CA - Subordinate Instance Revocation Problem
hello, all
i've encountered strange behavior managing ad certificate services. see, have 2 certificate servers - root ca (offline) , subordinate ca (online) server issue certificate demand. time time certsrv can't start , gives error:
active directory certificate services did not start: not load or verify current ca certificate. ckex issuing certificate revocation function unable check revocation because revocation server offline. 0x80092013 (-2146885613 crypt_e_revocation_offline).
but quite common issue due crl expire , problem fixed booting root ca , re-issuing crl with:
revoke certificates -> all tasks -> publish
and replacing new root certificate crl 1 subordinate ca has in extension path.
the problem have - doesn't work anymore. if i'm trying revoke, publish , replace crl root ca, startup error still remain. change i've noticed has renewed ca certificate same key pair, can see 2 certificates in extensions path:
both certificates valid, , i'm wondering - affect crl? if yes need update certificate information across ad (may publish new root ca? or rid of if possible?).
thank in advance.
if ca renewed same key, 1 crl created. believe problem dspublish command. "rootca" argument used publishing root ca certificates, not crl. crl rootca should published as:
certutil -dspublish <your crl here>
the -f isn't needed since published crl. f forces creation of object when publishing first crl, stated have done in past.
mark b. cooper, president , founder of pki solutions inc., former microsoft senior engineer , subject matter expert microsoft active directory certificate services (adcs). known “the pki guy” @ microsoft 10 years. co-founder of revocent (revocent.com) , certaccord product offers linux certificate enrollment microsoft ca. connect mark @ https://www.pkisolutions.com
Windows Server > Security
Comments
Post a Comment