If the previous methods have not been successful, the order of the handler mappings should be checked.

To do this, navigate to the Default Web Site in the IIS Management Console and click on “View Applications” on the right-hand side

image185-min

NDES splits into two applications:

  • The interface for requesting one-time passwords (mscep_admin).
  • The interface for requesting the certificates (mscep).

The following steps must be performed consecutively for both applications

image187-min

After double-clicking the application, the “Handler Mappings” option is selected.

image189-min

View Ordered List” is selected on the right side.

image191-min

The “StaticFile” handler must be placed above the ” ExtensionlessUrlHandler-ISAPI-4.0_64bit”

image193-min

NDES must then be restarted using the iisreset command.

image195-min

Open browser am go this link http://localhost/CertSrv/mscep_admin/. Try enrolling a new IPsec certificate again.

image197-min

The migration is complete. I hope you found this article on “Migrate Microsoft Enterprise Root Certification Authority and Forest Domain Domain to Azure (Migrate Root CA and AD Domain to Azure). very useful. Please, feel free to leave a comment below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
AWS/Azure/OpenShift, Windows Server Tags:Azure, Azure Active Directory, Azure AD, Azure AD & Root CA Migration, Azure Migration: Root CA & AD Domain, Certification Authority (CA) on a Virtual Machine, Configure Point-to-Site VPN VPN (P2S), Create a Virtual Network, Domain Controller VM on Azure, Entra ID, Migrate Forest Domain Domain, Migrate Microsoft Enterprise Root Certification Authority, Migrate Root CA and AD Domain to Azure, Move Enterprise Root CA to Azure, Open, Root CA and AD Migration to Azure

Post navigation

Previous Post: Unveiling OOTBI Mini and New Features for v1.7 from Object First
Next Post: Integrate Active Directory with IPMI for Out-of-Band Management

Related Posts

  • image 73
    How to manage and use Amazon S3 access points using the AWS Management Console AWS/Azure/OpenShift
  • add subheading 5 4
    Access EC2 Linux Instance via the Password AWS/Azure/OpenShift
  • dc
    Fix MDT accidental OS deletion Windows Server
  • maxresdefault 2 6
    How to create an AMI from the Command line AWS/Azure/OpenShift
  • group
    How to update PowerShell and Package Management via Group Policy Object Windows Server
  • WCD
    Join Bulk Devices using a Provisioning Package to Azure AWS/Azure/OpenShift

More Related Articles

image 73 How to manage and use Amazon S3 access points using the AWS Management Console AWS/Azure/OpenShift
add subheading 5 4 Access EC2 Linux Instance via the Password AWS/Azure/OpenShift
dc Fix MDT accidental OS deletion Windows Server
maxresdefault 2 6 How to create an AMI from the Command line AWS/Azure/OpenShift
group How to update PowerShell and Package Management via Group Policy Object Windows Server
WCD Join Bulk Devices using a Provisioning Package to Azure AWS/Azure/OpenShift

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a
ย 
  • PersonalHow to Create Symbolic Links in Linux
    All You Need to Know About Symbolic Links in Linux Linux
  • LDAP
    LDAP: What is Lightweight Directory Access Protocol Windows
  • Windows 11 default Icons
    Windows Desktop Icon: How to Make Default System Icons Visible Windows
  • djhfhjhg
    What is the difference between iDRAC, IPMI, and ILO Network | Monitoring
  • banner
    How to Edit Windows Hosts File via PowerToy Editor Utility Web Server
  • MBRGPT
    Run MBR and GPT conversion with the best GPT converter Windows
  • banner
    How to deploy Folder Redirection in Windows Windows
  • nonRDP admin
    Allow RDP access for non administrators: Add User to Remote Desktop Users Group in Active Directory Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,841 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright ยฉ 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.