Compartir a través de


2.27 msPKI-Private-Key-Flag Attribute

The msPKI-Private-Key-Flag attribute specifies the private key flags. Its value can be 0 or can consist of a bitwise OR of flags from the following table.<35>

Flag

Meaning

0x00000001

CT_FLAG_REQUIRE_PRIVATE_KEY_ARCHIVAL

This flag instructs the client to create a key archival certificate request, as specified in [MS-WCCE] sections 3.1.2.4.2.2.2.8 and 3.2.2.6.2.1.4.5.7.

0x00000010

CT_FLAG_EXPORTABLE_KEY

This flag instructs the client to allow other applications to copy the private key to a .pfx file, as specified in [RFC7292], at a later time.

0x00000020

CT_FLAG_STRONG_KEY_PROTECTION_REQUIRED

This flag instructs the client to use additional protection for the private key.

0x00000040

CT_FLAG_REQUIRE_ALTERNATE_SIGNATURE_ALGORITHM

This flag instructs the client to use an alternate signature format. For more details, see [MS-WCCE] section 3.1.2.4.2.2.2.8.

0x00000080

CT_FLAG_REQUIRE_SAME_KEY_RENEWAL

This flag instructs the client to use the same key when renewing the certificate.<36>

0x00000100

CT_FLAG_USE_LEGACY_PROVIDER

This flag instructs the client to process the msPKI-RA-Application-Policies attribute as specified in section 2.23.1.<37>

0x00000000 *

CT_FLAG_ATTEST_NONE

This flag indicates that attestation data is not required when creating the certificate request. It also instructs the server to not add any attestation OIDs to the issued certificate. For more details, see [MS-WCCE] section 3.2.2.6.2.1.4.5.7.

0x00002000 *

CT_FLAG_ATTEST_REQUIRED

This flag informs the client that attestation data is required when creating the certificate request. It also instructs the server that attestation must be completed before any certificates can be issued. For more details, see [MS-WCCE] sections 3.1.2.4.2.2.2.8 and 3.2.2.6.2.1.4.5.7.

0x00001000 *

CT_FLAG_ATTEST_PREFERRED

This flag informs the client that it SHOULD include attestation data if it is capable of doing so when creating the certificate request. It also instructs the server that attestation might or might not be completed before any certificates can be issued. For more details, see [MS-WCCE] sections 3.1.2.4.2.2.2.8 and 3.2.2.6.2.1.4.5.7.

0x00004000 *

CT_FLAG_ATTESTATION_WITHOUT_POLICY

This flag instructs the server to not add any certificate policy OIDs to the issued certificate even though attestation SHOULD be performed. For more details, see [MS-WCCE] section 3.2.2.6.2.1.4.5.7.

0x00000200 *

CT_FLAG_EK_TRUST_ON_USE

This flag indicates that attestation based on the user's credentials is to be performed. For more details, see [MS-WCCE] section 3.2.2.6.2.1.4.5.7.

0x00000400 *

CT_FLAG_EK_VALIDATE_CERT

This flag indicates that attestation based on the hardware certificate of the Trusted Platform Module (TPM) is to be performed. For more details, see [MS-WCCE] section 3.2.2.6.2.1.4.5.7.

0x00000800 *

CT_FLAG_EK_VALIDATE_KEY

This flag indicates that attestation based on the hardware key of the TPM is to be performed. For more details, see [MS-WCCE] section 3.2.2.6.2.1.4.5.7.

0x00200000 *

CT_FLAG_HELLO_LOGON_KEY

This flag indicates that the key is used for Windows Hello logon. For more details, see [MS-WCCE] section 3.2.2.6.2.1.4.5.7.

* Support for these flags is specified in the following behavior note.<38>

  • The bitwise AND of the value of the msPKI-Private-Key-Flag attribute and 0x000F0000 determines whether the current CA can issue a certificate based on this template, as explained in [MS-WCCE] section 3.2.2.6.2.1.4.5.7.

  • The bitwise AND of the value of the msPKI-Private-Key-Flag attribute and 0x0F000000 determines whether the current template is supported by the client, as explained in [MS-WCCE] section 3.1.2.4.2.2.2.8.

For schema details of this attribute, see [MS-ADA2] section 2.618.