Share via

Mitigation of RSA 1024-bit Certificate on Domain Controllers

Yogesh Bhatia 21 Reputation points
2026-02-19T06:39:21.31+00:00

Hi,

We have four Domain Controllers, and during the recent penetration test we identified the vulnerability “SSL Certificate Chain Contains RSA Keys Less Than 2048 bits” on TCP ports 636 (LDAPS) and 3269 (Global Catalog over SSL) across all DCs.

Upon verification, we observed that the default Domain Controller certificate on each DC was issued using RSA 1024-bit keys, based on the Domain Controller certificate template.

I would like guidance on the safe and recommended approach to mitigate this vulnerability. While I have reviewed the mitigation steps referenced in the Microsoft article below, I would like to better understand:

  1. What are the steps I have to follow to fix this?
  2. The impact on production during and after certificate replacement
  3. Any future impact on certificate auto-enrollment, particularly after modifying the certificate template
  4. The rollback procedure, in case any issues are observed after implementing the changes

Reference: https://learn.microsoft.com/en-us/answers/questions/104861/domain-conroller-certificate-key-size

Your advice on best practices for remediation and risk mitigation would be greatly appreciate.

Windows for business | Windows Server | Directory services | Certificates and public key infrastructure (PKI)
0 comments No comments
{count} votes

Answer accepted by question author
  1. VPHAN 25,000 Reputation points Independent Advisor
    2026-02-19T08:31:41.6333333+00:00

    Hello Yogesh Bhatia,

    Before proceeding with the optimal solution, I must ask for a bit more detail regarding your environment. Could you specify the Windows Server operating system versions running on your domain controllers and your Enterprise Certificate Authority? Additionally, do you have any legacy third-party applications that rely on certificate pinning for their LDAPS connections? Knowing this ensures we account for strict TLS negotiation requirements and avoid unexpected authentication failures across your domain.

    Assuming you are running a supported Windows Server architecture, the most precise mitigation is to utilize the Microsoft Management Console to access your Enterprise CA and duplicate the Kerberos Authentication template. Within the properties of this new template, you must navigate to the Cryptography tab to verify the minimum key size is strictly set to 2048 bits using the Key Storage Provider. You must then navigate to the Superseded Templates tab and explicitly add the legacy Domain Controller and Domain Controller Authentication templates. On the Security tab, ensure that both the Domain Controllers and Enterprise Read-Only Domain Controllers groups are granted Read and Autoenroll permissions. Once configured, you can issue this new template on the CA.

    Regarding production impact, while modern Schannel implementations attempt to dynamically bind the newest valid certificate within the Local Machine Personal store, persistent LDAP connection pools from certain applications may cache the previous Schannel context. To ensure absolute compliance and prevent binding anomalies during the transition, you should schedule a brief maintenance window to restart the Active Directory Domain Services (NTDS) service on each domain controller after the new certificate is auto-enrolled. Your auto-enrollment infrastructure requires no modification; the Group Policy background refresh will detect the supersedence directive, request the new 2048-bit certificate, and automatically archive the legacy 1024-bit certificate.

    If you must execute a rollback, don't manually delete certificates first, which breaks the active binding. Instead, remove the newly created Kerberos Authentication template from the CA issuance container, republish the legacy Domain Controller template, and execute certutil -pulse from an elevated command prompt on the domain controllers to pull the legacy certificate. Only after verifying the 1024-bit certificate is fully enrolled and present in the certlm.msc console should you manually archive or delete the 2048-bit certificate from the local machine store and restart the NTDS service to revert the Schannel binding.

    Hope you found something useful in the answer. If it helped you get more insight into the issue, please consider accepting it. Thank you and have a nice day!

    VP


0 additional answers

Sort by: Most helpful

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.