Hello Yogesh Bhatia,
Before proceeding with the optimal solution, I must ask for a bit more detail regarding your environment. Could you specify the Windows Server operating system versions running on your domain controllers and your Enterprise Certificate Authority? Additionally, do you have any legacy third-party applications that rely on certificate pinning for their LDAPS connections? Knowing this ensures we account for strict TLS negotiation requirements and avoid unexpected authentication failures across your domain.
Assuming you are running a supported Windows Server architecture, the most precise mitigation is to utilize the Microsoft Management Console to access your Enterprise CA and duplicate the Kerberos Authentication template. Within the properties of this new template, you must navigate to the Cryptography tab to verify the minimum key size is strictly set to 2048 bits using the Key Storage Provider. You must then navigate to the Superseded Templates tab and explicitly add the legacy Domain Controller and Domain Controller Authentication templates. On the Security tab, ensure that both the Domain Controllers and Enterprise Read-Only Domain Controllers groups are granted Read and Autoenroll permissions. Once configured, you can issue this new template on the CA.
Regarding production impact, while modern Schannel implementations attempt to dynamically bind the newest valid certificate within the Local Machine Personal store, persistent LDAP connection pools from certain applications may cache the previous Schannel context. To ensure absolute compliance and prevent binding anomalies during the transition, you should schedule a brief maintenance window to restart the Active Directory Domain Services (NTDS) service on each domain controller after the new certificate is auto-enrolled. Your auto-enrollment infrastructure requires no modification; the Group Policy background refresh will detect the supersedence directive, request the new 2048-bit certificate, and automatically archive the legacy 1024-bit certificate.
If you must execute a rollback, don't manually delete certificates first, which breaks the active binding. Instead, remove the newly created Kerberos Authentication template from the CA issuance container, republish the legacy Domain Controller template, and execute certutil -pulse from an elevated command prompt on the domain controllers to pull the legacy certificate. Only after verifying the 1024-bit certificate is fully enrolled and present in the certlm.msc console should you manually archive or delete the 2048-bit certificate from the local machine store and restart the NTDS service to revert the Schannel binding.
Hope you found something useful in the answer. If it helped you get more insight into the issue, please consider accepting it. Thank you and have a nice day!
VP