Forum Discussion
Multiple CA on same domain
We're about to deploy a new two-tier Windows PKI in domain which already has a 1-tier Enterprise CA and wonder of possible impacts on the current configurations.
Devices and Users are auto-enrolling with the current CA through GPO and what can be the impact of the new CA ? How will the users get the certificate from the old or the new CA selectively? Is it just managed by the template's security settings, which by default allow authenticated users/devices to enroll?
What sort of impact can we expect ?
thanks
1 Reply
Deploying a new two-tier PKI (offline Root CA + issuing CA) in a domain that already has a one-tier Enterprise CA is fully supported, but behavior depends entirely on how templates and enrollment are configured.
There is no automatic “switch” of enrollment from the old CA to the new CA. Auto-enrollment is driven by certificate templates and template permissions.
Here’s how it works in practice:
Auto-enrollment logic
When a user or device performs auto-enrollment, the client:
- Queries AD for available certificate templates
- Checks which templates it has permission to enroll in
- Contacts an Enterprise CA that has that template published
If both CAs publish the same template and permissions allow enrollment, clients may enroll against either CA. That can lead to unexpected certificate issuance.
Key control mechanisms
Enrollment behavior is controlled by:
- Template security permissions
If Authenticated Users (or Domain Computers) have Enroll permission on both templates on both CAs, enrollment is possible on either. - Template publication on the CA
Even if a template exists in AD, it will only issue from CAs where the template is explicitly published. - Template duplication
Best practice in migration scenarios is:
- Duplicate templates for the new CA
- Publish new templates only on the new issuing CA
- Remove old templates from the legacy CA
This gives you deterministic control.
What impact can you expect?
- Duplicate certificates
If both CAs issue the same template, clients may end up with certificates from both CAs. - Trust chain changes
With a two-tier PKI, the certificate chain now includes:
Offline Root → Issuing CA → End-entity certificate
Make sure:
- The new root certificate is trusted in AD
- The CRL distribution points are reachable
- AIA and CDP are correctly configured
- Auto-enrollment refresh behavior
Existing certificates will not automatically “move” to the new CA. Certificates are renewed based on template settings and renewal thresholds.
If you want a controlled migration:
Recommended approach
- Deploy the new two-tier PKI fully
- Publish new templates only on the new issuing CA
- Remove enrollment permissions from old templates
- Force auto-enrollment refresh via GPO or certutil
- Gradually decommission the old CA once certificate lifetimes expire
Important question
Are you replacing the current CA or running both in parallel long-term?
If replacing, you must plan for:
- Certificate lifetime overlap
- Revocation strategy
- CRL/AIA continuity
- Template migration
If running both in parallel without strict template control, you risk nondeterministic enrollment.
In summary:
Auto-enrollment is governed by template permissions and publication on specific CAs. Without careful template and publication control, clients may enroll from either CA.