Skip to main content
Skip table of contents

CA Connector - Windows

Follow these steps to install and configure the CA Connector on Windows.

Step 1 - Provision a Windows Host

Provision a Windows host that is capable of running the CA Connector.

Windows Server 2016-2022 is recommended.

Step 2 - Prepare Installation Files

Place the SetupConnector_{deploymentName}.ps1 script in a directory with the RemoteCAClient-Type-Version.zip (for example RemoteCAClient-EJBCA-25.2.1.zip) file that you downloaded from the Command SaaS Portal.

It is required to run this script as an administrator. If you cannot elevate a PowerShell window to Administrator, please contact a System Administrator to provide these credentials.

In the following example, the script and .zip file were placed in the Downloads called “~\Downloads\Remote CA Connector\”.

image-20250925-210943.png

Step 3 - Run the Installation Script

Run the script by right-clicking the script file, and then selecting Run with PowerShell or by opening a PowerShell window and executing the script. Once prompted click Open.

image-20250925-211040.png

The script needs to run with privileged access and will prompt for access depending on your execution policy. Press “A” for All and then Enter, if prompted:

image-20250925-211246.png

There are three options you can use when running the installation script.

  • Option 1 will install the CA Connector as a service, but will prompt you for a domain username and password that has rights to the network and server. This is the recommended method and required if using the RA Connector to connect to an MSCA.

  • Option 2 will install the Remote CA Connector as a service, but generate a local user that it can run as. This may create connectivity issues to other MS devices, but should work well as a proof of concept.

  • Option 3 will install the Remote CA Connector with the 'NT Authority\Network Service' and should work for most use cases including connecting to an EJBCA instance.

image-20250925-212044.png

Step 4 - Connect to Command SaaS

The first thing the installation script will do is try to connect to the Command SaaS deployment.

image-20250925-212413.png

If the connection fails, this is likely because it is required to allow any addresses into the Command SaaS deployment via the Self-Service Source IP feature of Command SaaS.

image-20250925-213314.png

If the process fails, add the outbound internet IP of the host you are using to your Command SaaS deployment.

One option to determine the outbound IP address of the host you are using is to type the following command in the PowerShell window.
Note: This method uses the third-party service http://ifconfig.me .

CODE
curl ifconfig.me

The response will show the IP address that your host will use to access the Command SaaS Deployment.

image-20240313-193832.png

Add this IP address to the Source IPs screen in the Command SaaS Portal for this deployment. Click Add, and then click Apply Now.

image-20240328-195258.png

Step 5 - Complete the Installation

Once the change has processed, run the script again. The script will install .NET, if needed. If .NET already exists, the script will skip this step.

The remainder of the step is determined based on the installation option you selected.

If you selected Option 1

Selecting Option 1 will prompt you for the credentials you would like to use to run the service as. If dotnet core 8 is not installed, it will download and install it for you. The script will then prompt you for credentials to run the service as:

image-20250926-181752.png

Once that is done, the script will prompt you for the Client Secret for your Command SaaS deployment. The Client Secret can be found on the CA Connectors screen in the Keyfactor Command SaaS Portal for the deployment being configured. Click Show to show the client secret and use the copy button to add it to your clipboard.

image-20250926-181910.png

Paste the Client Secret value into the script using the PowerShell Edit > Paste method in the terminal window.

image-20250926-182036.png

Ensure that the password is the full-length secret pasted into the window. The password will have an obfuscated character for each pasted character.

image-20250926-182122.png

The script will then copy the files in place and give you additional information at the end.

image-20250926-182222.png

If you selected Option 2

If you selected Option 2, the script will generate a local service account automatically called “KeyfactorSVCUser”. The script will install the carbon utilities to perform this task since it needs these tools to create the user and grant it logon as a service rights. It will not prompt for any credentials other than the Command SaaS password you need to obtain from the Command SaaS Portal. Paste your Client Secret using the PowerShell Edit > Paste method in the terminal window.

image-20250926-182500.png

It will then complete and give you information about the installation.

image-20250926-182734.png

If you selected Option 3

Option 3 is the same process but the CA Connector will run as ‘NT AUTHORITY\NETWORK SERVICE’.

image-20250926-182902.png

Checking Command SaaS

Once complete, access the Command SaaS interface and check the CA Connector has been seen by the server. Go to Locations → Certificate Authorities.

image-20250926-183101.png

Access the CA Connectors tab, there should be a connector with a recently updated Last Seen time.

image-20250926-183214.png

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.