How to change OCSP location from 'Default Web Site' to a different web site in IIS on Windows Server 2012 R2 ?


i working on setting online responder on windows server 2012 r2 server. default ocsp configuration puts application named ocsp under 'default web site' in iis, ocsp url ends being, example, http://company.com/ocsp . 

i move ocsp configuration new iis web site, , specify host header in bindings on new web site, ocsp url is, example, http://ocsp.company.com

interestingly, couldn't find official microsoft documentation on this. i'm wondering if changing default ocsp location supported configuration.

i came across detailed blog vadims: http://www.sysadmins.lv/blog-en/moving-online-responder-ocsp-to-custom-web-url.aspx

i completed 2 steps outlined in above article, namely:

1) create new web site appropriate parameters:

new-website -name ocsp -applicationpool ocspisapiapppool -hostheader ocsp.company.com -physicalpath "c:\windows\systemdata\ocsp"

2) in applicationhost.config file, change line <location path="default web site/ocsp">     <location path="ocsp"> 

and, of course, dns has been updated point ocsp.company.com ocsp web server. 

i made sure aia extension of issuing ca updated location http://ocsp.company.com , , 'include in online certificate status protocol (ocsp) extension' checkbox checked.

when internet explorer tries perform ocsp check for certificate validation when web site loads, 500 error returned. see 500 error in fiddler, , since ocsp response fails, can see crls being downloaded fallback, before page loads.

has here got custom ocsp location working ? appreciate pointers or advice.

thanks,

mario


just make more clear. ocsp web application migration dedicated web site technically possible, not supported microsoft. why added special disclaimer @ top of blog post. if this doesn't work, suggest revert changes default installation.

it appears that there dependency i'm not aware of , works , not.

in order restore default ocsp application, should run "certutil -vocsproot". command recreate , configure web application default state.


vadims podāns, aka powershell cryptoguy
weblog: www.sysadmins.lv
powershell pki module: pspki.codeplex.com
check out new: ssl certificate verifier
check out new: powershell file checksum integrity verifier tool.




Windows Server  >  Security



Comments

Popular posts from this blog

CRL Revocation always failed

Failed to query the results of bpa xpath

0x300000d errors in Microsoft Remote Desktop client