Dear Francism08,
There's another way to this instead of installing the "Active Directory Certificate Services Feature" you can just import SSL certificate in the "Trusted Root Certification Authorityies" below is the step to create self signed certificate in your Windows 2012 R2 AD Server powershell running as Administrator without the need of enabling the AD CS feature.
Step1: New-SelfSignedCertificate -certstorelocation cert:\localmachine\my -dnsname win2012r2t3.dev.fsmendoza.com
Step2: $pwd = ConvertTo-SecureString -String 'P@ssw0rd' -Force -AsPlainText
Step3: Export-PfxCertificate -cert cert:\localMachine\my\E72FD6F54234EDC717420F4C9FF8DBD68093D85F -FilePath c:\tmp\cert.pfx -Password $pwd
Note:The E72FD6F54234EDC717420F4C9FF8DBD68093D85F - is the number that will show in Step 1:
Step4: double click teh cert.pfx that was created in c:\tmp and install in "Trusted Root Certification Authorityies" and done.
This one required reboot of the server to apply.
In reply to Re^3: It does not change password in LDAP Windows 2012 R2
by fsmendoza
in thread Resolved: It does not change password in LDAP Windows 2012 R2
by francism8
| For: | Use: | ||
| & | & | ||
| < | < | ||
| > | > | ||
| [ | [ | ||
| ] | ] |