Share via

third-party certification authority

Rising Flight 6,456 Reputation points
2026-01-24T12:04:23.6+00:00

Hi All,

I am trying to generate an INF file for an LDAP (LDAPS) certificate and I am following the below Microsoft article:

https://learn.microsoft.com/en-us/troubleshoot/windows-server/active-directory/enable-ldap-over-ssl-3rd-certification-authority

I have around 25 Domain Controllers. I know I can add all DNS entries in a single line, but for easier validation and to avoid mistakes, I would prefer to list each DC on a separate line.

Many of our applications rely on LDAP/LDAPS, so I want to make sure this is done correctly. I am not sure whether the SAN section can be formatted this way, and I would appreciate guidance.

I would like to specify the SANs in a readable format, something like:

&dns=dc01.contoso.com
&dns=dc02.contoso.com
&dns=dc03.contoso.com

Below is the INF file I am currently using:

;----------------- request.inf -----------------
;----- requested on ALL DCs-----

[Version]

Signature="$Windows NT$

[NewRequest]


Subject = "C=US, ST=MYST, L=MYL, O=Contoso, OU=Domain Controllers, CN=ldap.contoso.com"
KeySpec = 1
KeyLength = 2048
; Can be 1024, 2048, 4096, 8192, or 16384.
; Larger key sizes are more secure, but have
; a greater impact on performance.
Exportable = TRUE
MachineKeySet = TRUE
SMIME = False
PrivateKeyArchive = FALSE
UserProtected = FALSE
UseExistingKeySet = FALSE
ProviderName = "Microsoft RSA SChannel Cryptographic Provider"
ProviderType = 12
RequestType = PKCS10
KeyUsage = 0xa0

[EnhancedKeyUsageExtension]

OID=1.3.6.1.5.5.7.3.1 ; Server Authentication
OID=1.3.6.1.5.5.7.3.2 ; Client Authentication

[Extensions]
; If your client operating system is Windows Server 2008, Windows Server 2008 R2, Windows Vista, or Windows 7
; SANs can be included in the Extensions section by using the following text format. Note 2.5.29.17 is the OID for a SAN extension.

2.5.29.17 = "{text}"
_continue_ = "&dns=dc01.contoso.com&dns=dc02.contoso.com&dns=dc03.contoso.com"

  1. Is it possible to list each DNS entry on a separate line in the SAN section? 2.If so, what is the correct syntax for multiple continue lines? 3.Is this the recommended approach when generating LDAPS certificates for multiple DCs?
Windows for business | Windows Server | Directory services | Certificates and public key infrastructure (PKI)
0 comments No comments
{count} votes

Answer accepted by question author
  1. Marcin Policht 82,360 Reputation points MVP Volunteer Moderator
    2026-01-24T12:39:30.51+00:00

    Create a separate request for each domain controller - you can include a single alias you want to use to connect to any of them by specifying it as SAN. In general, you would want to be able to revoke the corresponding certs for individual DCs - rather than being limited to revoking the cert for all DCs at the same time


    If the above response helps answer your question, remember to "Accept Answer" so that others in the community facing similar issues can easily find the solution. Your contribution is highly appreciated.

    hth

    Marcin


1 additional answer

Sort by: Most helpful
  1. Rising Flight 6,456 Reputation points
    2026-01-27T11:22:36.63+00:00

    i have generated the csr, when i decode it i am seeing this error.

    csr

    i have added HashAlgorithm = SHA256 in inf file, is this ok, can anyone validate

    ;----------------- request.inf -----------------
    ;----- requested on ALL DCs-----
    
    [Version]
    
    Signature="$Windows NT$
    
    [NewRequest]
    
    Subject = "C=US, ST=MYST, L=MYL, O=Contoso, OU=Domain Controllers, CN=ldap.contoso.com"
    KeySpec = 1
    KeyLength = 2048
    ; Can be 1024, 2048, 4096, 8192, or 16384.
    ; Larger key sizes are more secure, but have
    ; a greater impact on performance.
    Exportable = TRUE
    MachineKeySet = TRUE
    SMIME = False
    PrivateKeyArchive = FALSE
    UserProtected = FALSE
    UseExistingKeySet = FALSE
    ProviderName = "Microsoft RSA SChannel Cryptographic Provider"
    ProviderType = 12
    RequestType = PKCS10
    KeyUsage = 0xa0
    HashAlgorithm = SHA256
    
    [EnhancedKeyUsageExtension]
    
    OID=1.3.6.1.5.5.7.3.1 ; Server Authentication
    OID=1.3.6.1.5.5.7.3.2 ; Client Authentication
    
    [Extensions]
    ; If your client operating system is Windows Server 2008, Windows Server 2008 R2, Windows Vista, or Windows 7
    ; SANs can be included in the Extensions section by using the following text format. Note 2.5.29.17 is the OID for a SAN extension.
    
    2.5.29.17 = "{text}"
    _continue_ = "dns=ldap.contoso.com&"
    _continue_ = "dns=dc01.contoso.com&"
    _continue_ = "dns=dc02.contoso.com&"
    _continue_ = "dns=dc03.contoso.com"
    
    
    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.