13.
Set the "Certificate database location:" and the "Certificate database log location:"
settings to their defaults, and then click [Next>].
14.
Read the notes, and then click [Next>].
15.
Select the role service you want to use, and then click [Next>].
16.
Click [Install].
17.
When the installation is complete, click [Close].
18.
Close [Server Manager].
Installation under Windows Server 2012
1.
On the Start screen, click [Server Manager].
2.
On the [Manage] menu, click [Add Roles and Features].
3.
Click [Next>].
4.
Select [Role-based or feature-based installation], and then click [Next>].
5.
Select a server, and then click [Next>].
6.
Select the "Active Directory Certificate Services" and "Web Server (IIS)" check boxes, and
then click [Next>].
If a confirmation message appears, click [Add Features].
7.
Check the features you want to install, and then click [Next>].
8.
Read the content information, and then click [Next>].
9.
Make sure that [Certification Authority] is selected in the [Role Services] area in [Active
Directory Certificate Services], and then click [Next>].
10.
Read the content information, and then click [Next>].
11.
Check the role services you want to install under [Web Server (IIS)], and then click
[Next>].
12.
Click [Install].
13.
After completing the installation, click the Server Manager's Notification icon , and then
click [Configure Active Directory Certificate Services on the destination server].
14.
Click [Next>].
15.
Click [Certification Authority] in the [Role Services] area, and then click [Next>].
16.
Select [Enterprise CA], and then click [Next>].
17.
Select [Root CA] , and then click [Next>].
18.
Select [Create a new private key], and then click [Next>].
19.
Select a cryptographic provider, key length, and hash algorithm to create a new private
key, and then click [Next>].
Windows Authentication
37
Содержание PRO C9100
Страница 2: ......
Страница 8: ...List of Operation Privileges for Address Books 229 INDEX 231 6...
Страница 24: ...1 Getting Started 22...
Страница 72: ...4 Preventing Leakage of Information from Machines 70...
Страница 116: ...5 Enhanced Network Security 114...
Страница 176: ...6 Managing the Machine 174...
Страница 188: ...7 Troubleshooting 186...
Страница 218: ...System Log Settings User Mach N W File Unset Set System Log R R R R R 8 List of Operation Privileges for Settings 216...
Страница 220: ...Settings User Mach N W File Unset Set Device Access Violation R W 8 List of Operation Privileges for Settings 218...
Страница 235: ......
Страница 236: ...EN GB EN US EN AU M238 1022 2014...