We are cleaning up our Windows PKI/CA environment and replacing our root CA with a new server. The current root CA has been issuing the following certificate templates for years now (in addition to the Subordinate certificate template):
- Kerberos Authentication
- Domain Controller Authentication (we know this is superseded now by the Kerberos Authentication template)
- Domain Controller (we know this is superseded now)
- Directory Email Replication
The subordinate CA also has the templates "issued".
We know that this isn't ideal, and the new root CA will be set to only issue the subordinate certificate template.
THE QUESTION:
After removing the templates above from being issued by the root CA (NOT deleting the template itself, just removing it from being issued from that root CA), when the domain controllers automatically renew those certificates above, will they know to look at the subordinate CA for the renewal/issuance of a new certificate based on those templates required for a domain controller? Or is there something else we need to do to proactively issue new certificates to the DC's in the environment? The existing certificates won't be revoked so they'll be valid until re-enrollment happens, but we are curious if re-enrollment will fail if the original certs were issued by the old root CA. We aren't sure how DC's "decide" which CA to pick from if more than one CA is allowed to issue these DC templates.
Additional Add-On Question:
Do you know what affect existing certs will have that were issued from the existing SubCA after we replace the rootCA? We are migrating the rootCA to a new name per: Step-By-Step Migrating CA to new server -- others in the comments asked basically the same question I'm asking about existing certs but with no reply. My guess is that as long as the client still has the old RootCA in their Trusted Root Store and the SubCA in the Intermediate Store, they should still have a good cert chain until the cert expires, but I'd like to know for sure ahead of time.