How to Export Active Directory Root Certificate to Enable SSL for RSA SecurID Cloud Authentication Service Idenity Source
2 years ago
Originally Published: 2019-08-13
Article Number
000054726
Applies To
RSA Product Set: SecurID Access Cloud Authentication Service
Issue
When configuring Identity Source SSL Certificates per Add an Identity Source for the Cloud Authentication Service Step 12.c the administrator is asked to "Click Add and select the SSL certificate."
The required certificate is the root certificate for the Active Directory server(s) underlying the logical Identity Source.  If the root certificate file is not readily available it must be exported from the Active Directory server.
Tasks
  1. On the Active Directory server start a command shell (cmd.exe) and "Run As Administrator"
  2. Execute command:  certutil -ca.cert client.crt
  3. Cut and paste the certutil output beginning with -----BEGIN CERTIFICATE----- and ending with -----END CERTIFICATE into a new text file. This is the desired root certificate in PEM format.  See below, for example, certutil execution.
  4. Choose the created text file when configuring the Identity Source SSL Certificate. 
C:\Users\Administrator>certutil -ca.cert client.crt
CA cert[0]: 3 -- Valid
CA cert[0]:
-----BEGIN CERTIFICATE-----
MIIDazCCAlOgAwIBAgIQGzwrIxZ9JoNKYQp4RuJ35DANBgkqhkiG9w0BAQUFADBI
MRMwEQYKCZImiZPyLGQBGRYDY29tMRcwFQYKCZImiZPyLGQBGRYHZXhhbXBsZTEY
MBYGA1UEAxMPZXhhbXBsZS1EQzAxLUNBMB4XDTE1MDMyNjEyMTAxM1oXDTI1MDMy
NjEyMjAxMlowSDETMBEGCgmSJomT8ixkARkWA2NvbTEXMBUGCgmSJomT8ixkARkW
B2V4YW1wbGUxGDAWBgNVBAMTD2V4YW1wbGUtREMwMS1DQTCCASIwDQYJKoZIhvcN
AQEBBQADggEPADCCAQoCggEBAMFhTzxdREIIRVWOK4M+EYcmIjd2SQjxa4gE7J8G
b9y1pGIXVC80UUESa1HXvCi+YaZ6UY204lmQBARwHX4Fu81WTK3bf5+rs670Lmm2
u0QrovxXD4SE2bhNUG+D7K+yEzDS/OEZB+Ls9Wv0UQ/x1bwtQyePxCxuLy94GKc8
eI4z1dyJbFIKTKu/fF9P/TDp77SxUenQrFzrWb8nyFPNFcZzdcymbyOgGNVy0UZe
RrLvEtHI0pqRSgADs/jLRpK7IRszF7ofhKqRkg3488q+R7skn3c0LNpPYaPBbkFH
crX1IBuPUTu3dqnr+suwqNOOOvhuAowtIegOA/RmbglyH0cCAwEAAaNRME8wCwYD
VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFPHQsRA70LbC0A8X
hozXZdwFtK2PMBAGCSsGAQQBgjcVAQQDAgEAMA0GCSqGSIb3DQEBBQUAA4IBAQBq
4Bhg5aNN6Vc9MVig6gPSfmaLpGdkq+XdhzNB9gT/1HmP0eGiJqGWYjVQjXdy1JCi
Fpo0OxpbI1jkpRw78VwYUe8Lq9O7Tz+gBJbk6fnBGR+v0vNQVYeytmVi2fOYKkoc
dmHPsUiQYqqPt/E6pLHEYIIJKGl1K9AmviI5vVDSqxanfXt4aMqdwU4VDL5VY6mM
leG3TSkI7b/1KRSIkIaJcrstR9HjCc3wqro70VITFRYUZyo01x3ELEHZ8clncf+v
EiV6RXzzLhFeADNNwdO8sUAbRSf2LUERb3mo4oGa6X1UKKdWh0A9nOyWIKGrmF+R
FXdhd08js7jbL+3AcofC
-----END CERTIFICATE-----

CertUtil: -ca.cert command completed successfully.