Solved

How to remove Currently Valid and some expired certificates from the Trusted Root Certification Authorities & Active Directory?

Posted on 2012-04-12
1
2,988 Views
Last Modified: 2012-04-13
How to remove Currently Valid and some expired certificates from the Trusted Root Certification Authorities & Active Directory?

The CA was an exchange server (Server 2003) that was carved out of the environment and cannot be brought back.  1 certificates was not revoked and is valid until 2014 another certificate is expired.
The Domain controllers in the environment  are showing
>> Event ID 6>>Automatic certificate enrollment for local system failed (0x800706ba) The RPC server is unavailable.

>> Event ID 13>> Certificate enrollment for Local system failed to enroll for a DomainController certificate with request ID N/A from mailsvr.mydomain.com\CommonName (The RPC server is unavailable. 0x800706ba (WIN32: 1722)).

I have been in ADSI Edit and AD Sites And Services and see the references to this Server and Certificates it has issues.

I have tried using certutil -dcinfo deletebad  << however it skips the CA that it cannot reach.

***I want to remove the instances of the Server in AD along with its issued Certificates (that arent being referenced in Group Policy or being used for any real purpose in the current environment) without any issues to the Environment.  How would I do this? ***

FYI  I cannot mount the Certificate services  console on the last 2003 server because it wont communicate with a missing server.  (The Server Can't be brought back).

Any insight would be appreciated.  Thank you.
0
Comment
Question by:abpExpert
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
abpExpert earned 0 total points
ID: 37844547
In Active Directory Sites and Services, Switched the view to Services Mode, and navigated to the Services->Public Key Services->AIA.
As you can see the CA in question (CA Server) was still listed. This was a old CA on the svr.mydomain.COM server that has since been removed. Removed this instance as well as the other listings that were in the CDP, Certificate Authorities, KRA.


Then ran the following commands in a Elevated Commad Prompt:
"certutil -dcinfo deleteBad"
"gpupdate /force"


Domain Controller servers will need a reboot (as discussed)

Certificate errors are no longer being produced
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This script can help you clean up your user profile database by comparing profiles to Active Directory users in a particular OU, and removing the profiles that don't match.
This article shows the method of using the Resultant Set of Policy Tool to locate Group Policy that applies a particular setting.
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question