Blog

Active Directory Certificate Services in Modern IT

Is ADCS holding your PKI back? Explore replacement options, migration paths, and real-world case studies. 20+ successful migrations delivered.

Active Directory Certificate Services has long served certificate needs, but modern IT demands highlight its limitations in cloud environments, automation, scalability, and post-quantum readiness. This guide explores the merits of AD CS, its practical limitations, the mitigations Microsoft offers, and — critically — the ADCS replacement options available when those mitigations fall short.

What Active Directory Certificate Services Does

Evaluating the merits and limitations of relying on Active Directory Certificate Services (AD CS) for all certificate management needs in modern IT highlights that AD CS was fundamentally designed for on-premises deployment. Since its introduction in Windows 2000, it has successfully served private and public organisations as a critical solution for certificate issuance. However, the demands of modern IT present practical reasons to explore alternatives that are better suited to the contemporary landscape, which is increasingly decentralised, cloud-based, API-focused, and broadly adopting containerisation and related workloads.

Active Directory Certificate Services functions as a Microsoft Certificate Authority, issuing digital certificates and managing certificate templates within the Active Directory environment. The certificate templates folder and certificate template settings enable administrators to control how certificates are issued, whilst Active Directory integration provides automated certificate enrollment for domain-joined devices and users.

Why ADCS Replacement Matters

Modern organisations face challenges that AD CS struggles to address effectively. These limitations create security risks, operational inefficiencies, and barriers to digital transformation:

Modern Deployment and Cloud Environments

AD CS struggles with containerisation, automation, and cloud-native applications due to its stateful nature and tight integration with Active Directory. Hybrid deployments that span both on-premises and cloud environments are inherently complex and require additional tools and configurations. As workloads move to the cloud, the relevance of AD CS diminishes due to its deep integration with Active Directory.

Security and Multi-Tenancy

Ensuring AD CS maintains its security posture in containerised environments requires careful planning. Its single-tenant architecture makes it unwieldy and costly at scale, leading to CA proliferation and complex management. Misconfigurations by administrators can introduce vulnerabilities, including excessive permissions, certificate template settings errors, and inadequate access controls that security teams must continuously monitor.

Post-Quantum Compatibility

Current versions of AD CS lack support for post-quantum cryptography (though Microsoft has indicated it is coming). As quantum computing advances, traditional cryptographic algorithms like RSA and ECC are becoming vulnerable to quantum attacks. Microsoft AD CS has not yet integrated PQC algorithms, posing a significant risk for future-proofing security and data protection. The NIST PQC roadmap sets deprecation of these algorithms by 2030.

Operational and Evolutionary Challenges

Managing AD CS is resource-intensive, and it hasn’t significantly evolved since 2012. It lacks support for IoT devices and connected vehicles. Misconfigurations introduce vulnerabilities that can disrupt business operations and create security risks across the Public Key Infrastructure environment.

High Availability and Scalability

AD CS does not support active-active clustering and struggles to scale for millions of certificates issued. Its lack of multi-cloud and multi-OS support limits adaptability across different environments. Managing database files and ensuring high availability requires additional infrastructure and planning.

Certificate Management Limitations

The built-in AD CS tools are limited, lacking sufficient capabilities for tracking and reporting expired certificates. They do not support automation, such as integrating the deployment and installation of certificates to applications and hosts. Without centralised certificate lifecycle management capabilities, organisations struggle to maintain full visibility across their certificate estate, leading to certificate expiration incidents and service disruptions.

API and Automation Limitations

AD CS lacks comprehensive API support and integration with widely supported protocols like ACME, EST, and CMP, limiting automation opportunities. This makes integration with DevOps tools and modern workflows difficult, creating manual processes prone to human error.

Dependency on RPC

AD CS’s reliance on RPC/DCOM for certificate requests necessitates multiple ports, complicating firewall management and cloud integration. This architectural point creates challenges when organisations need to secure network access and control access across distributed environments.

Newer Use Cases

AD CS does not support emerging use cases like SSH certificates and Vehicle-to-Everything (V2X). As organisations adopt IoT devices and modern authentication methods, the limitations of Microsoft ADCS become more apparent.

Mitigations and Merits of Active Directory Certificate Services

Let’s review if mitigations exist for that comprehensive list.

Hybrid Deployment Support

Microsoft has enhanced AD CS’s hybrid capabilities to address its limitations. A hybrid deployment integrates on-premises AD CS with cloud-based services like Microsoft Entra, leveraging both environments. Certificates for cloud services are issued by a combination of on-premises AD CS and cloud-based services. The “Hybrid Certificate Trust” model ensures certificates issued by AD CS are trusted across both environments, enabling seamless authentication and secure communication. Azure Key Vault provides Certificate Authority services, creating and managing certificates issued by public CAs or self-signed certificates. Microsoft Cloud PKI and Microsoft Azure services provide additional options for organisations within the Microsoft ecosystem.

Security Enhancements

Microsoft is continually improving AD CS security features. Windows Server 2025 updates include new Kerberos features to minimise NTLM use, enhancing AD environments’ overall security. Security teams benefit from improved monitoring capabilities and reduced attack surface when properly configured.

Modernisation

Although AD CS isn’t natively designed for containerisation or microservices, Microsoft provides guidance and tools for modernisation. This includes leveraging Azure for hybrid deployments and using automation tools to streamline AD CS management. Organisations can install modern alternatives alongside existing AD CS infrastructure to support digital transformation whilst maintaining backwards compatibility with Windows servers and the Microsoft ecosystem.

Post-Quantum Readiness

Microsoft is preparing for quantum computing by integrating PQC algorithms into AD CS. Updates to SymCrypt and CNG support PQC algorithms, enabling AD CS to issue certificates with quantum-resistant cryptography. Transitioning to TLS 1.3 is emphasised for using quantum-safe key exchange and authentication methods. For a broader view of what the PQC transition involves beyond AD CS, see our guide on why PQC is a business transformation, not an algorithm swap.

Active Directory Auto Enrollment

On the merit side, although the deep integration with Active Directory can limit support for newer technologies like containerisation, it also enables automated certificate enrollment for Active Directory-enabled objects, such as workstations and servers, by leveraging Active Directory group policy. This auto enrollment capability reduces manual effort for provisioning certificates to domain-joined devices.

Web Enrollment Services

Similarly, although AD CS does not natively support REST APIs, third-party solutions and projects provide REST API interfaces for AD CS, enabling systems outside an Active Directory domain to request certificates via REST API calls. Additionally, the Certification Authority Web Enrollment service offers web pages that enable users to perform certificate tasks, such as requesting and renewing certificates.

Exploring Modern Alternatives: 10 Important Considerations

If these mitigations and merits aren’t deemed sufficient due to the fundamental lack of support for modern deployment methods like containerisation and integration with orchestration and automation technologies, here are 10 important considerations to be kept in mind:

1. Certificate Lifecycle Management — Seek features such as automated discovery, renewal, and deployment of certificates to reduce manual effort and minimise human error. Ensure integration with popular orchestration tools, which will be facilitated by broad API support. The CLM solution should have the capability to integrate seamlessly with any existing AD CS infrastructure, providing complete visibility into certificate expiration and expired certificates across the environment.

2. Comprehensive Visibility — Ensure the solution provides robust discovery tools to locate all certificates across various platforms, including servers, load balancers, firewalls, containers, and multi-cloud environments. Full visibility prevents certificate expiration incidents and enables security teams to maintain control over the entire certificate estate. A cryptographic bill of materials can provide this visibility at the broadest level, cataloguing not just certificates but all cryptographic assets across the organisation.

3. SaaS-Based Certificate Management Solution — Assess whether vendors offer a fully-featured SaaS solution that meets your organisation’s security requirements and use cases, helping to offload operational burden whilst providing scalability and flexibility. Note of caution: while Cloud PKIs can simplify processes, they may also hide underlying complexities and depend on custom scripts. Consider migration challenges, business continuity risks if the provider ceases operations, and potential conflicts with your requirements.

4. Post-Quantum Cryptography Support — Provides support for post-quantum cryptography to future-proof your Public Key Infrastructure against quantum computing threats.

5. Hardware Security Modules (HSM) Support — Seamless integration with common industry Hardware Security Modules solutions to protect private keys and CA certificates with robust data protection.

6. Integration with Existing Infrastructure — The solution should integrate with your existing systems, including Active Directory, cloud services, and orchestration tools like Kubernetes. Consider solutions that support AWS Private CA, Microsoft Azure, and other cloud environments whilst maintaining compatibility with on-premises Windows servers.

7. Scalability — Choose a solution that can scale with your organisation’s growth, managing an increasing number of certificates and supporting multi-cloud and multi-OS environments. Assess whether the solution supports multi-tenant configurations and the distribution of core Public Key Infrastructure components, such as Registration Authorities (RA) and Certification Authorities (CA).

8. Security and Compliance — The solution should provide comprehensive security features, including policy governance, compliance monitoring, and the capability to manage root of trust certificates. Ensure alignment with regulatory standards and the ability to control access and address security risks across different environments.

9. User Interface and Experience — A user-friendly interface and intuitive user experience are essential for efficient certificate management and ease of use. Security teams and administrators require centralised management capabilities that make sense for their operational workflows.

10. Assurance and Governance — Audited against stringent standards such as PCI DSS and holding recognised certifications like Common Criteria. These assurances provide confidence that the solution meets enterprise requirements and regulatory standards.

ADCS Replacement Options: What Are Your Alternatives?

The considerations above help evaluate what to look for. This section addresses the question directly: if AD CS no longer meets your needs, what are the practical replacement paths available?

Based on our experience delivering ADCS migrations across government and enterprise environments, three models cover the majority of scenarios. The right choice depends on how deeply AD CS is embedded in your environment, what your target architecture looks like, and how quickly you need to move.

Option 1: Supplement ADCS with Certificate Lifecycle Management

For organisations with heavy Active Directory integration and a large estate of domain-joined devices relying on auto-enrollment, a full ADCS replacement may not be necessary or practical in the short term. Instead, the most impactful step is to layer a certificate lifecycle management platform on top of the existing AD CS infrastructure.

Platforms such as Keyfactor Command and Certdog integrate directly with AD CS, providing the automated discovery, monitoring, renewal orchestration, and centralised visibility that AD CS lacks natively. This approach preserves your existing Certificate Authority investment and auto-enrollment workflows whilst closing the critical gaps in visibility and automation.

This model works well when AD CS is functioning reliably as a CA but the organisation has outgrown the native management tooling. It is also a practical first step before a more comprehensive migration, because the CLM platform provides the complete certificate inventory needed to plan subsequent changes.

Option 2: Migrate to EJBCA Enterprise

For organisations that need a full replacement of AD CS Certificate Authority capabilities — whether due to scalability limitations, protocol requirements, multi-platform support, or post-quantum readiness — EJBCA Enterprise provides a modern, open-standards CA platform that addresses every limitation discussed in this article.

EJBCA supports ACME, EST, CMP, and SCEP protocols natively, runs on-premises or in cloud environments, supports multi-tenancy and high availability, and is already integrating post-quantum algorithms. It provides a fundamentally different architecture from AD CS — one designed for modern deployment patterns rather than retrofitted onto a legacy Active Directory foundation.

Unsung has delivered complex ADCS-to-EJBCA migrations at scale. In our Entrust-to-EJBCA migration programme for a central government department, we migrated 20 Root Certificate Authorities from an end-of-life platform to EJBCA with zero operational disruption — developing a repeatable engineering methodology for a migration path the original vendor had declared impossible. This is the kind of migration complexity that ADCS replacement programmes typically involve, and it demonstrates that even the most challenging CA transitions can be executed safely with the right expertise and methodology.

Option 3: Hybrid Approach with CLM Layer

Many organisations operate a mixed certificate estate: internal certificates issued by a private CA for domain authentication, device management, and internal services, alongside public certificates from a commercial CA such as DigiCert for external-facing web servers, APIs, and customer-facing services.

In this model, the private CA — whether AD CS, EJBCA, or another platform — handles internal issuance, whilst the public CA handles externally trusted certificates. A CLM platform sits across both, providing a single pane of glass for discovery, monitoring, renewal, and policy enforcement regardless of the issuing authority.

This approach is particularly effective for organisations undergoing digital transformation where the certificate estate is distributed across on-premises, cloud, and hybrid environments. The CLM layer provides the unified visibility and automation that no single CA platform can offer alone, whilst allowing each CA to serve the use cases it is best suited to. For more on how to evaluate CLM platforms, see our guide to evaluating CLM vendors and licensing models.

ADCS Migration Checklist

Whichever replacement path you choose, the migration itself follows a common pattern. This checklist covers the essential steps that apply to any ADCS migration programme:

ACDS Migration Checklist

For a real-world example of how this process works at scale, see our migration de-risking case study where we validated a migration methodology for 20 Root CAs through a formal feasibility study before committing to production execution.

Frequently Asked Questions About ADCS Replacement

What is Active Directory Certificate Services (AD CS)?

Active Directory Certificate Services is Microsoft's built-in Certificate Authority platform, available as a Windows Server role since Windows 2000. It issues and manages digital certificates within Active Directory environments, supporting use cases such as user and device authentication, Wi-Fi and VPN access, email encryption via S/MIME, and code signing. AD CS integrates tightly with Active Directory, using Group Policy to enable automated certificate enrollment for domain-joined devices and users. It functions as a private CA, meaning the certificates it issues are trusted within the organisation's own infrastructure rather than on the public internet. For many organisations, AD CS has been the default PKI solution for over two decades, often deployed without a formal evaluation of alternatives simply because it was included with Windows Server licensing.

Why are organisations replacing ADCS?

The core issue is that AD CS was architected for a world that no longer exists — one where all devices were domain-joined, all infrastructure was on-premises, and certificate volumes were manageable through manual processes. Modern IT environments are cloud-first, multi-platform, and increasingly automated through DevOps pipelines, containerisation, and API-driven workflows. AD CS struggles in all of these areas. It lacks native support for widely adopted protocols such as ACME and EST, cannot scale to multi-cloud or multi-OS environments without significant workarounds, and has not meaningfully evolved since Windows Server 2012. The absence of centralised certificate visibility, automated lifecycle management, and post-quantum cryptography support creates operational risk and technical debt that grows with every year of continued reliance on AD CS alone.

Can I keep AD CS and just add a CLM platform on top?

Yes, and this is often the most pragmatic first step. A certificate lifecycle management platform such as Keyfactor Command or Certdog integrates directly with your existing AD CS infrastructure, providing the automated discovery, expiry monitoring, renewal orchestration, and centralised dashboard that AD CS lacks natively. Your AD CS Certificate Authorities continue to issue certificates, and auto-enrollment via Group Policy continues to function as before. The CLM layer adds the visibility and automation around it. This approach preserves your existing investment, avoids the complexity of a full CA migration, and — importantly — gives you the complete certificate inventory you will need if you decide to pursue a more comprehensive replacement later.

What is the best ADCS replacement platform?

There is no single answer because the right platform depends on your requirements, but EJBCA Enterprise is the most common full replacement we deploy. It supports ACME, EST, CMP, and SCEP natively, runs on-premises or in cloud environments, handles multi-tenancy and high availability, and is already integrating post-quantum algorithms. For organisations that need to maintain AD CS for specific legacy use cases whilst modernising the rest of their PKI, a hybrid approach using EJBCA for new workloads and a CLM layer across both is often the most effective path. Certdog is another option well suited to organisations that want lightweight, modern certificate management with direct AD CS integration. The choice should be driven by your protocol requirements, scale, deployment model, and long-term cryptographic roadmap — not by vendor marketing.

How long does an ADCS migration take?

A realistic timeline depends on the size and complexity of your certificate estate, but as a general guide: a supplementation project (adding CLM on top of AD CS) can typically be delivered in 4 to 8 weeks including discovery, configuration, and integration. A full CA replacement — migrating all certificate issuance from AD CS to a new platform — is a more substantial programme, typically 3 to 9 months depending on the number of CAs, certificate templates, auto-enrollment dependencies, and application integrations involved. The most complex migrations we have delivered, including the 20 Root CA migration from Entrust to EJBCA for a central government department, have been multi-month programmes with formal feasibility phases before production execution. The key variable is not the technology — it is the discovery and dependency mapping that determines how long the migration will take.

Will replacing ADCS break auto-enrollment?

This is the most common concern, and rightly so. Auto-enrollment via Group Policy is deeply embedded in many organisations' device management workflows, and breaking it would cause immediate operational disruption. The good news is that this dependency can be managed in all three replacement paths. If you supplement with CLM, auto-enrollment continues unchanged because AD CS remains the issuing CA. If you migrate to EJBCA or another platform, auto-enrollment can be replicated through ACME or EST protocol integration, or through the CLM platform handling provisioning on behalf of the new CA. The critical step is to identify every auto-enrollment dependency during the discovery phase and explicitly plan how each one will be addressed in the target architecture. This is why the migration checklist starts with inventory and template mapping before any changes are made.

Does AD CS support post-quantum cryptography?

Not yet in production, though Microsoft has signalled that PQC support is coming. Updates to SymCrypt and CNG (Cryptography Next Generation) include initial PQC algorithm support, and Microsoft has emphasised TLS 1.3 as the transport layer for quantum-safe key exchange. However, there is no published timeline for when AD CS will fully support NIST-approved PQC algorithms such as ML-KEM and ML-DSA in production certificate issuance. For organisations that need PQC readiness before Microsoft delivers it, platforms like Crypto4A QxHSM and EJBCA Enterprise already support post-quantum algorithms in production. If your data has long-term sensitivity and you are concerned about harvest now, decrypt later exposure, waiting for Microsoft's PQC roadmap may not be an acceptable risk position.

What happens to my existing certificates when I migrate away from ADCS?

Existing certificates issued by AD CS remain valid until they expire, regardless of whether you decommission the issuing CA. The certificates themselves are standalone cryptographic objects — they do not require the CA to be running in order to function. What you lose when you decommission the CA is the ability to issue new certificates from that CA and, if you also decommission the CRL distribution point, the ability for relying parties to check revocation status. The standard migration approach is to run the new CA in parallel with AD CS, gradually transitioning certificate consumers to the new platform. As existing AD CS certificates reach their natural expiry, they are renewed from the new CA rather than the old one. The AD CS CA is only decommissioned once all dependent certificates have been migrated or have expired. CA databases and audit logs should be retained in accordance with your organisation's data retention policies.

How do I know which certificates AD CS has issued?

The AD CS CA database contains a record of every certificate it has issued, but the native tooling for querying and reporting on this data is limited. The certutil command-line tool can export the database, but parsing and analysing the output at scale requires additional scripting or tooling. A more effective approach is to deploy a CLM platform with automated discovery capabilities, which will scan your network, certificate stores, and CA databases to build a comprehensive inventory. This inventory should include not just the certificates themselves but also where they are deployed, which applications depend on them, and when they expire. Building a cryptographic bill of materials that extends beyond certificates to cover algorithms, keys, and libraries provides the complete foundation for any migration programme.

Is ADCS replacement covered by existing Microsoft licensing?

AD CS itself is included with Windows Server licensing at no additional cost, which is one reason it has been so widely adopted. Replacing it with a third-party platform will introduce new licensing costs — either per-certificate, per-CA, per-server, or subscription-based depending on the vendor and deployment model. However, the total cost comparison should account for the hidden costs of maintaining AD CS: the manual effort of certificate tracking without CLM, the risk cost of outages caused by expired certificates, the opportunity cost of not supporting modern protocols and cloud-native workloads, and the eventual cost of PQC migration from a platform that may not support it. In our experience, the operational savings from automation and the risk reduction from centralised visibility typically offset the licensing costs of a modern platform within 12 to 18 months.

Conclusions: Supplement or Replace Active Directory Certificate Services

While your AD CS implementation may have effectively met past requirements, it is essential to assess whether it aligns with current needs. If there is a significant gap between what is delivered and what is required, consider the following options:

Supplementation — Enhance AD CS by integrating it with CLM technology to incorporate features like automation, full visibility, and compliance. This approach makes sense for organisations heavily invested in the Microsoft ecosystem who need to address specific limitations whilst maintaining their existing Certificate Authority infrastructure.

Replacement — Take a more holistic approach and replace AD CS to better meet your current requirements by transitioning to a platform like EJBCA Enterprise that supports a cloud-first strategy. Modern alternatives support provisioning certificates across cloud environments, integrate with DevOps tools, provide automation that reduces risk, and offer the flexibility needed for digital transformation without the limitations inherent in Microsoft ADCS.

Whichever path you choose, the starting point is the same: understanding what certificates you have, where they are, and what depends on them. Unsung’s PKI consultancy team has delivered ADCS migrations across government and enterprise environments, from supplementation with CLM through to full CA replacement at scale. If you are evaluating your options, we would welcome the conversation.

Unsung Ltd
Unsung Ltd
September 11, 2025
-
20 min Read