Skip to main content

IIS (Internet Information Services)

SecTrail CM enables automatic deployment and renewal of SSL certificates by establishing agentless connections to Windows IIS (Internet Information Services) web servers.

Connection Requirements​

RequirementDetailDescription
ProtocolWinRM (Windows Remote Management)Uses Windows Remote Management protocol
Port5986/ 5985HTTPS port recommended for secure connection
TransportNTLM / Kerberos / CredSSPWindows authentication mechanisms
AuthenticationDomain account / Local AdministratorWindows user credentials

Automated Operations​

SecTrail CM automatically performs the following operations on Windows IIS:

  1. Certificate Store Import: Secure transfer of certificate and private key to Windows Certificate Store
  2. IIS Binding Update: Updating Virtual Server (Web Site) SSL bindings
  3. Configuration Backup: Backing up configuration before changes
  4. SSL Validation: HTTPS connection testing and validation

Configuration Steps​

1. Creating IIS User​

Navigate to Automation > Device Users and create a user for IIS:

  • Windows domain user
  • Or local administrator

2. Adding IIS Device to SecTrail CM​

Click Automation > Devices > Add New Device button and enter the following information:

IIS Device Creation

  • Name: Provide a descriptive name for the device
  • Device Users: Select the Windows user created in Step 1
  • IP: Enter the IP address of the Windows IIS server
  • Device Type: Select IIS from the dropdown menu
  • Connection: Select either WinRM or SSH
  • Transport: Select either NTLM or Kerberos
  • Connection Type: Select Secure for secure connection
  • Port: WinRM port (default: 5986 HTTPS or 5985 HTTP)
  • Trust Store: Include Trust Store? Disabled or Enabled
Automatic Discovery

After the IIS device is added to SecTrail CM, the IP addresses and ports of all Web Sites defined on the device are automatically included in the discovery period and scanned regularly.

3. Viewing Device Information​

After the device is added, it will be displayed in the Automation > Devices list. Click on the row to view device details:

IIS Device Details and Virtual Server List

  • IP Address: IP address of the IIS server
  • Port: HTTPS port (443)
  • Hostname: Hostname information of the IIS website
  • Certificate Subject: Subject (CN) information of the current certificate
  • Sites: IIS site name (Default Web Site or custom site name)
  • SSL Flags: SSL flag value (0: no SNI, 1: SNI present)
  • Thumbprint: Thumbprint value of the current certificate
  • Not After: Certificate expiration date
  • Deploy: For certificate deployment

Certificate Deployment​

Step 1: Virtual Server and Certificate Selection​

  1. Select your IIS device from Automation > Devices
  2. In the device details, find the Virtual Server (Web Site binding) where you want to deploy the certificate
  3. Click the Deploy button on the relevant row
  4. In the Deploy Certificate window that opens:
    • Virtual Servers: Target Virtual Server information is displayed (Hostname, IP, Port)
    • Certificate: Select the certificate you want to deploy from the dropdown menu

Certificate Deployment Screen

Step 2: Starting the Deployment Process​

Click the Deploy button to start the certificate deployment process.

Step 3: Process Tracking​

The deployment process can be tracked from Automation > Processes:

IIS Deployment and Rollback Operations

Operation Details​

The following steps are performed during deployment:

StepOperation Description
1Certificate is imported to Windows Certificate Store in PFX format
2IIS website SSL binding configuration is updated

Rollback Operation​

The Manual Rollback feature can be used in case of issues after certificate deployment.

Automatic Rollback

If an error occurs at any step during the deployment process, the system automatically performs a rollback and all changes are reverted.

Rollback Steps​

  1. Navigate to Automation > Processes
  2. Find the operation you want to rollback
  3. Use the Manual-Rollback option in the Status column
  4. Confirm

Operations During Rollback​

StepOperation
1IIS website SSL binding is reverted to its previous state
2Old certificate binding is restored