Step-By-Step: Migrating Active Directory Certificate Service From Windows Server 2008 R2 to 2019

Published 05-13-2021 03:01 AM 3,448 Views
Microsoft

Windows Server 2008 R2 achieved end of support via Microsoft on January 14th 2020. In a previous post, steps were detailed on Active Directory Certificate Service migration from 2008 R2 to 2019 but required the new Windows Server 2019 server to have the same name as the previous 2008 R2 server.  Many of you have reached out asking for an update of the steps to reflect Active Directory Certificate Service migration from 2008 R2 to 2016 / 2019 containing a different name.  A solution has been found and tested with repeatable steps shared below.

 

NOTE: The following was tested in a lab environment. While the solution was successful it may not reflect your organization's current setup. Please test the steps below in a lab environment prior to implementing on production.

 

Step 1: Backup Windows Server 2008 R2 certificate authority database and its configuration
 

  1. Log in to Windows 2008 R2 Server as member of local administrator group
  2. Go to Start > Administrative Tools > Certificate Authority
  3. Right Click on Server Node > All Tasks > Backup CA
     
    Certification Authority Backup CACertification Authority Backup CA
     
  4. Click Next on the Certification Authority Backup Wizard screen
  5. Click both check boxes to select both items to backup and provide the backup path for the file to be stored
     
    Certification Authority Backup Wizard Item SelectionCertification Authority Backup Wizard Item Selection
     
  6. Click Next
  7. Provide a password to protect private key and CA certificate file and click on next to continue
  8. Click Finish to complete the process

Step 2: Backup CA Registry Settings

 

  1. Click Start > Run > type regedit and click OK
  2. Expand the key in following path: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc
  3. Right click on the Configuration key and click Export
  4. Provide a name, save the backup file and then click on save to complete the backup
     
    Backup CA Registry SettingsBackup CA Registry Settings

Backup of the Certificates is now complete and the files can now be moved to the new Windows 2016 / 2019 server.

 

CA Backup completeCA Backup complete

 

Step 3: Uninstall CA Service from Windows Server 2008 R2

 

  1. Navigate to Server Manager
  2. Click Remove Roles under Roles Summary to start the Remove Roles Wizard, and then click Next
     
    Uninstalling a CAUninstalling a CA

  3. Click to clear the Active Directory Certificate Services check box and click Next
     
    Removing Active Directory Certificate ServicesRemoving Active Directory Certificate Services
     
  4. Click Remove on the Confirm Removal Options page
  5. If Internet Information Services (IIS) is running and you are prompted to stop the service before you continue with the uninstall process, click OK
  6. Click Close
  7. Restart the server to complete the uninstall

Step 4: Install Windows Server 2016 / 2019 Certificate Services

 

*NOTE: The screenshots below show the server name as WS2019 to highlight which server we are working on. This step-by-step highlights screenshots from Windows Server 2019. Windows Server 2016 process is the same with similar screenshots
 

  1. Log in to Windows Server 2019 as Domain Administrator or member of local administrator group
  2. Navigate to Server Manager > Add roles and features
  3. Click on next to continue in the Add Roles and features Wizard
  4. Select Role-based or Feature-based installation and click next
  5. Keep the default selection from the server selections window and click next
     
    Windows Server 2019 Server SelectionsWindows Server 2019 Server Selections
     
  6. Select Active Directory Certificate Services, click next in the pop up window to acknowledge the required features that need to be added, and click next to continue
     
    Adding Active Directory Certificate ServicesAdding Active Directory Certificate Services
     
  7. Click Next in the Features section to continue
  8. Review the brief description about AD CS and click next to continue
  9. Select Certificate Authority and Certification Authority Web Enrollment, click next in the pop up window to acknowledge the required features that need to be added, and click next to continue
     
    Windows Server 2019 Add Role ServicesWindows Server 2019 Add Role Services
     
  10. Review the brief description about IIS and click next to continue
  11. Leave the default and click next to continue
  12. Click Install to begin the installation process
  13. Close the wizard once it is complete

 

Step 5: Configure AD CS

 

In this step will look in to configuration and restoring the backup created previously

 

  1. Navigate to Server Manager > AD CS
  2. In right hand panel it will show message as following screenshot and click on More
     
    AD CSAD CS
     
  3. Click on Configure Active Directory Certificate Service …… in the pop up window
     
    Configure Active Directory Certificate ServiceConfigure Active Directory Certificate Service
     
  4. In the Role Configuration wizard, ensure the proper credential for Enterprise Administrator is shown and click next to continue
  5. Select Certification Authority and Certification Authority Web Enrollment and click next to continue
  6. Ensure Enterprise CA is selected the setup type and click next to continue
  7. Select Root CA as the CA type and click next to continue
  8. With this being a migration, select Use existing private key and Select a certificate and use its associated private key and click next to continue
     
    AD CS ConfigurationAD CS Configuration
     
  9. Click Import in the AD CS Configuration window
  10. Select the key backed up during the backup process from windows 2008 R2 server. Browse and select the key from the backup we made and provide the password we used for protection and click OK.
     
    Import Existing CertificateImport Existing Certificate
     
  11. With the key successfully imported and select the imported certificate and click next to continue
  12. Leave the default certificate database path and click next to continue
  13. Click on configure to proceed with the configuration process
  14. Close the configuration Wizard once complete
  15. Open the Command Prompt in Administrator Mode
  16. Run the following to stop certificate services
     
    net stop certsvc
  17. Open the registry file exported from the Windows 2008 server in Notepad
     
    NOTE: Please ensure you have tested this in lab first prior to completing these steps. While the solution was successful in lab it may not reflect your organization's current setup and may disrupt your service. Microsoft is not liable for any possible disruption that may occur.

  18. Locate CAServerName and change the value to the name of the NEW 2016 / 2019 Windows Server
     
    Modify registry fileModify registry file
     
  19. Save the changes in Notepad

 

Step 6: Restore CA Backup

 

  1. Navigate to Server Manager > Tools > Certification Authority
  2. Right click on server node > All Tasks > Restore CA
  3. A window will appear confirming the stop of Active Directory Certificate Services. Click OK to continue.
     
    Confirm stop of Active Directory Certificate ServicesConfirm stop of Active Directory Certificate Services
  4. Click Next to start the Certification Authority Restore Wizard
  5. Click both check boxes to select both items to restore and provide the backup path for the file to be restored from
     
    Certification Authority Restore WizardCertification Authority Restore Wizard
  6. Enter the password used to protect private key during the backup process and click next
  7. Click Finish to complete the restore process
  8. Click Yes to restart Active Directory Certificate Services

 

Step 7: Restore Registry info

 

  1. Navigate to the folder containing the backed-up registry key with the newly edited CAServerName value and double click > Run to initialize the restore
  2. Click yes to proceed with registry key restore
  3. Click OK once confirmation about the restore is shared

 

Step 8: Reissue Certificate Templates

 

It is now time to reissue the certificate with the migration process now complete.

 

  1. Under Server Manager, navigate to Tools > Certification Authority
  2. Right click on Certificate Templates Folder > New > Certificate Template to Reissue
  3. From the certificate templates list click on the appropriate certificate template and click OK

 

This completes the Active Directory Certificate Service migration steps from 2008 R2 to 2016 / 2019 containing a different server name. 

 

The following video also shares steps surrounding this process as well as migrating DNS.

 

%3CLINGO-SUB%20id%3D%22lingo-sub-2328766%22%20slang%3D%22en-US%22%3EStep-By-Step%3A%20Migrating%20Active%20Directory%20Certificate%20Service%20From%20Windows%20Server%202008%20R2%20to%202019%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2328766%22%20slang%3D%22en-US%22%3E%3CP%3EWindows%20Server%202008%20R2%20achieved%20end%20of%20support%20via%20Microsoft%20on%20January%2014th%202020.%26nbsp%3BIn%20a%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fitops-talk-blog%2Fstep-by-step-migrating-the-active-directory-certificate-service%2Fba-p%2F697674%3FWT.mc_id%3Dmodinfra-27462-abartolo%22%20target%3D%22_blank%22%3Eprevious%20post%3C%2FA%3E%2C%20steps%20were%20detailed%20on%20Active%20Directory%20Certificate%20Service%20migration%20from%202008%20R2%20to%202019%20but%20required%20the%20new%20Windows%20Server%202019%20server%20to%20have%20the%20same%20name%20as%20the%20previous%202008%20R2%20server.%26nbsp%3B%20Many%20of%20you%20have%20reached%20out%20asking%20for%20an%20update%20of%20the%20steps%20to%20reflect%26nbsp%3BActive%20Directory%20Certificate%20Service%20migration%20from%202008%20R2%20to%202016%20%2F%202019%20containing%20a%20different%20name.%26nbsp%3B%20A%20solution%20has%20been%20found%20and%20tested%20with%20repeatable%20steps%20shared%20below.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENOTE%3A%20The%20following%20was%20tested%20in%20a%20lab%20environment.%20While%20the%20solution%20was%20successful%20it%20may%20not%20reflect%20your%20organization's%20current%20setup.%20Please%20test%20the%20steps%20below%20in%20a%20lab%20environment%20prior%20to%20implementing%20on%20production.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EStep%201%3A%20Backup%20Windows%20Server%202008%20R2%20certificate%20authority%20database%20and%20its%20configuration%3CBR%20%2F%3E%26nbsp%3B%20Log%20in%20to%20Windows%202008%20R2%20Server%20as%20member%20of%20local%20administrator%20group%20Go%20to%20Start%20%26gt%3B%20Administrative%20Tools%20%26gt%3B%20Certificate%20Authority%20Right%20Click%20on%20Server%20Node%20%26gt%3B%20All%20Tasks%20%26gt%3B%20Backup%20CA%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20Click%20Next%20on%20the%26nbsp%3BCertification%20Authority%20Backup%20Wizard%20screen%3CBR%20%2F%3E%20Click%20both%20check%20boxes%26nbsp%3Bto%20select%20both%20items%20to%20backup%20and%20provide%20the%20backup%20path%20for%20the%20file%20to%20be%20stored%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20Click%20Next%20Provide%20a%20password%20to%20protect%20private%20key%20and%20CA%20certificate%20file%20and%20click%20on%20next%20to%20continue%20Click%20Finish%20to%20complete%20the%20process%3CBR%20%2F%3E%20Step%202%3A%20Backup%20CA%20Registry%20Settings%3CP%3E%26nbsp%3B%3C%2FP%3EClick%20Start%20%26gt%3B%20Run%20%26gt%3B%20type%26nbsp%3Bregedit%26nbsp%3Band%20click%20OK%20Expand%20the%20key%20in%20following%20path%3A%26nbsp%3BHKEY_LOCAL_MACHINE%5CSYSTEM%5CCurrentControlSet%5CServices%5CCertSvc%20Right%26nbsp%3Bclick%20on%20the%20Configuration%20key%20and%20click%20Export%20Provide%20a%20name%2C%20save%20the%20backup%20file%20and%20then%20click%20on%20save%20to%20complete%20the%20backup%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CP%3EBackup%20of%20the%20Certificates%20is%20now%20complete%20and%20the%20files%20can%20now%20be%20moved%20to%20the%20new%20Windows%202016%20%2F%202019%20server.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EStep%203%3A%20Uninstall%20CA%20Service%20from%20Windows%20Server%202008%20R2%3CP%3E%26nbsp%3B%3C%2FP%3ENavigate%20to%20Server%20Manager%20Click%26nbsp%3BRemove%20Roles%26nbsp%3Bunder%26nbsp%3BRoles%20Summary%26nbsp%3Bto%20start%20the%20Remove%20Roles%20Wizard%2C%20and%20then%20click%26nbsp%3BNext%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%20Click%20to%20clear%20the%26nbsp%3BActive%20Directory%20Certificate%20Services%26nbsp%3Bcheck%20box%20and%20click%26nbsp%3BNext%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20Click%20Remove%20on%20the%26nbsp%3BConfirm%20Removal%20Options%26nbsp%3Bpage%20If%20Internet%20Information%20Services%20(IIS)%20is%20running%20and%20you%20are%20prompted%20to%20stop%20the%20service%20before%20you%20continue%20with%20the%20uninstall%20process%2C%20click%26nbsp%3BOK%20Click%20Close%20Restart%20the%20server%20to%20complete%20the%20uninstall%20Step%204%3A%20Install%20Windows%20Server%202016%20%2F%202019%20Certificate%20Services%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E*NOTE%3A%20The%20screenshots%20below%20show%20the%20server%20name%20as%20WS2019%20to%20highlight%20which%20server%20we%20are%20working%20on.%26nbsp%3BThis%20step-by-step%20highlights%20screenshots%20from%20Windows%20Server%202019.%20Windows%20Server%202016%20process%20is%20the%20same%20with%20similar%20screenshots%3CBR%20%2F%3E%26nbsp%3B%3C%2FP%3ELog%20in%20to%20Windows%20Server%202019%20as%20Domain%20Administrator%20or%20member%20of%20local%20administrator%20group%20Navigate%20to%20Server%20Manager%20%26gt%3B%20Add%20roles%20and%20features%20Click%20on%20next%20to%20continue%20in%20the%26nbsp%3BAdd%20Roles%20and%20features%20Wizard%20Select%20Role-based%20or%20Feature-based%20installation%20and%20click%20next%3CBR%20%2F%3E%20Keep%20the%20default%20selection%20from%20the%20server%20selections%20window%20and%20click%20next%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20Select%26nbsp%3BActive%20Directory%20Certificate%20Services%2C%20click%20next%20in%20the%20pop%20up%20window%20to%26nbsp%3Backnowledge%20the%20required%20features%20that%20need%20to%20be%20added%2C%26nbsp%3Band%20click%20next%20to%20continue%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20Click%20Next%20in%20the%20Features%20section%20to%20continue%20Review%20the%20brief%20description%20about%20AD%20CS%20and%20click%20next%20to%20continue%20Select%26nbsp%3BCertificate%20Authority%20and%20Certification%20Authority%20Web%20Enrollment%2C%26nbsp%3Bclick%20next%20in%20the%20pop%20up%20window%20to%26nbsp%3Backnowledge%20the%20required%20features%20that%20need%20to%20be%20added%2C%20and%20click%20next%20to%20continue%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20Review%20the%20brief%20description%20about%20IIS%20and%20click%20next%20to%20continue%20Leave%20the%20default%20and%20click%20next%20to%20continue%20Click%20Install%20to%20begin%20the%20installation%20process%20Close%20the%20wizard%20once%20it%20is%20complete%3CP%3E%26nbsp%3B%3C%2FP%3EStep%205%3A%20Configure%20AD%20CS%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIn%20this%20step%20will%20look%20in%20to%20configuration%20and%20restoring%20the%20backup%20created%20previously%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3ENavigate%20to%20Server%20Manager%20%26gt%3B%20AD%20CS%20In%20right%20hand%20panel%20it%20will%20show%20message%20as%20following%20screenshot%20and%20click%20on%20More%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20Click%20on%20Configure%20Active%20Directory%20Certificate%20Service%20%E2%80%A6%E2%80%A6%20in%20the%20pop%20up%20window%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20In%20the%20Role%20Configuration%20wizard%2C%20ensure%20the%20proper%20credential%20for%20Enterprise%20Administrator%20is%20shown%20and%20click%20next%20to%20continue%3CBR%20%2F%3E%20Select%20Certification%20Authority%20and%20Certification%20Authority%20Web%20Enrollment%20and%20click%20next%20to%20continue%20Ensure%26nbsp%3BEnterprise%20CA%20is%20selected%20the%20setup%20type%20and%20click%20next%20to%20continue%20Select%20Root%20CA%20as%20the%20CA%20type%20and%20click%20next%20to%20continue%20With%20this%20being%20a%20migration%2C%20select%20Use%20existing%20private%20key%20and%20Select%20a%20certificate%20and%20use%20its%20associated%20private%20key%20and%20click%20next%20to%20continue%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20Click%20Import%20in%20the%20AD%20CS%20Configuration%26nbsp%3Bwindow%20Select%20the%20key%20backed%20up%20during%20the%20backup%20process%20from%20windows%202008%20R2%20server.%20Browse%20and%20select%20the%20key%20from%20the%20backup%20we%20made%20and%20provide%20the%20password%20we%20used%20for%20protection%20and%20click%20OK.%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20With%20the%26nbsp%3Bkey%20successfully%20imported%20and%20select%20the%20imported%20certificate%20and%20click%20next%20to%20continue%20Leave%20the%20default%20certificate%20database%20path%20and%20click%20next%20to%20continue%20Click%20on%20configure%20to%20proceed%20with%20the%20configuration%20process%20Close%20the%20configuration%20Wizard%20once%20complete%3CBR%20%2F%3E%20Open%20the%20Command%20Prompt%20in%20Administrator%20Mode%20Run%20the%20following%20to%20stop%20certificate%20services%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%20net%20stop%20certsvc%20Open%20the%20registry%20file%20exported%20from%20the%20Windows%202008%20server%20in%20Notepad%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3ENOTE%3A%20Please%20ensure%20you%20have%20tested%20this%20in%20lab%20first%20prior%20to%20completing%20these%20steps.%26nbsp%3BWhile%20the%20solution%20was%20successful%20in%20lab%20it%20may%20not%20reflect%20your%20organization's%20current%20setup%20and%20may%20disrupt%20your%20service.%20Microsoft%20is%20not%20liable%20for%20any%20possible%20disruption%20that%20may%20occur.%3CBR%20%2F%3E%3CBR%20%2F%3E%20Locate%20CAServerName%20and%20change%20the%20value%20to%20the%20name%20of%20the%20NEW%202016%20%2F%202019%20Windows%20Server%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%26nbsp%3B%20Save%20the%20changes%20in%20Notepad%3CP%3E%26nbsp%3B%3C%2FP%3EStep%206%3A%20Restore%20CA%20Backup%3CP%3E%26nbsp%3B%3C%2FP%3ENavigate%20to%20Server%20Manager%20%26gt%3B%20Tools%20%26gt%3B%20Certification%26nbsp%3BAuthority%20Right%20click%20on%20server%20node%20%26gt%3B%20All%20Tasks%20%26gt%3B%20Restore%20CA%20A%20window%20will%20appear%20confirming%20the%20stop%20of%20Active%20Directory%20Certificate%20Services.%20Click%20OK%20to%20continue.%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%20Click%20Next%20to%20start%20the%26nbsp%3BCertification%20Authority%20Restore%20Wizard%3CBR%20%2F%3E%20Click%20both%20check%20boxes%26nbsp%3Bto%20select%20both%20items%20to%20restore%20and%20provide%20the%20backup%20path%20for%20the%20file%20to%20be%20restored%20from%3CBR%20%2F%3E%26nbsp%3B%3CBR%20%2F%3E%3CBR%20%2F%3E%20Enter%20the%20password%20used%20to%20protect%20private%20key%20during%20the%20backup%20process%20and%20click%20next%20Click%20Finish%20to%20complete%20the%20restore%20process%20Click%20Yes%20to%20restart%20Active%20Directory%20Certificate%20Services%3CP%3E%26nbsp%3B%3C%2FP%3EStep%207%3A%20Restore%20Registry%20info%3CP%3E%26nbsp%3B%3C%2FP%3ENavigate%20to%20the%20folder%20containing%20the%20backed-up%20registry%20key%20with%20the%20newly%20edited%20CAServerName%20value%26nbsp%3Band%20double%20click%20%26gt%3B%20Run%20to%20initialize%20the%20restore%20Click%20yes%20to%20proceed%20with%20registry%20key%20restore%20Click%20OK%20once%20confirmation%20about%20the%20restore%20is%20shared%3CP%3E%26nbsp%3B%3C%2FP%3EStep%208%3A%20Reissue%20Certificate%20Templates%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20is%20now%20time%20to%20reissue%20the%20certificate%20with%20the%20migration%20process%20now%26nbsp%3Bcomplete.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EUnder%20Server%20Manager%2C%20navigate%20to%20Tools%20%26gt%3B%20Certification%20Authority%20Right%20click%20on%20Certificate%20Templates%20Folder%20%26gt%3B%20New%20%26gt%3B%20Certificate%20Template%20to%20Reissue%20From%20the%20certificate%20templates%20list%20click%20on%20the%20appropriate%20certificate%20template%20and%20click%20OK%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20completes%20the%26nbsp%3BActive%20Directory%20Certificate%20Service%20migration%20steps%26nbsp%3Bfrom%202008%20R2%20to%202016%20%2F%202019%20containing%20a%20different%20server%20name.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThe%20following%20video%20also%20shares%20steps%20surrounding%20this%20process%20as%20well%20as%20migrating%20DNS.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2328766%22%20slang%3D%22en-US%22%3E%3CP%3EWindows%20Server%202008%20R2%20achieved%20end%20of%20support%20via%20Microsoft%20on%20January%2014th%202020.%26nbsp%3B%20In%20a%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fitops-talk-blog%2Fstep-by-step-migrating-the-active-directory-certificate-service%2Fba-p%2F697674%3FWT.mc_id%3Dmodinfra-27462-abartolo%22%20target%3D%22_blank%22%3Eprevious%20post%3C%2FA%3E%2C%20steps%20were%20detailed%20on%20Active%20Directory%20Certificate%20Service%20migration%20from%202008%20R2%20to%202019%20but%20required%20the%20new%20Windows%20Server%202019%20server%20to%20have%20the%20same%20name%20as%20the%20previous%202008%20R2%20server.%26nbsp%3B%20This%20new%20post%20shares%20steps%20for%20Active%20Directory%20Certificate%20Service%20migration%20from%202008%20R2%20to%202016%20%2F%202019%20containing%20a%20different%20server%20name.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2328766%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EWindows%20Server%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎May 10 2021 02:40 PM
Updated by: