Problem with subordinate ca issuing Certs in Windows 2000 domain

Hi having a problem with my CA infrastructure...Parent-child domains, native mode. I placed the administrator of the child into the enterprise admin group in the parent. My DNS is not active directory intergrated (i dont think it makes a differencce however).

I created a Root CA on the DC in the parent domain, and a sub CA on the child DC. All was fine. AD was looking good. Both of course installed as enterprise CA's. Clients (other servers) begain to obtain certs. Parent clients had no problem, child clients got access denied. This was tried using the certsrv virtual directory and clients using Internet explorer.
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

I'm not sure I understand...

You've created a Enterprise Root CA... and a Enterprise Subordinate CA.   I assume that you're issuing certification only from the Subordinate (Is that true?)  The certificate path is not "broken"... each certificate can "find it's way back" to the root.

At the certificate console (on the subordinate CA), you've selected the automatic feature for issuing certifcates?
lesmydadAuthor Commented:
isnt it automatic by def?
Autoenrollment is only available on Enterprise CA's if you use one of the certificate "templates"... nothing is automatic by default.

The idea is this... using a template (and granting appropriate users read access to that template) provides the Enterprise CA enough information (combined with the account data from the Active Directory) to issue a certificate.  That's why stand-alone CAs don't support autorenollement.. they don't have enough information on what the certificate is to be used for.  I presume you're also using the "web enrollement" feature?

I'm betting that the issue is something more simple... like a broken root.  The Enterprise root CA "points to itself" for it's authority (kinda strange when you think about it) so, it's path really can't be broken.  The Enterprise subordinate CA must be configured to point to the Enterprise root CA for it's authority. (Otherwise you've got a broken root).  

Remember too, that you can't rename the server after installing Certification Services...

Let's eliminate the simple stuff, before we get too deep.
MSSPs - Are you paying too much?

WEBINAR: Managed security service providers often deploy & manage products from a variety of solution vendors. But is this really the best approach when it comes to saving time AND money? Join us on Aug. 15th to learn how you can improve your total cost of ownership today!

lesmydadAuthor Commented:
Thax so much for the help. Im testing it out on the Thursday 11th Dec with my class (Network Infrastructure would you believe!!!). The scenario is kind of the same but there is no child domain. I will build the child CA however. I am slightly confused over the use of AD here. I think I read that on a stand alone CA it does obviosly not use AD, but  a Stand Alone CA on a DC would infact make use of it if its available. This might sound strange but im sure i read it somewhere!!! I really need some good references. By the way I am using the /certsrv.

ps can you issue these user certs through a GPO? It seems you can with machine certs. Is this what client mappings are for?
First of should have dawned me eariler...that you were issuing certificates from the root CA. Typically the root CA issues certificates to subordinate CA's only (unless you've only got one CA server )

You can use a GPO to setup a template...that will automatically issue certificates (kinda sorta the same thing)

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
lesmydadAuthor Commented:
I did get the chance to test a root-sub infrastructure using stand alones (on a single subnet) and root-sub infrastructure using enterprise CA's (on another subnet). Seemed ok. The only problem I found was that when machines acquired certs using the client cert mmc, 'request new cert' wizard, certs were being given by the enterprise root domain, not the subordinate.

If you could answer this one i would be grateful? I will post more when I get the chance to run the scenario again but next time use parent child domains across networkA--Router--networkB like in the question.
you get the points with gratitude from a tired out MCT
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
OS Security

From novice to tech pro — start learning today.