Install the Keyfactor Command Policy Module Handlers

These steps only need to be completed if your Keyfactor Command license includes the Keyfactor Command Policy Module and you plan to use this feature and one or more of its policy handlers. Keyfactor Command includes four certificate authorityClosed A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA. policy handlers within its custom policy module that can be used to alter or restrict the functionality of a Microsoft certificate authority. The policy handlers are installed on the Microsoft CAClosed A certificate authority (CA) is an entity that issues digital certificates. Within Keyfactor Command, a CA may be a Microsoft CA or a Keyfactor gateway to a cloud-based or remote CA. and enabled through the Microsoft CA properties page. The available policy handlers are:

Important:  For a CA Clustered solution, if the CA Policy module is installed on a node then configured, then failed over to another node, this will corrupt the check point key. The module must be installed on BOTH nodes, configured on one node, then failed over to the other node.

You can install one policy handler on one CA and the other policy handler(s) on different CA(s) or install more than one together on the same CA. The following instructions cover installing the policy handlers individually. However, if you opt to install more than one policy handler on the same CA, you need to pay attention to the processing order of the policy handlers. The processing order of the handlers currently available in the Keyfactor Command Policy Module, when used together on the same machine, is significant for some handlers and not others. Specifically, the processing order is not significant for the vSCEP™ Policy Handler and Keyfactor Command Machine Whitelist Policy handler. These handlers may be placed anywhere within the list of handlers. However, the processing order does matter for the SAN Attribute Policy Handler and the RFC 2818 Policy Handler. When these two handlers are used together, the SAN Attribute Policy Handler must be placed on the list above the RFC 2818 Policy Handler to allow the SAN Attribute Policy Handler to be processed before the RFC 2818 Policy Handler. This is because the SAN Attribute Policy Handler removes any existing SANs on the enrollment request and replaces them with those specified in the request outside of the CSR—such as those entered in the optional SAN section on the CSR page of the Keyfactor Command Management Portal. This includes any SANs added by the RFC 2818 Policy Handler.