Partager via


Demande EOBO CMC

L’exemple suivant contient une requête S’inscrire au nom de (EOBO) CMC. L’exemple a été généré à l’aide des outils Certreq.exe et Certutil.exe. Le fichier .inf utilisé comme entrée pour Certreq.exe contient la configuration suivante.

[NewRequest]
RequestType=cmc
RequesterName=Domain\TargetUser

[RequestAttributes]
CertificateTemplate=User

Cette configuration génère l’exemple de sortie suivant. La configuration spécifie le type de requête (CMC), le nom de l’entité qui demande l’inscription et le nom du modèle. Le modèle Utilisateur spécifie que :

  • La demande doit utiliser le fournisseur de chiffrement de base Microsoft 1.0 ou le fournisseur de chiffrement microsoft amélioré 1.0.
  • Le nom de l’objet doit être généré à partir d’Active Directory.
  • La demande inclut les extensions Nom du modèle de certificat, Utilisation améliorée de la clé (EKU) et Utilisation de la clé. L’extension EKU spécifie que le certificat émis peut être utilisé pour le chiffrement du système de fichiers (EFS), la messagerie sécurisée et l’authentification du client.
PKCS7/CMS Message:
  CMSG_SIGNED(2)
  CMSG_SIGNED_DATA_CMS_VERSION(3)
  Content Type: 1.3.6.1.5.5.7.12.2 CMC Data

PKCS7 Message Content:
================ Begin Nesting Level 1 ================
CMS Certificate Request:
Tagged Attributes: 2

  Body Part Id: 3
  1.3.6.1.4.1.311.10.10.1 CMC Attributes
  Value[0]:
    Data Reference: 0
    Cert Reference[0]: 1
  1 attributes:

  Attribute[0]: 1.3.6.1.4.1.311.21.20 (Client Information)
    Value[0][0]:
    Unknown Attribute type
    Client Id: = 9
      (XECI_DISABLE -- 0)
      (XECI_XENROLL -- 1)
      (XECI_AUTOENROLL -- 2)
      (XECI_REQWIZARD -- 3)
      (XECI_CERTREQ -- 4)
    User: JDOMCSC\administrator
    Machine: vich3d.jdomcsc.nttest.microsoft.com
    Process: certreq
    0000  30 48 02 01 09 0c 23 76  69 63 68 33 64 2e 6a 64   0H....#vich3d.jd
    0010  6f 6d 63 73 63 2e 6e 74  74 65 73 74 2e 6d 69 63   omcsc.nttest.mic
    0020  72 6f 73 6f 66 74 2e 63  6f 6d 0c 15 4a 44 4f 4d   rosoft.com..JDOM
    0030  43 53 43 5c 61 64 6d 69  6e 69 73 74 72 61 74 6f   CSC\administrato
    0040  72 0c 07 63 65 72 74 72  65 71                     r..certreq

  Body Part Id: 2
  1.3.6.1.5.5.7.7.18 Reg Info
  Value[0]:
    RequesterName: Domain\TargetUser

Tagged Requests: 1
  CMC_TAGGED_CERT_REQUEST_CHOICE:
  Body Part Id: 1
================ Begin Nesting Level 2 ================
Element 0:
PKCS10 Certificate Request:
Version: 1
Subject:
    EMPTY

Public Key Algorithm:
    Algorithm ObjectId: 1.2.840.113549.1.1.1 RSA (RSA_SIGN)
    Algorithm Parameters:
    05 00
Public Key Length: 1024 bits
Public Key: UnusedBits = 0
    0000  30 81 89 02 81 81 00 b7  0f 10 7a 44 05 74 91 3c
    0010  b9 6e 6d bb 5f f9 27 74  66 15 7c cb 45 a4 df ba
    0020  2c 18 fc c3 da 2c 4a 7c  ef e7 7f 46 61 3a 59 1c
    0030  37 d7 26 2f 55 f8 94 8b  f9 b4 84 7e ed 74 dc de
    0040  d4 2c 19 6b ef 7c f5 07  57 1f 9b ee 16 d4 21 d4
    0050  33 7e 4d 47 b2 5d ee 81  6a fd b8 63 b2 db 7f 2a
    0060  15 1e 68 3c 1c bb 54 a3  d8 90 c0 66 d2 e1 4a b2
    0070  bb 2e ce 23 97 99 48 e1  cd 3b 1d 1c 11 bf 6e d3
    0080  00 08 30 e8 6a e1 bb 02  03 01 00 01
Request Attributes: 5
  5 attributes:

  Attribute[0]: 1.3.6.1.4.1.311.13.2.3 (OS Version)
    Value[0][0]:
        6.0.5361.2
    0000  16 0a 36 2e 30 2e 35 33  36 31 2e 32               ..6.0.5361.2

  Attribute[1]: 1.3.6.1.4.1.311.13.2.1 (Enrollment Name Value Pair)
    Value[1][0]:
        CertificateTemplate=User
    0000  30 32 1e 26 00 43 00 65  00 72 00 74 00 69 00 66   02.&.C.e.r.t.i.f
    0010  00 69 00 63 00 61 00 74  00 65 00 54 00 65 00 6d   .i.c.a.t.e.T.e.m
    0020  00 70 00 6c 00 61 00 74  00 65 1e 08 00 55 00 73   .p.l.a.t.e...U.s
    0030  00 65 00 72                                        .e.r

  Attribute[2]: 1.3.6.1.4.1.311.21.20 (Client Information)
    Value[2][0]:
    Unknown Attribute type
    Client Id: = 9
      (XECI_DISABLE -- 0)
      (XECI_XENROLL -- 1)
      (XECI_AUTOENROLL -- 2)
      (XECI_REQWIZARD -- 3)
      (XECI_CERTREQ -- 4)
    User: JDOMCSC\administrator
    Machine: vich3d.jdomcsc.nttest.microsoft.com
    Process: certreq
    0000  30 48 02 01 09 0c 23 76  69 63 68 33 64 2e 6a 64   0H....#vich3d.jd
    0010  6f 6d 63 73 63 2e 6e 74  74 65 73 74 2e 6d 69 63   omcsc.nttest.mic
    0020  72 6f 73 6f 66 74 2e 63  6f 6d 0c 15 4a 44 4f 4d   rosoft.com..JDOM
    0030  43 53 43 5c 61 64 6d 69  6e 69 73 74 72 61 74 6f   CSC\administrato
    0040  72 0c 07 63 65 72 74 72  65 71                     r..certreq

  Attribute[3]: 1.3.6.1.4.1.311.13.2.2 (Enrollment CSP)
    Value[3][0]:
    Unknown Attribute type
    CSP Provider Info
    KeySpec = 1
    Provider = Microsoft Enhanced Cryptographic Provider v1.0
    Signature: UnusedBits=0
    0000  30 64 02 01 01 1e 5c 00  4d 00 69 00 63 00 72 00   0d....\.M.i.c.r.
    0010  6f 00 73 00 6f 00 66 00  74 00 20 00 45 00 6e 00   o.s.o.f.t. .E.n.
    0020  68 00 61 00 6e 00 63 00  65 00 64 00 20 00 43 00   h.a.n.c.e.d. .C.
    0030  72 00 79 00 70 00 74 00  6f 00 67 00 72 00 61 00   r.y.p.t.o.g.r.a.
    0040  70 00 68 00 69 00 63 00  20 00 50 00 72 00 6f 00   p.h.i.c. .P.r.o.
    0050  76 00 69 00 64 00 65 00  72 00 20 00 76 00 31 00   v.i.d.e.r. .v.1.
    0060  2e 00 30 03 01 00                                  ..0...

  Attribute[4]: 1.2.840.113549.1.9.14 (Certificate Extensions)
    Value[4][0]:
    Unknown Attribute type
Certificate Extensions: 4
    1.3.6.1.4.1.311.20.2: Flags = 0, Length = a
    Certificate Template Name (Certificate Type)
        User

    0000  1e 08 00 55 00 73 00 65  00 72                     ...U.s.e.r

    2.5.29.37: Flags = 0, Length = 22
    Enhanced Key Usage
        Encrypting File System (1.3.6.1.4.1.311.10.3.4)
        Secure Email (1.3.6.1.5.5.7.3.4)
        Client Authentication (1.3.6.1.5.5.7.3.2)

    0000  30 20 06 0a 2b 06 01 04  01 82 37 0a 03 04 06 08   0 ..+.....7.....
    0010  2b 06 01 05 05 07 03 04  06 08 2b 06 01 05 05 07   +.........+.....
    0020  03 02                                              ..

    2.5.29.15: Flags = 1(Critical), Length = 4
    Key Usage
        Digital Signature, Key Encipherment (a0)

    0000  03 02 05 a0                                        ....

    2.5.29.14: Flags = 0, Length = 16
    Subject Key Identifier
        a4 f5 5a 3a e5 a5 63 9a 26 06 9a 86 80 b7 39 96 42 c2 d6 92

    0000  04 14 a4 f5 5a 3a e5 a5  63 9a 26 06 9a 86 80 b7   ....Z:..c.&.....
    0010  39 96 42 c2 d6 92                                  9.B...

    0000  30 73 30 17 06 09 2b 06  01 04 01 82 37 14 02 04   0s0...+.....7...
    0010  0a 1e 08 00 55 00 73 00  65 00 72 30 29 06 03 55   ....U.s.e.r0)..U
    0020  1d 25 04 22 30 20 06 0a  2b 06 01 04 01 82 37 0a   .%."0 ..+.....7.
    0030  03 04 06 08 2b 06 01 05  05 07 03 04 06 08 2b 06   ....+.........+.
    0040  01 05 05 07 03 02 30 0e  06 03 55 1d 0f 01 01 ff   ......0...U.....
    0050  04 04 03 02 05 a0 30 1d  06 03 55 1d 0e 04 16 04   ......0...U.....
    0060  14 a4 f5 5a 3a e5 a5 63  9a 26 06 9a 86 80 b7 39   ...Z:..c.&.....9
    0070  96 42 c2 d6 92                                     .B...
Signature Algorithm:
    Algorithm ObjectId: 1.2.840.113549.1.1.5 sha1RSA
    Algorithm Parameters:
    05 00
Signature: UnusedBits=0
    0000  bb ec 11 7a bb 66 fe 55  d8 1a e4 b1 2b 3a 1f 45
    0010  a1 a2 db f8 75 7a 4c 58  73 90 1e 68 18 53 2d 35
    0020  e2 38 75 5d 8b 3e d6 dd  9b c4 c7 c8 b2 6b da 49
    0030  45 8a 7c a2 fc b8 37 ff  8e b7 f2 49 a1 d2 da fd
    0040  fb 9f 26 d0 31 9d f8 ce  10 0d 2b 19 f3 d4 20 81
    0050  b0 ed 17 0c 4b f2 bf 92  3d 42 ba 62 6b 7c d5 8a
    0060  c4 ec 0b 56 7d fa ac 69  df b8 54 6f 31 98 7d 84
    0070  fa 8e 66 ce d9 4d 08 a1  92 8d ba 77 24 cd 71 5d
Signature matches Public Key
Key Id Hash(rfc-sha1): a4 f5 5a 3a e5 a5 63 9a 26 06 9a 86 80 b7 39 96 42 c2 d6 92
Key Id Hash(sha1): a6 30 45 3d a9 90 27 7d 35 48 d4 06 94 42 b7 1f 52 f5 f9 6d
----------------  End Nesting Level 2  ----------------

Tagged Content Info: 0
Tagged Other Messages: 0
----------------  End Nesting Level 1  ----------------

Signer Count: 2

Signer Info[0]:
Signature matches request Public Key
CMSG_SIGNER_INFO_CMS_VERSION(3)
CERT_ID_KEY_IDENTIFIER(2)
    0000  a4 f5 5a 3a e5 a5 63 9a  26 06 9a 86 80 b7 39 96
    0010  42 c2 d6 92
Hash Algorithm:
    Algorithm ObjectId: 1.3.14.3.2.26 sha1 (sha1NoSign)
    Algorithm Parameters: NULL
Encrypted Hash Algorithm:
    Algorithm ObjectId: 1.2.840.113549.1.1.1 RSA (RSA_SIGN)
    Algorithm Parameters: NULL
Encrypted Hash:
    0000  9a f8 b1 da 2b 78 92 a3  ee 24 9c f7 18 67 be c4
    0010  70 04 0e 90 7f 5a d6 d0  db e1 b2 a5 18 f8 14 9d
    0020  a4 7c f6 bb a5 98 64 5b  e5 e1 e6 cd 7c a6 0a ce
    0030  c2 3b 0a 32 5e 0f 8c e2  3f b3 ac 4a 9e f4 89 4a
    0040  cc 7f 97 d5 9b fa 15 9f  3d 81 64 6b 0e 44 a2 fa
    0050  da bf 76 45 e3 1b b3 d2  5c 56 50 f4 16 da bb 09
    0060  92 3e a4 cb ff b8 e3 27  8d 85 58 3b 3a 1b c8 85
    0070  cc 86 bb c2 3f 45 19 fa  9b 38 b1 d6 ae 6c 53 9b

Authenticated Attributes[0]:
  2 attributes:

  Attribute[0]: 1.2.840.113549.1.9.3 (Content Type)
    Value[0][0]:
    Unknown Attribute type
    1.3.6.1.5.5.7.12.2 CMC Data
    0000  06 08 2b 06 01 05 05 07  0c 02                     ..+.......

  Attribute[1]: 1.2.840.113549.1.9.4 (Message Digest)
    Value[1][0]:
    Unknown Attribute type
    Message Digest(certutil):
        76 5f 2c 3f 9f bb 3e be 34 49 e8 fa 9c 19 d9 92 a8 1f da 56
    0000  04 14 76 5f 2c 3f 9f bb  3e be 34 49 e8 fa 9c 19   ..v_,?..>.4I....
    0010  d9 92 a8 1f da 56                                  .....V

Unauthenticated Attributes[0]:
  0 attributes:

Computed Hash: 27 50 32 b5 c6 25 2e d4 2f 14 92 ae 7c 15 60 d3 0a 62 c4 21
Signing Certificate Index: 0
dwFlags = CA_VERIFY_FLAGS_CONSOLE_TRACE (0x20000000)
dwFlags = CA_VERIFY_FLAGS_DUMP_CHAIN (0x40000000)
ChainFlags = CERT_CHAIN_REVOCATION_CHECK_CHAIN_EXCLUDE_ROOT (0x40000000)
HCCE_LOCAL_MACHINE
CERT_CHAIN_POLICY_BASE
-------- CERT_CHAIN_CONTEXT --------
ChainContext.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
ChainContext.dwRevocationFreshnessTime: 1 Days, 7 Hours, 8 Minutes, 51 Seconds

SimpleChain.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
SimpleChain.dwRevocationFreshnessTime: 1 Days, 7 Hours, 8 Minutes, 51 Seconds

CertContext[0][0]: dwInfoStatus=102 dwErrorStatus=0
  Issuer: CN=JDOMCSC Longhorn Enterprise Root CA, O=Microsoft
  NotBefore: 5/4/2006 6:31 PM
  NotAfter: 5/3/2008 6:31 PM
  Subject: CN=Administrator, CN=Users, DC=jdomcsc, DC=nttest, DC=microsoft, DC=com
  Serial: 588cf81a000000000b57
  SubjectAltName: Other Name:Principal Name=Administrator@jdomcsc.nttest.microsoft.com
  Template: EnrollmentAgent
  4c 63 a9 53 fb 51 11 c9 20 5b 93 cb 36 da 9e 4b 2c 64 3d ea
  Element.dwInfoStatus = CERT_TRUST_HAS_KEY_MATCH_ISSUER (0x2)
  Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)
    CRL 52:
    Issuer: CN=JDOMCSC Longhorn Enterprise Root CA, O=Microsoft
    6b a0 09 df 7c a5 1f 00 62 a0 b7 31 4f c2 9b 3e 40 97 cc 2b
    Delta CRL 52:
    Issuer: CN=JDOMCSC Longhorn Enterprise Root CA, O=Microsoft
    65 34 cc 62 35 11 04 f5 df 50 0a 84 3e 7a da 13 69 a2 11 f6
  Application[0] = 1.3.6.1.4.1.311.20.2.1 Certificate Request Agent

CertContext[0][1]: dwInfoStatus=10c dwErrorStatus=0
  Issuer: CN=JDOMCSC Longhorn Enterprise Root CA, O=Microsoft
  NotBefore: 3/15/2006 11:33 AM
  NotAfter: 3/15/2011 11:43 AM
  Subject: CN=JDOMCSC Longhorn Enterprise Root CA, O=Microsoft
  Serial: 1a527b5929af2eb640ada1d7beecd805
  Template: CA
  b3 c9 0e c6 08 94 7b f7 b2 b9 f2 86 3f 54 9e 82 71 2c fa a0
  Element.dwInfoStatus = CERT_TRUST_HAS_NAME_MATCH_ISSUER (0x4)
  Element.dwInfoStatus = CERT_TRUST_IS_SELF_SIGNED (0x8)
  Element.dwInfoStatus = CERT_TRUST_HAS_PREFERRED_ISSUER (0x100)

Exclude leaf cert:
  23 02 10 d9 b1 52 54 92 56 3e f4 0b 0a 36 a9 95 63 94 2d 24
Full chain:
##   f4 6c 8d 29 e2 f0 ba 15 37 f3 2e d1 20 4a f7 18 07 e7 4d 0a

Verified Issuance Policies: None
Verified Application Policies:
    1.3.6.1.4.1.311.20.2.1 Certificate Request Agent

Signer Info[1]:
Signature matches Public Key
CMSG_SIGNER_INFO_PKCS_1_5_VERSION(1)
CERT_ID_ISSUER_SERIAL_NUMBER(1)
    Serial Number: 588cf81a000000000b57
    Issuer:
        CN=JDOMCSC Longhorn Enterprise Root CA
        O=Microsoft
    Subject:
        CN=Administrator
        CN=Users
        DC=jdomcsc
        DC=nttest
        DC=microsoft
        DC=com
Hash Algorithm:
    Algorithm ObjectId: 1.3.14.3.2.26 sha1 (sha1NoSign)
    Algorithm Parameters: NULL
Encrypted Hash Algorithm:
    Algorithm ObjectId: 1.2.840.113549.1.1.1 RSA (RSA_SIGN)
    Algorithm Parameters: NULL
Encrypted Hash:
    0000  7b 2f 3c e3 36 bd 07 73  3a 00 8b 72 33 6e f4 6e
    0010  b9 fb 26 c0 1b b0 fe 0b  f3 7f 16 3d 49 68 32 dc
    0020  23 f5 4f b9 17 49 26 7f  9f b8 b6 c3 0d fb 20 a2
    0030  a5 0f c1 bc af fe dd 4e  6b 61 e3 01 a1 76 7a 90
    0040  bc 38 1e ae e4 aa 62 2c  7e 7d fb f1 bb 52 b8 e7
    0050  47 29 13 f2 e1 42 e7 4c  62 37 22 14 10 ff 70 cc
    0060  c4 e8 b1 b9 72 5a cb 58  28 45 e3 74 49 6c 50 e9
    0070  ee b0 31 95 7f 43 9e fa  7e 03 b5 c1 88 79 c2 ba

Authenticated Attributes[1]:
  2 attributes:

  Attribute[0]: 1.2.840.113549.1.9.3 (Content Type)
    Value[0][0]:
    Unknown Attribute type
    1.3.6.1.5.5.7.12.2 CMC Data
    0000  06 08 2b 06 01 05 05 07  0c 02                     ..+.......

  Attribute[1]: 1.2.840.113549.1.9.4 (Message Digest)
    Value[1][0]:
    Unknown Attribute type
    Message Digest(certutil):
        76 5f 2c 3f 9f bb 3e be 34 49 e8 fa 9c 19 d9 92 a8 1f da 56
    0000  04 14 76 5f 2c 3f 9f bb  3e be 34 49 e8 fa 9c 19   ..v_,?..>.4I....
    0010  d9 92 a8 1f da 56                                  .....V

Unauthenticated Attributes[1]:
  0 attributes:

Computed Hash: 27 50 32 b5 c6 25 2e d4 2f 14 92 ae 7c 15 60 d3 0a 62 c4 21
No Recipient

Certificates:
================ Begin Nesting Level 1 ================
Element 0:
X509 Certificate:
Version: 3
Serial Number: 588cf81a000000000b57
    57 0b 00 00 00 00 1a f8  8c 58
Signature Algorithm:
    Algorithm ObjectId: 1.2.840.10045.4.3.3 ECDSA SHA-384(certlib) (sha384ECDSA)
    Algorithm Parameters: NULL
Issuer:
    CN=JDOMCSC Longhorn Enterprise Root CA
    O=Microsoft
    [0,0]: CERT_RDN_PRINTABLE_STRING, Length = 9 (9/64 Characters)
        2.5.4.10 Organization (O)="Microsoft"

        4d 69 63 72 6f 73 6f 66  74                        Microsoft

        4d 00 69 00 63 00 72 00  6f 00 73 00 6f 00 66 00   M.i.c.r.o.s.o.f.
        74 00                                              t.

    [1,0]: CERT_RDN_PRINTABLE_STRING, Length = 35 (35/64 Characters)
        2.5.4.3 Common Name (CN)="JDOMCSC Longhorn Enterprise Root CA"

        4a 44 4f 4d 43 53 43 20  4c 6f 6e 67 68 6f 72 6e   JDOMCSC Longhorn
        20 45 6e 74 65 72 70 72  69 73 65 20 52 6f 6f 74    Enterprise Root
        20 43 41                                            CA

        4a 00 44 00 4f 00 4d 00  43 00 53 00 43 00 20 00   J.D.O.M.C.S.C. .
        4c 00 6f 00 6e 00 67 00  68 00 6f 00 72 00 6e 00   L.o.n.g.h.o.r.n.
        20 00 45 00 6e 00 74 00  65 00 72 00 70 00 72 00    .E.n.t.e.r.p.r.
        69 00 73 00 65 00 20 00  52 00 6f 00 6f 00 74 00   i.s.e. .R.o.o.t.
        20 00 43 00 41 00                                   .C.A.


NotBefore: 5/4/2006 6:31 PM
NotAfter: 5/3/2008 6:31 PM

Subject:
    CN=Administrator
    CN=Users
    DC=jdomcsc
    DC=nttest
    DC=microsoft
    DC=com
    [0,0]: CERT_RDN_IA5_STRING, Length = 3 (3/128 Characters)
        0.9.2342.19200300.100.1.25 Domain Component (DC)="com"

        63 6f 6d                                           com

        63 00 6f 00 6d 00                                  c.o.m.

    [1,0]: CERT_RDN_IA5_STRING, Length = 9 (9/128 Characters)
        0.9.2342.19200300.100.1.25 Domain Component (DC)="microsoft"

        6d 69 63 72 6f 73 6f 66  74                        microsoft

        6d 00 69 00 63 00 72 00  6f 00 73 00 6f 00 66 00   m.i.c.r.o.s.o.f.
        74 00                                              t.

    [2,0]: CERT_RDN_IA5_STRING, Length = 6 (6/128 Characters)
        0.9.2342.19200300.100.1.25 Domain Component (DC)="nttest"

        6e 74 74 65 73 74                                  nttest

        6e 00 74 00 74 00 65 00  73 00 74 00               n.t.t.e.s.t.

    [3,0]: CERT_RDN_IA5_STRING, Length = 7 (7/128 Characters)
        0.9.2342.19200300.100.1.25 Domain Component (DC)="jdomcsc"

        6a 64 6f 6d 63 73 63                               jdomcsc

        6a 00 64 00 6f 00 6d 00  63 00 73 00 63 00         j.d.o.m.c.s.c.

    [4,0]: CERT_RDN_PRINTABLE_STRING, Length = 5 (5/64 Characters)
        2.5.4.3 Common Name (CN)="Users"

        55 73 65 72 73                                     Users

        55 00 73 00 65 00 72 00  73 00                     U.s.e.r.s.

    [5,0]: CERT_RDN_PRINTABLE_STRING, Length = 13 (13/64 Characters)
        2.5.4.3 Common Name (CN)="Administrator"

        41 64 6d 69 6e 69 73 74  72 61 74 6f 72            Administrator

        41 00 64 00 6d 00 69 00  6e 00 69 00 73 00 74 00   A.d.m.i.n.i.s.t.
        72 00 61 00 74 00 6f 00  72 00                     r.a.t.o.r.


Public Key Algorithm:
    Algorithm ObjectId: 1.2.840.113549.1.1.1 RSA (RSA_SIGN)
    Algorithm Parameters:
    05 00
Public Key Length: 1024 bits
Public Key: UnusedBits = 0
    0000  30 81 89 02 81 81 00 bf  1a 3f 63 bf 9e 24 bc 10
    0010  d9 28 63 c9 4b cf 29 d9  c5 70 28 93 8a ce e7 14
    0020  68 d5 b7 20 eb 60 f2 d9  81 19 3a 98 b8 66 85 58
    0030  31 6b 53 4b 03 b9 f3 e5  bf 85 12 11 c5 a2 9e 09
    0040  7a f7 c7 ad 8f 65 77 c1  d5 7e fd c0 48 6c 92 0c
    0050  d1 06 cd b7 86 55 b4 8e  a7 6b 8d 00 e6 13 4b 54
    0060  63 17 a5 12 13 2f 9e 32  0e 2d c7 22 09 47 e6 e9
    0070  34 77 1e 94 84 18 16 05  0d 3e da 42 8f 84 fd 65
    0080  ea 1d c4 93 f9 7d 19 02  03 01 00 01
Certificate Extensions: 8
    1.3.6.1.4.1.311.20.2: Flags = 0, Length = 20
    Certificate Template Name (Certificate Type)
        EnrollmentAgent

    0000  1e 1e 00 45 00 6e 00 72  00 6f 00 6c 00 6c 00 6d   ...E.n.r.o.l.l.m
    0010  00 65 00 6e 00 74 00 41  00 67 00 65 00 6e 00 74   .e.n.t.A.g.e.n.t

    2.5.29.37: Flags = 0, Length = e
    Enhanced Key Usage
        Certificate Request Agent (1.3.6.1.4.1.311.20.2.1)

    0000  30 0c 06 0a 2b 06 01 04  01 82 37 14 02 01         0...+.....7...

    2.5.29.15: Flags = 0, Length = 4
    Key Usage
        Digital Signature (80)

    0000  03 02 07 80                                        ....

    2.5.29.14: Flags = 0, Length = 16
    Subject Key Identifier
        9f ad 2e 19 53 07 d5 d3 34 b9 66 75 65 0e 19 85 00 3a 26 7d

    0000  04 14 9f ad 2e 19 53 07  d5 d3 34 b9 66 75 65 0e   ......S...4.fue.
    0010  19 85 00 3a 26 7d                                  ...:&}

    2.5.29.35: Flags = 0, Length = 18
    Authority Key Identifier
        KeyID=16 a1 b0 9e 8f 4f ee 2e d4 25 07 90 2b 89 37 21 70 c7 d6 65

    0000  30 16 80 14 16 a1 b0 9e  8f 4f ee 2e d4 25 07 90   0........O...%..
    0010  2b 89 37 21 70 c7 d6 65                            +.7!p..e

    2.5.29.31: Flags = 0, Length = 166
    CRL Distribution Points
        [1]CRL Distribution Point
             Distribution Point Name:
                  Full Name:
                       URL=ldap:///CN=JDOMCSC%20Longhorn%20Enterprise%20Root%20CA,CN=JAYTEST7,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=jdomcsc,DC=nttest,DC=microsoft,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint
                       URL=https://jaytest7.jdomcsc.nttest.microsoft.com/CertEnroll/JDOMCSC%20Longhorn%20Enterprise%20Root%20CA.crl

    0000  30 82 01 62 30 82 01 5e  a0 82 01 5a a0 82 01 56   0..b0..^...Z...V
    0010  86 81 ea 6c 64 61 70 3a  2f 2f 2f 43 4e 3d 4a 44   ...ldap:///CN=JD
    0020  4f 4d 43 53 43 25 32 30  4c 6f 6e 67 68 6f 72 6e   OMCSC%20Longhorn
    0030  25 32 30 45 6e 74 65 72  70 72 69 73 65 25 32 30   %20Enterprise%20
    0040  52 6f 6f 74 25 32 30 43  41 2c 43 4e 3d 4a 41 59   Root%20CA,CN=JAY
    0050  54 45 53 54 37 2c 43 4e  3d 43 44 50 2c 43 4e 3d   TEST7,CN=CDP,CN=
    0060  50 75 62 6c 69 63 25 32  30 4b 65 79 25 32 30 53   Public%20Key%20S
    0070  65 72 76 69 63 65 73 2c  43 4e 3d 53 65 72 76 69   ervices,CN=Servi
    0080  63 65 73 2c 43 4e 3d 43  6f 6e 66 69 67 75 72 61   ces,CN=Configura
    0090  74 69 6f 6e 2c 44 43 3d  6a 64 6f 6d 63 73 63 2c   tion,DC=jdomcsc,
    00a0  44 43 3d 6e 74 74 65 73  74 2c 44 43 3d 6d 69 63   DC=nttest,DC=mic
    00b0  72 6f 73 6f 66 74 2c 44  43 3d 63 6f 6d 3f 63 65   rosoft,DC=com?ce
    00c0  72 74 69 66 69 63 61 74  65 52 65 76 6f 63 61 74   rtificateRevocat
    00d0  69 6f 6e 4c 69 73 74 3f  62 61 73 65 3f 6f 62 6a   ionList?base?obj
    00e0  65 63 74 43 6c 61 73 73  3d 63 52 4c 44 69 73 74   ectClass=cRLDist
    00f0  72 69 62 75 74 69 6f 6e  50 6f 69 6e 74 86 67 68   ributionPoint.gh
    0100  74 74 70 3a 2f 2f 6a 61  79 74 65 73 74 37 2e 6a   ttp://jaytest7.j
    0110  64 6f 6d 63 73 63 2e 6e  74 74 65 73 74 2e 6d 69   domcsc.nttest.mi
    0120  63 72 6f 73 6f 66 74 2e  63 6f 6d 2f 43 65 72 74   crosoft.com/Cert
    0130  45 6e 72 6f 6c 6c 2f 4a  44 4f 4d 43 53 43 25 32   Enroll/JDOMCSC%2
    0140  30 4c 6f 6e 67 68 6f 72  6e 25 32 30 45 6e 74 65   0Longhorn%20Ente
    0150  72 70 72 69 73 65 25 32  30 52 6f 6f 74 25 32 30   rprise%20Root%20
    0160  43 41 2e 63 72 6c                                  CA.crl

    1.3.6.1.5.5.7.1.1: Flags = 0, Length = 185
    Authority Information Access
        [1]Authority Info Access
             Access Method=Certification Authority Issuer (1.3.6.1.5.5.7.48.2)
             Alternative Name:
                  URL=ldap:///CN=JDOMCSC%20Longhorn%20Enterprise%20Root%20CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=jdomcsc,DC=nttest,DC=microsoft,DC=com?cACertificate?base?objectClass=certificationAuthority
        [2]Authority Info Access
             Access Method=Certification Authority Issuer (1.3.6.1.5.5.7.48.2)
             Alternative Name:
                  URL=https://jaytest7.jdomcsc.nttest.microsoft.com/CertEnroll/JAYTEST7.jdomcsc.nttest.microsoft.com_JDOMCSC%20Longhorn%20Enterprise%20Root%20CA.crt

    0000  30 82 01 81 30 81 e1 06  08 2b 06 01 05 05 07 30   0...0....+.....0
    0010  02 86 81 d4 6c 64 61 70  3a 2f 2f 2f 43 4e 3d 4a   ....ldap:///CN=J
    0020  44 4f 4d 43 53 43 25 32  30 4c 6f 6e 67 68 6f 72   DOMCSC%20Longhor
    0030  6e 25 32 30 45 6e 74 65  72 70 72 69 73 65 25 32   n%20Enterprise%2
    0040  30 52 6f 6f 74 25 32 30  43 41 2c 43 4e 3d 41 49   0Root%20CA,CN=AI
    0050  41 2c 43 4e 3d 50 75 62  6c 69 63 25 32 30 4b 65   A,CN=Public%20Ke
    0060  79 25 32 30 53 65 72 76  69 63 65 73 2c 43 4e 3d   y%20Services,CN=
    0070  53 65 72 76 69 63 65 73  2c 43 4e 3d 43 6f 6e 66   Services,CN=Conf
    0080  69 67 75 72 61 74 69 6f  6e 2c 44 43 3d 6a 64 6f   iguration,DC=jdo
    0090  6d 63 73 63 2c 44 43 3d  6e 74 74 65 73 74 2c 44   mcsc,DC=nttest,D
    00a0  43 3d 6d 69 63 72 6f 73  6f 66 74 2c 44 43 3d 63   C=microsoft,DC=c
    00b0  6f 6d 3f 63 41 43 65 72  74 69 66 69 63 61 74 65   om?cACertificate
    00c0  3f 62 61 73 65 3f 6f 62  6a 65 63 74 43 6c 61 73   ?base?objectClas
    00d0  73 3d 63 65 72 74 69 66  69 63 61 74 69 6f 6e 41   s=certificationA
    00e0  75 74 68 6f 72 69 74 79  30 81 9a 06 08 2b 06 01   uthority0....+..
    00f0  05 05 07 30 02 86 81 8d  68 74 74 70 3a 2f 2f 6a   ...0....https://j
    0100  61 79 74 65 73 74 37 2e  6a 64 6f 6d 63 73 63 2e   aytest7.jdomcsc.
    0110  6e 74 74 65 73 74 2e 6d  69 63 72 6f 73 6f 66 74   nttest.microsoft
    0120  2e 63 6f 6d 2f 43 65 72  74 45 6e 72 6f 6c 6c 2f   .com/CertEnroll/
    0130  4a 41 59 54 45 53 54 37  2e 6a 64 6f 6d 63 73 63   JAYTEST7.jdomcsc
    0140  2e 6e 74 74 65 73 74 2e  6d 69 63 72 6f 73 6f 66   .nttest.microsof
    0150  74 2e 63 6f 6d 5f 4a 44  4f 4d 43 53 43 25 32 30   t.com_JDOMCSC%20
    0160  4c 6f 6e 67 68 6f 72 6e  25 32 30 45 6e 74 65 72   Longhorn%20Enter
    0170  70 72 69 73 65 25 32 30  52 6f 6f 74 25 32 30 43   prise%20Root%20C
    0180  41 2e 63 72 74                                     A.crt

    2.5.29.17: Flags = 0, Length = 3e
    Subject Alternative Name
        Other Name:
             Principal Name=Administrator@jdomcsc.nttest.microsoft.com
    AltName: 1 entries:
    AltName[0] CERT_ALT_NAME_OTHER_NAME: 1.3.6.1.4.1.311.20.2.3 Principal Name: 
      CERT_RDN_UTF8_STRING, Length = 42 (42 Characters)
        "Administrator@jdomcsc.nttest.microsoft.com"

        41 64 6d 69 6e 69 73 74  72 61 74 6f 72 40 6a 64   Administrator@jd
        6f 6d 63 73 63 2e 6e 74  74 65 73 74 2e 6d 69 63   omcsc.nttest.mic
        72 6f 73 6f 66 74 2e 63  6f 6d                     rosoft.com

        41 00 64 00 6d 00 69 00  6e 00 69 00 73 00 74 00   A.d.m.i.n.i.s.t.
        72 00 61 00 74 00 6f 00  72 00 40 00 6a 00 64 00   r.a.t.o.r.@.j.d.
        6f 00 6d 00 63 00 73 00  63 00 2e 00 6e 00 74 00   o.m.c.s.c...n.t.
        74 00 65 00 73 00 74 00  2e 00 6d 00 69 00 63 00   t.e.s.t...m.i.c.
        72 00 6f 00 73 00 6f 00  66 00 74 00 2e 00 63 00   r.o.s.o.f.t...c.
        6f 00 6d 00                                        o.m.


    0000  30 3c a0 3a 06 0a 2b 06  01 04 01 82 37 14 02 03   0<.:..+.....7...
    0010  a0 2c 0c 2a 41 64 6d 69  6e 69 73 74 72 61 74 6f   .,.*Administrato
    0020  72 40 6a 64 6f 6d 63 73  63 2e 6e 74 74 65 73 74   r@jdomcsc.nttest
    0030  2e 6d 69 63 72 6f 73 6f  66 74 2e 63 6f 6d         .microsoft.com

Signature Algorithm:
    Algorithm ObjectId: 1.2.840.10045.4.3.3 ECDSA SHA-384(certlib) (sha384ECDSA)
    Algorithm Parameters: NULL
Signature: UnusedBits=0
    0000  df db 4e b7 c5 d1 a0 20  67 c5 35 9f 94 5c 81 0b
    0010  57 0d f1 62 38 81 1a c8  d6 dc 19 c8 1f ae 07 17
    0020  fe 71 cd 3e 00 18 a4 9d  cc ab 5b 95 bf 03 16 4d
    0030  30 02 3e df 67 d9 b2 51  d7 35 9b 26 16 23 02 13
    0040  31 28 e7 11 26 58 9b 04  93 f3 76 0b e8 8b 58 5d
    0050  9d cc a4 c1 d7 3e f2 be  d8 b5 c0 ea 44 6a 0c 4b
    0060  2b 61 30 02 64 30
Non-root Certificate
Key Id Hash(rfc-sha1): 9f ad 2e 19 53 07 d5 d3 34 b9 66 75 65 0e 19 85 00 3a 26 7d
Key Id Hash(sha1): a3 00 d8 b3 30 12 26 94 05 a4 76 17 40 11 41 fd ab de 92 a1
Cert Hash(md5): e6 37 c0 39 b7 8b 88 e3 cf 54 6e eb 13 a9 9b d8
Cert Hash(sha1): 4c 63 a9 53 fb 51 11 c9 20 5b 93 cb 36 da 9e 4b 2c 64 3d ea
----------------  End Nesting Level 1  ----------------
No CRLs
CertUtil: -dump command completed successfully.

Exemples de demandes