Solved

PKI 2008 R2 Request the Certificate Root Certificate with a Windows 7 and Vista client

Posted on 2011-09-22
1
633 Views
Last Modified: 2012-05-12
I have 3 PKI server Windows 2008 R2
1 root Offline
2 Sub Enterprise
I publish all AIA and CDP in a web site + Ldap

When a client (in Workgroup) open a Web Site with a certificate issue by my PKI
The client got the error message that the Certificate root is not trusted (at this time is normal because the certificate root is not in the certificate store of the client)
With a XP Windows 2008 r2 Server, on IE I click on the error and open the certificate root ca  
I select in the chain the root PKI certificate and i have the option to install the certificate in the certificate store of the client

But i my client is Vista or Win 7, I click on the error and open the certificate root CA (same as XP and 2008) but when I want to install the certificate this option is not there
I search but I did not find anything how i can install automatically the trusted root certificate in the certificate store of the client, (I have this option on XP and 2008)

Thank
0
Comment
Question by:AlainLav
1 Comment
 

Accepted Solution

by:
AlainLav earned 0 total points
ID: 36583504
I found the solution

On Vista and Windows 7, you must Open IE with the Run as Adminirator
When IE is open as Administrator, When you select the root Certificate the option to Install the Certificate is there

Thank
0

Featured Post

Highfive Gives IT Their Time Back

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
This video discusses moving either the default database or any database to a new volume.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now