Checklist: Implementing a Certificate-based Isolation Policy Design


Updated: October 11, 2012

Applies To: Windows Server 2012

This parent checklist includes cross-reference links to important concepts about using certificates as an authentication option in either a domain isolation or server isolation design.


Complete the tasks in this checklist in order. When a reference link takes you to a procedure, return to this topic after you complete the steps in that procedure so that you can proceed with the remaining tasks in this checklist

The procedures in this section use the Group Policy MMC snap-in interfaces to configure the GPOs, but you can also use Windows PowerShell. For more information, see Windows Firewall with Advanced Security Administration with Windows PowerShell at

Checklist Checklist: Implementing certificate-based authentication





Review important concepts and examples for certificate-based authentication to determine if this design meets your deployment goals and the needs of your organization.

Conceptual topic Identifying Your Windows Firewall with Advanced Security Deployment Goals

Conceptual topic Certificate-based Isolation Policy Design

Conceptual topic Certificate-based Isolation Policy Design Example

Conceptual topic Planning Certificate-based Authentication


Install the Active Directory Certificate Services (AD CS) role as an enterprise root issuing certification authority (CA). This step is required only if you have not already deployed a CA on your network.

Procedure topic Install Active Directory Certificate Services


Configure the certificate template for workstation authentication certificates.

Procedure topic Configure the Workstation Authentication Certificate Template1


Configure Group Policy to automatically deploy certificates based on your template to workstation computers.

Procedure topic Configure Group Policy to Autoenroll and Deploy Certificates


On a test computer, refresh Group Policy and confirm that the certificate is installed.

Procedure topic Confirm That Certificates Are Deployed Correctly