Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win


Computer Certificate Request Problem

Posted on 2009-04-03
Medium Priority
Last Modified: 2013-12-04
The root CA (A Windows 2003 SE server) in my domain crashed and had to be restored from backup.  During the process the cert service had to be removed and re-installed.  Although the cert server seems to be working now (I can access the web enroll site, and "user certs" can be successfully requested), I cannot successfully request a computer certificate on any WinXP client using the certificates mmc - every time I try I get this message from the Certificate Request Wizard: "The certificate request failed.  The parameter is incorrect".  As I mentioned before though, this seems odd because when I request USER certificates using the certificate mmc, I have no problem.  I thought it might be a problem with the computer account on this particular client machine, so I deleted if from the domain and rejoined, but the problem persists.

Any ideas?
Question by:tballin
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
LVL 31

Expert Comment

ID: 24062781
Was the old certificate imported with private key or was a new certificate and keyset generated when you reinstalled certificate services?

Author Comment

ID: 24063388
I did not do any of those things before I reinstalled certificate services.

FYI: I have now uninstalled cert services from that machine and installed it on another.  Unfortunately that didnt fix the problem however, as I now get a new error message:

The certificate request failed because of one of the following conditions:

-The certificate request was submitted to a Certification Authority (CA) that is not started
-You do not have the permissions to request certificates from the available CAs.

I also performed a certutil /dump on the XP machine (See below) and I noticed there are two entries there, one with the old, original CA and one with the new.  Seems like the client is trying to contact the original (now defunct) CA for computer certificate requests.

Where should I go from here?
402.203.0: 0x80070057 (WIN32: 87): ..CertCli Version
Entry 0:
  Name:                         `mail.domain.com'
  Organizational Unit:          `'
  Organization:                 `'
  Locality:                     `'
  State:                        `'
  Country/region:               `'
  Config:                       `srv1.hq.domain.com\mail.domain.com'
  Exchange Certificate:         `'
  Signature Certificate:        `'
  Description:                  `'
  Server:                       `srv1.hq.domain.com'
  Authority:                    `mail.domain.com'
  Sanitized Name:               `mail.domain.com'
  Short Name:                   `mail.domain.com'
  Sanitized Short Name:         `mail.domain.com'
  Flags:                        `1'
Entry 1:
  Name:                         `srv2'
  Organizational Unit:          `'
  Organization:                 `'
  Locality:                     `'
  State:                        `'
  Country/region:               `'
  Config:                       `srv2.hq.domain.com\srv2'
  Exchange Certificate:         `'
  Signature Certificate:        `'
  Description:                  `'
  Server:                       `srv2.hq.domain.com'
  Authority:                    `srv2'
  Sanitized Name:               `srv2'
  Short Name:                   `srv2'
  Sanitized Short Name:         `srv2'
  Flags:                        `1'
CertUtil: -dump command completed successfully.

Open in new window

LVL 31

Accepted Solution

Paranormastic earned 2000 total points
ID: 24063614
Try running this:
certutil -dcinfo deleteBad

How to decom a CA server properly from AD:

If this was a root CA you will need to put the new CA cert into GPO to distribute to clients.

You can update autoenroll events for the new CA:
certutil -pulse

Use the Certification Authorities MMC to assign desired templates to the new CA and remove the old.


Author Comment

ID: 24064891
Great suggestions - especially helpful also was the pkiview.msc referenced in the Microsoft support article.


Featured Post

Q2 2017 - Latest Malware & Internet Attacks

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out our latest Quarterly Internet Security Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Users of Windows 10 Professional can disable automatic reboots using the policy editor. This tool is not included in the Windows home edition. But don't worry! Follow the instructions below to install (a Win7) policy editor on your Windows 10 Home e…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question