1. Updating the certificate in ADFS
- Logon to the ADFS server (this can be the same server as the LiveContent Architect server)
- Open AD FS 2.0
- Expand Services > Certificates
- In the Action Pane, on the right side, click Add Token-Signing Certificate
- If you receive the following message, execute the following steps first
- Open Powershell with Administrative Rights
-
Enter the following arguments:
Add-PSSnapin Microsoft.ADFS.PowerShell <Enter> Set-ADFSProperties -autoCertificateRollOver $ false |
- A new, Secondary certificate will be created.
- When preferred, you can set the new generated certificate as Primary by clicking "Set as Primary" in the Action Pain
- Check if the Token-Decrypting is expired and if necessary update it. You can do that by clicking Add Token-Decrypting Certificate
- Check if the Service Communications Certificate is expired and if necessary update it. You can do that by clicking Set Service Communication certificate
It is important that the ADFS Service account is able to access the private key of the selected certificate in step 8 and 9. If you see the message below, make sure that you follow the steps: Allowing the Service account to access the private Key
Allowing the Service account to access the private Key:
- Point to Start > Run
- Enter MMC in the Run Dialogue to open the Microsoft Management Console
- In Microsoft Management Console Point to File > Add/Remove Snapin
- Select Certificates in the Available Snap-ins and Click add to add it to the Console
- In the Certificates Snap-In Windows , Select Service Account and press Next
- Select Local Computer and press Next
- Select the AD FS 2.0 Windows Service account and press Finish
- Press OK again in the Add or remove Snap-Ins dialogue
- In the overview Search for the Certificate that you have selected for ADFS
- Go to the Actions Pane > More Actions > All Tasks > Manage Private Keys
- Make sure that network Service has read access on the Private Key
-
Creating a Self-Signed Certificate with a A different Subject Name
One of the issues with IIS is that we can click on Create Self-Signed certificate and it will create a SelfSiged Certificate for is. However the common name (CN) will be generated automatically. This might cause issues later on because LCA expects to find a unique CN certificate. In other words, if you have 2 certificates with the same CN, Architect will stop working.
To generate a Self-Signed Certificate, use the SelfSSL7.exe tool that is provided as an attachment on this KB
- Download and copy the SelfSSL7.exe to the server where you want to generate the Self-Signed certificate
-
Execute the following Command:
SelfSSL7.exe /T /N cn=ADFS_Token_Decrypting SelfSSL7.exe /T /N cn=ADFS_Service_Communications |
/T to add the certificate also to the user's certificate store so the SSL certificate is trusted by IE
/N specifies the common name
1.2 Updating Livecontent Architect with the new certificate information
- Select in ADFS the new generated certificate and in the Actions Pane, click View Certificate
- Click on the Details Tab and Locate Thumbprint
-
Copy the Thumbprint Value to your Clibboard.
When copying the Thumbprint value, be sure NOT to copy the hidden Control Character. The Control Character is located before the fist letter/number as indicated in the screen shot. It is marked with Blue
-
Paste the contents in a Text editor, for example Notepad
- Remove all spaces between the characters. Do not close the file, you need this value for step 9
- Logon to the Architect Server via Remote Desktop (This can be the same server as where ADFS has been installed on)
- Open a File Explorer and navigate to \Infoshare\web\Author\ASP
- Make a backup of the file web.config
-
Edit the web.config with a text editor and locate the line that contains the old thumb print
<add thumbprint= "<old thumbprint>" name= "Issuer" /> |
check for multiple copies
- Change the thumbprint value with the new one (See step 5) and save the file
- Navigate to \Infoshare\web\InfoshareWS\
-
Repeat step 8 - 9.
The thumbprint might be located on multiple llines.
- Open a command prompt with Admin Rights and execute IISRESET to recycle Internet information Services
2 Updating the certificate in IIS
The HTTPS protocol is secured with a certificate. This certificate can also expire and when it does, the Relying Parties in ADFS need to be updated as well.
- Open a Remote Desktop Connection to the Architect Server (this can be the same server as where ADFS is installed)
- Open Internet Information Services
- Expand <Computername> > Sites > Default Website
- Right click on Default Website and choose Bindings
- Select HTTPS and click Edit
- Make sure that the correct certificate is selected from the dropdown.
- If you are unable to select a certificate, follow the next procedure:
- In Internet Information Services, click on the computername
- In the Feature View (Middle Pane) open Server Certificate
- Either Create a Self-Signed Certificate (not recommended), Create a Domain Certificate or create Certificate Request
- repeat step 3 - 6 to make sure that the HTTPS protocol is using the correct certificate.
- Once the correct certificate has been selected, Press View
- Go to the Details Tab and click Copy to File
- Click Next in the Certificate Export Wizard
- in the next window, Choose "No, Do not Export the private key" and press Next
- Select DER Encoded Binary and press Next
- In the Export Dialogue, click Browse
- Browse to \InfoShare\App\Setup\STS\ADFS\scripts and store the certificate with filename Certificate.cer
- Press Finish to complete The wizard
- Click OK in the Edit Site Bindings Window and close the Site Bindings window
-
Open a powershell with admin Rights and execute the following Code (at the end of the line, Press Enter to execute that line)
cd C:\InfoShare\App\Setup\STS\ADFS\Scripts Set-ExecutionPolicy Unrestricted Add-PSSnapin Microsoft.Adfs.PowerShell .\SDL.LiveContent.Architect-ADFSv2. 0 -RP-UnInstall .\SDL.LiveContent.Architect-ADFSv2. 0 -RP-Install.ps1 "C:\InfoShare\App\Setup\STS\ADFS\Scripts\certificate.cer" IISRESET |
Alternatively, if it's not possible to run Powershell scripts you can also follow the steps below to update the ADFS server:
1. Stop ADFS service
2. Update the replaying party by importing the new SSL cert into ADFS
3. Start ADFS