.. Reminder for header structure: Parts (H1) : #################### with overline Chapters (H2) : ******************** with overline Sections (H3) : ==================== Subsections (H4) : -------------------- Subsubsections (H5) : ^^^^^^^^^^^^^^^^^^^^ Paragraphs (H6) : """"""""""""""""""""" .. |date| date:: .. meta:: :description: Storing Bitlocker keys in Samba Active Directory :keywords: Security, Samba-AD, documentation, Bitlocker .. _samba_bitlocker_ad: ################################################ Storing Bitlocker keys in Samba Active Directory ################################################ This strategy configures the storage of *BitLocker* decryption keys in an Active Directory domain controller, preventing unrecoverable data loss. Open :guilabel:`Group Policy Management` on your management machine, then create a new GPO object for the computers on which you want to activate *Bitlocker*. Here we will apply a GPO to the root of the domain to force *Bitlocker* on the operating system drive without a compatible secure encryption module (smart card,…). Enable the policy in your GPO with :menuselection:`Computer Configuration -> Administrative Templates-> Windows Components -> Bitlocker Drive Encryption -> Save BitLocker recovery information in Active Directory Domain Services`. .. figure:: ../images/bitlocker.png :align: center :scale: 50% :alt: Recording Bitlocker information Recording Bitlocker information Then enable this strategy in your GPO with :menuselection:`Computer Configuration -> Administration Models -> Windows Components -> Bitlocker Drive Encryption -> Operating System Drives -> Select the method for recovering operating system drives protected by Bitlocker`. .. figure:: ../images/select_method.png :align: center :scale: 50% :alt: Selecting the recovery method Selecting the recovery method Finally, the last necessary step in our case is to allow *Bitlocker* without a compatible secure encryption module. You must therefore activate the following strategy in your GPO with :menuselection:`Computer Configuration -> Policies -> Administration Models -> Windows Components -> Bitlocker Drive Encryption -> Operating System Drives -> Request additional authentication at boot time`. Tick :guilabel:`Authorize Bitlocker` without a compatible secure platform module. .. figure:: ../images/noTPM.png :align: center :scale: 100% :alt: Allowing Bitlocker without a TPM module Allowing Bitlocker without a TPM module From now on, each computer in the domain activating *Bitlocker* will have its key registered in AD. To view these keys, launch Enable or disable Windows features and enable the feature :menuselection:`Remote server administration tools -> Feature administration tools -> Bitlocker Recovery Password Viewer`. .. code-block:: bash regsvr32.exe bdeaducext.dll The tab :guilabel:`Bitlocker Recovery` must now appear in the properties of each *BitLocker* enabled host. .. figure:: ../images/proprietes.png :align: center :scale: 100% :alt: Properties of the computer Properties of the computer