- HOW TO INSTALL ENVIRONMENTAL VISUALIZATION ENHANCEMENT KSP SOFTWARE
- HOW TO INSTALL ENVIRONMENTAL VISUALIZATION ENHANCEMENT KSP WINDOWS
HOW TO INSTALL ENVIRONMENTAL VISUALIZATION ENHANCEMENT KSP WINDOWS
If you prefer to use the Windows interface rather than these commands, from the Certification Authority console, right-click your CA. For example: Certutil –backup C:\CA-Backup For example: Backup-CARoleService –path C:\CA-Backup -Password (Read-Host -Prompt "Enter Password" -AsSecureString)įor Windows Server 2012: First, open a command window, and then run the Certutil command with the backup option. How to migrate a CA from a CSP to a KSP and optionally, from SHA-1 to SHA-2ĭo these steps on the existing enterprise or standalone CA.įor Windows Server 2012 R2: First, open a Windows PowerShell window with the Run as administrator option, and then use the Backup-CARoleService cmdlet. On a standalone CA, the default configuration for CA administrators includes the local Administrators group. On an enterprise CA, the default configuration for CA administrators includes the local Administrators group, the Enterprise Admins group, and the Domain Admins group. For example, this will be the case if you use a Hardware Security Module (HSM) to protect your CA key.įor all these procedures, you must use an account that is a CA administrator.
HOW TO INSTALL ENVIRONMENTAL VISUALIZATION ENHANCEMENT KSP SOFTWARE
If you use a CSP or KSP from another software or hardware vendor, contact the relevant vendor for the equivalent instructions. If your CA is running an earlier version of Windows Server, migrate to Windows Server 2012 or Windows Server 2012 R2 and then follow these instructions. Use these instructions for a software Cryptographic Service Provider (CSP) and software Key Storage Provider (KSP) that ships with Windows Server for the versions that are listed in the Applies To list at the top of this topic. For more information about Cryptography Next Generation, see Cryptography Next Generation.Īfter the migration, you can then reconfigure the CA to issue certificates by using the SHA-2 hash algorithm rather than the less secure hash algorithm of SHA-1.