Create a self-signed certificate
Advanced Server Access can generate self-signed certificates that contain information needed connect to an Active Directory domain. Teams must publish these certificates and add them to an Active Directory auth store. Some of the following steps may differ depending on the specific Active Directory environment.
Self-signed certificates are viewed as insecure. Okta doesn’t recommend using self-signed certificates outside of testing environments.
- Create a self-signed certificate in Advanced Server Access.
- Open the Advanced Server Access dashboard.
- From the user menu, click Team Settings.
- Go to the Passwordless Certificates tab.
- Click Create > Self-Signed Certificate.
- In the Create Self-Signed Certificate window, configure the certificate settings.
- Click Create Certificate.
The certificate is downloaded to your local device. You must move this file to an Active Directory domain controller.
- Import the certificate into the Active Directory auth store.
- In a command prompt, go to the directory where you stored the self-signed certificate.
- Publish the certificate with the following command:
certutil -dspublish -f YOUR_SELF_SIGNED_CERT NTAuthCA
- Add the certificate into the registry with the following command:
certutil -enterprise -addstore NTAuth YOUR_SELF_SIGNED_CERT
After the certificate is imported into Active Directory, teams must still distribute the certificate to domain controllers and member servers using a group policy.