Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Error logging on with a smart card

Posted on 2004-09-03
3
Medium Priority
?
162 Views
Last Modified: 2010-04-13
Hi,

We had a problem yesterday using smart card in our domain. It had turned out that the CRL had expired on the rootca and the policyca1 certificate servers. I republished the CRL and the errors that were occuring using the dsstore command dissapeared.

However, i am still getting the message "credentials could not be verified" when i try and log on using a smartcard. I have tried issueing a new certificate but still get the same error.

Any ideas?

0
Comment
Question by:ukznmcl
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 9

Accepted Solution

by:
BigC666 earned 2000 total points
ID: 11982283
howdy,

have a look at this http://support.microsoft.com/default.aspx?scid=kb;en-us;281245]

hope that it helps
0

Featured Post

What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
What we learned in Webroot's webinar on multi-vector protection.
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

718 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question