DC & Vault PKI Migration
Overview
Migration from legacy Windows Server 2022 (Desktop Experience) with AD CS to a modern architecture:
-
Windows Server 2025 Core - No GUI, PowerShell-only administration
-
Vault PKI - DOMUS-ROOT-CA / DOMUS-ISSUING-CA replaces HOME-ROOT-CA
-
ISE Integration - AD groups for 802.1X authorization
Architecture
Milestones
| Phase | Description | Status | Date |
|---|---|---|---|
1 |
Deploy Windows Server 2025 Core VM on KVM |
Complete |
2026-02-09 |
2 |
Promote to Domain Controller (new forest) |
Complete |
2026-02-09 |
3 |
Configure SSH with YubiKey authentication |
Complete |
2026-02-09 |
4 |
AD Bootstrap (OUs, groups, accounts) |
In Progress |
2026-02-09 |
5 |
Join ISE to Active Directory |
Pending |
|
6 |
Domain join Linux workstations |
Pending |
|
7 |
Test 802.1X EAP-TLS with Vault certs |
Pending |
|
8 |
Decommission old DC (if applicable) |
Pending |
Key Decisions
Why Server Core?
-
Reduced attack surface (no GUI components)
-
Lower resource usage (4GB RAM vs 8GB+)
-
Faster patching (fewer components to update)
-
Forces automation and scripting discipline
-
Enterprise best practice for DCs
Infrastructure
| Host | Role | Status |
|---|---|---|
home-dc01 |
Windows Server 2025 Core DC (10.50.1.50) |
Online |
vault-01 |
HashiCorp Vault PKI server |
Online |
ISE |
RADIUS / 802.1X authentication |
Online |
Runbooks
-
Windows Server 2025 Core DC - DC deployment procedure
-
AD Bootstrap - OUs, groups, ISE integration
-
Vault PKI Cert Issuance - Certificate procedures
-
Vault PKI Quick Reference - Command reference
Related Components
-
domus-ise-linux (ise-linux) - Linux 802.1X methodology
-
domus-secrets-ops (secrets-infrastructure) - Secrets management
Lessons Learned
Server Core Administration
-
sconfigfor initial setup (hostname, network, RDP) -
Exit to PowerShell with option 15
-
SSH keys go in
C:\ProgramData\ssh\administrators_authorized_keysfor admin accounts -
icaclspermissions required: Administrators:F and SYSTEM:F