Share via


Active Directory Certificate Services (AD CS) Public Key Infrastructure (PKI) Frequently Asked Questions (FAQ)

AD CS PKI FAQ

This article presents a list of common questions and answers related to Active Directory Certificate Services (AD CS) and Public Key Infrastructure (PKI).

Where should I post my AD CS questions?

If you need an answer that is not covered on this page or linked to by this page, you will probably get it quickest through search. However, if you cannot find the answer, you can post your certificate services questions to the Windows Server Security Forum (http://social.technet.microsoft.com/Forums/en-US/winserversecurity/threads). Please, be sure to search the forum before posting, to see if that question has already been answered in another thread. If you find that you've got a commonly asked question and answer, please, add it to this article. 

Return to Top  

Which blogs should I follow for AD CS?

Return to Top

Where can I find more information about AD CS Events in the Event Viewer?

There are several places to look, depending on your operating system version. The resources of the supported operating system are:

Return to Top

What are the changes for AD CS between Windows Server 2008 and Windows Server 2008 R2?

The following resources elaborate on the differences between the two server versions:

Return to Top

What are the changes for AD CS since Windows Server 2008 R2?

The changes are described in the TechNet article What's New in Certificate Services in Windows Server

There are also some PKI client changes described in Client Certificates Overview

Return to Top

Will you post any videos on Active Directory Certificate Services?

There are a couple already posted.

Note: The videos referred above are no longer available. 

Return to Top

How do I install Windows Server 2008 R2 CA on Server Core or Minimal Server Interface?

There is a document that specifically addresses installing certification authority (CA) on Windows Server 2008 R2 Server Core:

Windows Server editions prior to Windows Server 2008 do not support Server Core installation. If you are running Windows Server 2008 R2, then you should also review the Edition Comparison by Server Core Installation Option, to see if your edition supports running AD CS on Server Core. 

Return to Top

How do I install Windows Server 2012 AD CS on Server Core?

You can install all AD CS server roles using Windows PowerShell in Windows Server 2012. For details, see AD CS Deployment cmdlets in Windows PowerShell

Return to Top

Where can I find installation information for AD CS Server Roles for Windows Server 2012?

There are two main ways to install Active Directory Certificate Services Roles in Windows Server 2012: User interface or Windows PowerShell.

The additional information for installing using the user interface is divided among several topics (depending on the Server Role you want to install). These are:

The Windows PowerShell installation information is also organized by Server Role, but there is the main page titled   AD CS Deployment cmdlets in Windows PowerShell

Return to Top

Which firewall ports need to be opened for Active Directory Certificate Services?

There is a PKI blog entry that covers this information titled Firewall Rules for Active Directory Certificate services.
 
Return to Top

Can I have my root CA certificate issued by a trusted third-party CA?

No, because a root certification authority (CA), by definition signs its own certificate. If you want another entity (trusted third-party CA) to sign your CA certificate, then you will, by definition, have a subordinate CA. Depending on your business requirements, you may want to consider using cross-forest trusts or utilize a third-party managed CA service as well. A few documents that may help you figure out the type of PKI design you want include:

Return to Top

Where can I see the certificates that are part of the Microsoft root certificate program?

See the TechNet Wiki article Windows and Windows Phone 8 SSL Root Certificate Program (Member CAs) 

Return to Top

Can wild card characters be used with SSL certificates?

Microsoft's Cryptographic Application Programming Interface 2 (CAPI2) allows wildcards for the leftmost name component in the Fully Qualified Domain Name (FQDN). However, the behavior is a bit more restrictive than RFC 2818 specifies , the logic used for Microsoft's CAPI2 wildcards are expanded upon in Microsoft Knowledge Base article 258858 "Accepted wildcards used by server certificates for server authentication."
 
Return to Top

What happens to any computer certificates issued to computers that are disabled or deleted in Active Directory?

If the computer (also called device or machine by some) is deleted, disabled, or disconnected after the certificate is issued, the certificate remains in Certification Authority console and in Active Directory. Eventually, the certificate will expire since it cannot be renewed.
 
Return to Top

Is a CA name change supported when migrating from one OS version to another?

No. The only supported method for migrating a certification authority (CA) from one operating system (OS) version to another is to maintain the same CA name. A hostname change is supported, but the CA name must stay the same. Referencehttp://technet.microsoft.com/en-us/library/cc742466%28WS.10%29.aspxin the Supported Migrations table.
 
Return to Top

What should I do about the error "The requested certificate template is not supported by this CA 0x80094800 (-2146875392)). Denied by Policy Module 0x80094800?"

The error "Certificate enrollment failed to enroll for a digital signature certificate with request ID 43 from <caname>. (The requested certificate template is not supported by this CA 0x80094800 (-2146875392)). Denied by Policy Module 0x80094800?" can occur if targeted user group does not have access to Enroll or if targeted computer or user accounts do not have access to read a Group Policy Object (GPO) distributing the policy. Ensure that Authenticated Users or a targeted group of users and computers has Read access to the GPO. See also  Troubleshooting Certificate Autorenewal in Active Directory Certificate Services (AD CS)  and Troubleshooting (Advanced Certificate Enrollment and Management)

Return to Top

Is the Simple Certificate Enrollment Protocol (SCEP) or the Network Device Enrollment Service (NDES) supported by Windows Server 2003 editions?

Yes, there is a SCEP Add-On for Windows Server 2003 called Microsoft Simple Certificate Enrollment Protocol (MSCEP). 

Return to Top

Is the Online Responder OCSP supported by Windows Server 2003 editions

No, the Online Responder was introduced with Windows Server 2008 in the Enterprise and Datacenter editions only. For more about the differences between versions and editions of AD CS, see the table in the Active Directory Certificate Services Overview

Return to Top

Does Enterprise PKI (PKIView) support OCSP?

Yes, the Microsoft Management Console (MMC) Enterprise PKI (PKIView), supports OCSP.

When setting up Certificate Extensions, you must ensure that the Include in the AIA extension of issued certificates is not selected. That option is located in the Extensions tab of the CA Properties in the Certification Authority console. The correct configuration for an http path specifying the AIA for an Online Responder is shown in the following figure. 

Return to Top

How does a certificate services client select the certification authority from which to enroll or renew?

Starting with Windows Vista, the process goes:

1. A list is built containing the CAs that support the relevant template and for which the client has enrolled permission.

2. The list is sorted randomly.

3. After that, each CA in the list is tried in order until one response.

To load-balance CAs or control where clients enroll and renew, you can use the enroll permissions on the templates and CAs themselves. The client computers are not Active Directory Domain Services (AD DS) site aware. 

Return to Top

Can an OCSP provider (Online Responder) support multiple certification authorities that reside in different forests?

Yes. In order for this to work the Online Responder needs are a certification authority (CA) certificate, a signing certificate, and access to the certificate revocation list (CRL).  

Return to Top

When S/MIME certificates are issued by AD CS, is there any automatic way to publish the S/MIME certificate for the Exchange GAL?

You can configure a template on the CA to be published to the user account when its published (http://technet.microsoft.com/en-us/library/cc730861.aspx). This in turn, makes it available for Outlook to use. 

Return to Top

Is there a way to delete expired certificates from a certificate database without placing them in the certificate revocation list (CRL)?

Yes, you can compact the CA database. See http://blogs.technet.com/b/askds/archive/2010/08/31/the-case-of-the-enormous-ca-database.aspx  for more information. 

Return to Top

How should I build and maintain my offline certification authorities (CAs)?

See the TechNet Wiki articles specific to building and maintaining offline CAs. They are:

 ↑ Return to Top

How many Subject Alternate Names (SANs) are supported?

A CA running on Windows Server can support an extension of 4096 bytes, which is where the Subject Alternate Names (SANs) are placed. Any request that exceeds that limit will be rejected and no certificate will be issued. 

Return to Top

Can I cluster the Online Responder (OSCP) role?

Yes, you can use a Network Load Balancing (NLB) cluster. For details, see Implementing an OCSP Responder: Part V High Availability

Return to Top

What is the Certificate Template setting Publish certificate in Active Directory?

This setting indicates the certificate issued based on the certificate template should be published to the Active Directory Domain Services (AD DS) database.

When this setting is enabled, the user or computer object in the AD DS database is updated with the certificate of the user or computer respectively.

The private key is not published to the AD DS database.

For both computer and user certificates, the userCertificate attribute of the AD DS object is updated with the certificate.

The CA must have to write permission to the AD DS database user and computer objects to make this update.

The permission to write to the computer and user objects in the AD DS database is granted to CAs through their membership in the Cert Publishers group by default.

This setting is typically only used with certificates of users. When a user’s certificate is published in the AD DS database, other users can search the AD DS database to find the certificate of that user. The certificate can then be used to encrypt email or files to the user whose certificate is published in the AD DS database.

 

Return to Top

How can I make the Network Device Enrollment Service (NDES) highly available or redundant?

NDES servers create unique one-time codes for each enrollment. The requesting device must submit this passcode along with the SCEP certificate request, and the code is validated by the NDES server. The client must submit the passcode to the same NDES server that generated it. There is no there is no way to guarantee a requesting device can contact the same NDES server by using DNS round-robin or network load balancing (NLB).

Although not recommended because it is not secure, you could use single password mode on all NDES servers and set the same password, then load-balance. Another option is to create multiple independent NDES servers and if one fails, manually try the other. The certification authority (CA) that is providing the certificates can be configured for fail-over .

 

Return to Top

When Does a CA Need to Contact a Writeable Domain Controller?

A CA must contact a writeable domain controller (as opposed to a read-only domain controller, RODC) in the following circumstances:

  • When the CA reads templates, because it may need to add superseded domain controller templates to the CA object
  • When the CA queries the user and computer objects
  • If the CA is configured to publish a certificate revocation list (CRL) to LDAP.
  • If the CA issues a certificate that is configured to be published to Active Directory Domain Services (AD DS)   

 ↑ Return to Top

The CA CMOS BIOS battery was replaced and now certificate services will not start

This is likely a result of the time and date being reset to the default (base) BIOS date. To resolve this issue, you can do the following:

  1. Correct the date and time in the CMOS / BIOS Setup settings on the computer (use the computer manufacturer's instructions).
  2. Import the root CA certificate from %systemroot%\system32\certsrv\certenroll into the trusted root certification authorities container on the local computer
  3. Start the certificate service

For more information, see http://blogs.technet.com/b/instan/archive/2011/05/02/the-ca-certificate-that-disappeared-after-the-cmos-battery-died.aspx  

↑ Return to Top

Can I add an extension to the Certification Authority SMTP module?

I use a Certification Authority SMTP module to send the information about a new certificate request for SSL certificates to the administrator. With the current setting, I get the request ID, the requestor name, the certificate subject name as well as other information. I would like to add the information about a SAN (Subject Alternative Name) to the email. Can I add an extension to the Certification Authority SMTP module?

No. There is no support for including extensions into the SMTP email notifications  

↑ Return to Top

Additional PKI Resources

Return to Top