Solved

Two tier Certificate Services deployment and running the CSUTIL DSPUBLISH for the cert .

Posted on 2011-09-13
1
578 Views
Last Modified: 2012-05-12
This is a new first time install.
I have a stand-alone Windows 2008 Enterprise R2 SP1 server in a workgroup.
I also have a subCA issuing Certificate Services server in my domain. It is a Windows 2008 Enterprise R2 SP1 server in our domain.
My issuing subCA generates a request for the root CA. I copy this .REQ file  to my stand-alone ROOT CA server. It signs and issues the new cert.
I then open the cert and do a copy/export. It defaults to file with an extension of .P7B.
I copy this .P7B file to my issuing SubCA in my domain.

It is my understanding I need to run CSUTIL DSPUBLISH on this file now so it is in our Active Directory.
IS THIS CORRECT??
Or when I to my copy/export on my stand-alone root CA, do I need to save the file as a .CER file extension, then copy to my issuing subCA server. Where I run CSUTIL DSPUBLISH?

The problem I am having is when I start the services on my issuing subCA it won't start an wants to import my Root CA. When I point it at my copied .P7B file it errors out with the following error:

"The certificate for the CA "mycert-ca" on  myserver.mydomain.com is mssing. Do you want to install the certificate?"

I say yes, then point it at the copied file. Which is a .P7B extension.

Then I get the error;

Cannot find the certificate to build a certificate chain. A certificate chain could not be built to a trusted root authority.

Looks Like I need to run the CSUTIL DSPUBLISH command, but on which file extension?

I just want to be certain before I publish this to my AD.

Am I on the right track? If so which file ext. should I use that I copied from my stand-alone root CA?


 
0
Comment
Question by:lanman777
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
lanman777 earned 0 total points
ID: 36533910
Step 1. I created my stand-alone RootCA server and Published my Root CA.

Step 2. I created my issuing CS server in my domain.

Step 3. I generated a request from my issuing CS server in my domain, this created a .REQ file. I copied the file to my stand-alone RootCA and submitted a new request and then Issue the requested certificate.

Step 4. I opened the certificate, copy and exported as a .P7B file.

Step 5. I then copied this file to my issuing CS on my domain. I then tried to start my CA services it prompted me about do you want to load a certificate? When I said yes it would error out with trusted root errors, and chain errors.

Step 6. So I copied the Trusted RootCA that was created during my stand-alone RootCA server setup to my issuing server on my domain. I then ran the csutil -dspubish command as you stated.

Step 7. I then added the Trusted Root Cert. to my Certificate Group Policy of trusted Root Certs.

Step 8. Then from my issuing CS I opened the trusted root cert that I copied from the stand-alone RootCA and opened the cert and clicked on Trust this certificate.

Step 9. I then tried to start the CA services on my issuing CA server, it prompted me do I want to install a certificate. I selected yes, then selected the certificate and my services FINALLY started.

0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Always backup Domain, SYSVOL etc.using processes according to Microsoft Best Practices. This is meant as a disaster recovery process for small environments that did not implement backup processes and did not run a secondary domain controller that ne…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question