Solved

Microsoft Certificate Request Error

Posted on 2009-04-09
3
301 Views
Last Modified: 2012-05-06
We have a very large domain and use certificates to authenticate users to the wireless network. The certificates are automatically generated and stored in the personal certificates store. We often have users that lose their certificate and are unable to request a new certificate using the certificate wizard. The error that returns is the certificate request failed. The file was not found. The only way we have found to correct this problem is to rename the user profile on the PC and have the user logon and create a new user profile. My question is does any one know of a better way to fix this problem? I have one user that this happens to frequently and I would like to avoid having to recreate a user profile.

I do not see any related errors in the event logs.

0
Comment
Question by:ramborabbit
  • 2
3 Comments
 
LVL 5

Expert Comment

by:bRvO
ID: 24109205
Try creating a new account in AD for that user ?
0
 

Author Comment

by:ramborabbit
ID: 24151674
I don't think that is the problem since we can rename the local profile, let a new one create and then the user is able to get a certificate. There is something in the profile that is corrupted and I would like to find out what it is to fix that problem rather than create a new profile every time.
0
 

Accepted Solution

by:
ramborabbit earned 0 total points
ID: 24251639
I found the problem. The issue is a corrupt registry and the fix is to reset the registry hive for HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders using by exporting this key from a known working registry and importing this into the machine that is having the problem.

The attached file is the windows default. Save the file and rename it to the a .reg file and import it into the registry.


usershell.txt
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

by Nathan Brom/Bromy2004 Introduction There are numerous websites out there for any different type of program you can imagine.  Of those, you'll need to decide which ones are legitimate and aren't trying to steal your money or infect your comput…
This article describes how to set permissions to allow a limited-permissions user to start and stop a particular System Service.   It is always best to give users only the permissions that they need to perform their job, so tweaking particular permi…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now