The section describes the tasks to install and configure AD CS.Documentation Index
Fetch the complete documentation index at: https://docs.futurex.com/llms.txt
Use this file to discover all available pages before exploring further.
Install AD CS
Install AD CS, unless you want to set up a standalone CA. Perform the following steps to install AD CS:Select Start > Administrative Tools > Server Manager and then Manage. Select Add roles and features.
Choose one of the following installation types: Role-based installation or feature-based installation. Select [ Next ].
In the Server Selection window, select the server from the domain (or local machine) on which to install AD CS. Select [ Next ].
In the Server Roles window, select the checkbox next to Active Directory Certificate Services. Select [ Next ] and [ Add Features ].
Configure AD CS
Perform the following steps to configure the new AD CS installation with a Public Key Infrastructure (PKI):If you haven’t installed Active Directory yet, install it before proceeding, unless this is a standalone CA.
In the Select Role Services window, select Certificate Authority to enable the management and issuance of certificates, and select [ Next ].
In the Specify Setup Type window, you must set the Type. The type designates the kind of certificate authority server and depends on your business requirements. Select either Enterprise or Standalone.
- Enterprise CAs are integrated with Active Directory.
- Standalone CAs conduct operations offline.
In the Specify CA Type window, select Root or Subordinate.
- Select Root if you have not yet created a PKI.
- Select Subordinate if you are integrating with an existing PKI.
In the Set Up Private Key window, select Use existing private key or Create a new private key.
- Select Use existing private key if you have integrated this CA with the Futurex hardware previously and the private key already exists on the KMES Series 3 (for example, this is a reinstallation of the CA server). Then, choose Select an existing private key on this computer and proceed to Step 9.
- If this is a new CA, select Create a new private key and proceed to Step 8.
If you selected Create a new private key, perform the following steps:
- In the Configure Cryptography for CA window, choose Futurex FXCL KMES CNG from the drop-down menu.
- Select a key character length: 2048, 3072, or 4096.
- Select a hash algorithm from the drop-down menu: SHA-1, SHA-256, or SHA-512.
- Select [ Next ] and proceed to Step 10.
Checking Allow administrator interaction when the private key is accessed by the CA has no effect.
If you selected Use existing private key, perform the following steps:
- In the Existing Key window, change the Cryptographic provider to Futurex FXCL KMES CNG.
- Clear the common name field and select [ Search ]. Locate the key you want to use from the search results.
- Select [ Next ] and proceed to Step 10.
Checking Allow administrator interaction when the private key is accessed by the CA has no effect.
If you selected Root CA in step 6, the Set the Certificate Validity Period page opens. Designate the default validity for the root CA and select [ Next ].
If you selected Subordinate CA in step 6, the Certificate Request page opens. Perform the following optional tasks:
- You can choose a parent CA instance of AD CS on your domain to issue you a certificate.
- You can save a certificate request to file and have it signed by an external CA.

