%3CLINGO-SUB%20id%3D%22lingo-sub-1128613%22%20slang%3D%22en-US%22%3EBacking%20up%20Windows%20Server%202008%20ADCS%20CA%20Keys%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1128613%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSTRONG%3E%20First%20published%20on%20TECHNET%20on%20Aug%2006%2C%202010%20%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CSPAN%20style%3D%22font-family%3A%20arial%2Chelvetica%2Csans-serif%3B%22%3E%20%3CSPAN%20style%3D%22font-size%3A%20small%3B%22%3E%20%3CSPAN%20style%3D%22font-size%3A%20small%3B%22%3E%20%5BEDIT%202%2F20%2F2012%5D%20This%20problem%20has%20recently%20been%20resovled%20in%20a%20hotfix%20update.%20%3CSTRONG%3ES%20%3C%2FSTRONG%3E%20%3C%2FSPAN%3E%20%3C%2FSPAN%3E%20%3C%2FSPAN%3E%20%3CSTRONG%3E%20ystem%20state%20backup%20does%20not%20include%20CA%20private%20keys%20in%20Windows%20Server%202008%20or%20in%20Windows%20Server%202008%20R2%20-%20%3C%2FSTRONG%3E%20%3CA%20href%3D%22http%3A%2F%2Fsupport.microsoft.com%2Fkb%2F2603469%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%20http%3A%2F%2Fsupport.microsoft.com%2Fkb%2F2603469%20%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CSPAN%20style%3D%22font-family%3A%20arial%2Chelvetica%2Csans-serif%3B%22%3E%20%3CSPAN%20style%3D%22font-size%3A%20small%3B%22%3E%20%3CSPAN%20style%3D%22font-size%3A%20small%3B%22%3E%20Backing%20up%20a%20Windows%20Server%202008%20(Including%202008%20R2)%20Certification%20Authority%20(ADCS)%20involves%20a%20few%20extra%20steps%20compared%20to%20earlier%20versions%20of%20Windows.%20Windows%20Server%202008%20incorporates%20a%20change%20to%20how%20the%20underlying%20private%20key%20store%20is%20maintained%20and%20linked%20in%20the%20file%20system.%20T%20%3C%2FSPAN%3E%20he%20private%20key%20is%20now%20stored%20in%20the%20hidden%20folder%20structure%20%22%25systemdrive%25%5CProgramData%5CMicrosoft%5CCrypto%5CKeys%22%20which%20is%20linked%20and%20accessible%20via%20%22%25systemdrive%25%5Cusers%5Call%20users%5Cmicrosoft%5Ccrypto%5Ckeys%22.%20As%20a%20result%20of%20this%20change%2C%20System%20State%20Backups%20will%20no%20longer%20include%20the%20ADCS%20private%20keys.%20It%20is%20recommended%20that%20the%20CA%20keys%20are%20backed%20up%20to%20ensure%20you%20can%20properly%20recover%20a%20failed%20Certification%20Authority%20or%20to%20migrate%20to%20a%20new%20computer.%20In%20addition%20to%20regular%20System%20State%20Backups%2C%20we%20recommend%20you%20back%20up%20the%20CA%20keys%20using%20one%20of%20the%20following%20methods%3A%20%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CUL%3E%0A%3CLI%3E%3CBR%20%2F%3E%3CDIV%20class%3D%22MsoNormal%22%20style%3D%22margin%3A%200in%200in%200pt%3B%22%3E%3CSPAN%20style%3D%22font-family%3A%20arial%2Chelvetica%2Csans-serif%3B%22%3E%20%3CSPAN%20style%3D%22font-size%3A%20small%3B%22%3E%20From%20a%20command%20prompt%20on%20the%20Certification%20Authority%2C%20perform%20a%20full%20CA%20backup%20by%20using%20the%20command%20%3CSTRONG%3E%20certutil%20%E2%80%93backupKey%20%3CDESTINATION%20folder%3D%22%22%3E%20%3C%2FDESTINATION%3E%3C%2FSTRONG%3E%20.%20You%20will%20be%20prompted%20for%20a%20password%20to%20assign%20to%20the%20CA%20key%20p12%20file.%20%3CBR%20%2F%3E%3C%2FSPAN%3E%20%3C%2FSPAN%3E%3C%2FDIV%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CUL%3E%0A%3CLI%3E%3CBR%20%2F%3E%3CDIV%20class%3D%22MsoNormal%22%20style%3D%22margin%3A%200in%200in%200pt%3B%22%3E%3CSPAN%20style%3D%22font-family%3A%20arial%2Chelvetica%2Csans-serif%3B%22%3E%3CSPAN%20style%3D%22font-family%3A%20arial%2Chelvetica%2Csans-serif%3B%22%3E%20%3CSPAN%20style%3D%22font-size%3A%20small%3B%22%3E%20By%20using%20the%20Certification%20Authority%20Administrative%20Tool%20MMC%2C%20right%20click%20the%20CA%2C%20All%20Tasks%20%2C%20Backup%20CA%20.%20The%20wizard%20will%20prompt%20you%20to%20select%20the%20Private%20Key%20to%20back%20up%20and%20a%20password%20to%20assign%20to%20the%20key.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FSPAN%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3C%2FDIV%3E%0A%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%3CSPAN%20style%3D%22font-size%3A%2010pt%3B%22%3E%20%3CSPAN%20style%3D%22font-family%3A%20arial%2Chelvetica%2Csans-serif%3B%22%3E%20%3CSPAN%20style%3D%22font-size%3A%20small%3B%22%3E%20In%20either%20case%2C%20the%20p12%20file%20that%20is%20created%20is%20the%20life-blood%20of%20the%20Certification%20Authority.%20It%20should%20be%20kept%20in%20a%20secure%20and%20controlled%20location%20as%20access%20to%20the%20p12%20file%20and%20associated%20password%20could%20enable%20unauthorized%20users%20to%20create%20and%20utilize%20certificates%20in%20your%20environment.%20This%20is%20the%20same%20security%20requirement%20prior%20to%20Windows%20Server%202008%20System%20State%20Backups%2C%20as%20they%20contained%20the%20private%20key%20material%20as%20well.%20The%20CA%20keys%20should%20be%20backed%20up%20anytime%20the%20CA%20keys%20are%20renewed%20or%20reissued.%20%3C%2FSPAN%3E%20%3C%2FSPAN%3E%20%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEDITED%208%2F19%2F2010%3A%20Clarified%20that%20this%20applies%20to%20both%20Windows%20Server%202008%20and%202008%20R2.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20class%3D%22MsoNormal%22%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1128613%22%20slang%3D%22en-US%22%3E%3CP%3EFirst%20published%20on%20TECHNET%20on%20Aug%2006%2C%202010%20%5BEDIT%202%2F20%2F2012%5D%20This%20problem%20has%20recently%20been%20resovled%20in%20a%20hotfix%20update.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1128613%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EPKI%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

First published on TECHNET on Aug 06, 2010

[EDIT 2/20/2012] This problem has recently been resovled in a hotfix update. S ystem state backup does not include CA private keys in Windows Server 2008 or in Windows Server 2008 R2 - http://support.microsoft.com/kb/2603469

 

 

 

 

 

Backing up a Windows Server 2008 (Including 2008 R2) Certification Authority (ADCS) involves a few extra steps compared to earlier versions of Windows. Windows Server 2008 incorporates a change to how the underlying private key store is maintained and linked in the file system. T he private key is now stored in the hidden folder structure "%systemdrive%\ProgramData\Microsoft\Crypto\Keys" which is linked and accessible via "%systemdrive%\users\all users\microsoft\crypto\keys". As a result of this change, System State Backups will no longer include the ADCS private keys. It is recommended that the CA keys are backed up to ensure you can properly recover a failed Certification Authority or to migrate to a new computer. In addition to regular System State Backups, we recommend you back up the CA keys using one of the following methods:

 

 

 

 




    • From a command prompt on the Certification Authority, perform a full CA backup by using the command certutil –backupKey <destination folder> . You will be prompted for a password to assign to the CA key p12 file.

 


    • By using the Certification Authority Administrative Tool MMC, right click the CA, All Tasks , Backup CA . The wizard will prompt you to select the Private Key to back up and a password to assign to the key.

       



In either case, the p12 file that is created is the life-blood of the Certification Authority. It should be kept in a secure and controlled location as access to the p12 file and associated password could enable unauthorized users to create and utilize certificates in your environment. This is the same security requirement prior to Windows Server 2008 System State Backups, as they contained the private key material as well. The CA keys should be backed up anytime the CA keys are renewed or reissued.

 

 

EDITED 8/19/2010: Clarified that this applies to both Windows Server 2008 and 2008 R2.