How to remove Currently Valid and some expired certificates from the Trusted Root Certification Authorities & Active Directory?

Posted on 2012-04-12
Medium Priority
Last Modified: 2012-04-13
How to remove Currently Valid and some expired certificates from the Trusted Root Certification Authorities & Active Directory?

The CA was an exchange server (Server 2003) that was carved out of the environment and cannot be brought back.  1 certificates was not revoked and is valid until 2014 another certificate is expired.
The Domain controllers in the environment  are showing
>> Event ID 6>>Automatic certificate enrollment for local system failed (0x800706ba) The RPC server is unavailable.

>> Event ID 13>> Certificate enrollment for Local system failed to enroll for a DomainController certificate with request ID N/A from mailsvr.mydomain.com\CommonName (The RPC server is unavailable. 0x800706ba (WIN32: 1722)).

I have been in ADSI Edit and AD Sites And Services and see the references to this Server and Certificates it has issues.

I have tried using certutil -dcinfo deletebad  << however it skips the CA that it cannot reach.

***I want to remove the instances of the Server in AD along with its issued Certificates (that arent being referenced in Group Policy or being used for any real purpose in the current environment) without any issues to the Environment.  How would I do this? ***

FYI  I cannot mount the Certificate services  console on the last 2003 server because it wont communicate with a missing server.  (The Server Can't be brought back).

Any insight would be appreciated.  Thank you.
Question by:abpExpert
1 Comment

Accepted Solution

abpExpert earned 0 total points
ID: 37844547
In Active Directory Sites and Services, Switched the view to Services Mode, and navigated to the Services->Public Key Services->AIA.
As you can see the CA in question (CA Server) was still listed. This was a old CA on the svr.mydomain.COM server that has since been removed. Removed this instance as well as the other listings that were in the CDP, Certificate Authorities, KRA.

Then ran the following commands in a Elevated Commad Prompt:
"certutil -dcinfo deleteBad"
"gpupdate /force"

Domain Controller servers will need a reboot (as discussed)

Certificate errors are no longer being produced

Featured Post

Hire Technology Freelancers with Gigs

Work with freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely, and get projects done right.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The Internet has made sending and receiving information online a breeze. But there is also the threat of unauthorized viewing, data tampering, and phoney messages. Surprisingly, a lot of business owners do not fully understand how to use security t…
In this article, we will discuss how you can secure Active Directory using free tools, and how you can choose a safe and secure Active Directory security auditing tool.
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…
Suggested Courses

627 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question