Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

How to remove Currently Valid and some expired certificates from the Trusted Root Certification Authorities & Active Directory?

Posted on 2012-04-12
1
Medium Priority
?
3,173 Views
Last Modified: 2012-04-13
How to remove Currently Valid and some expired certificates from the Trusted Root Certification Authorities & Active Directory?

The CA was an exchange server (Server 2003) that was carved out of the environment and cannot be brought back.  1 certificates was not revoked and is valid until 2014 another certificate is expired.
The Domain controllers in the environment  are showing
>> Event ID 6>>Automatic certificate enrollment for local system failed (0x800706ba) The RPC server is unavailable.

>> Event ID 13>> Certificate enrollment for Local system failed to enroll for a DomainController certificate with request ID N/A from mailsvr.mydomain.com\CommonName (The RPC server is unavailable. 0x800706ba (WIN32: 1722)).

I have been in ADSI Edit and AD Sites And Services and see the references to this Server and Certificates it has issues.

I have tried using certutil -dcinfo deletebad  << however it skips the CA that it cannot reach.

***I want to remove the instances of the Server in AD along with its issued Certificates (that arent being referenced in Group Policy or being used for any real purpose in the current environment) without any issues to the Environment.  How would I do this? ***

FYI  I cannot mount the Certificate services  console on the last 2003 server because it wont communicate with a missing server.  (The Server Can't be brought back).

Any insight would be appreciated.  Thank you.
0
Comment
Question by:abpExpert
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
abpExpert earned 0 total points
ID: 37844547
In Active Directory Sites and Services, Switched the view to Services Mode, and navigated to the Services->Public Key Services->AIA.
As you can see the CA in question (CA Server) was still listed. This was a old CA on the svr.mydomain.COM server that has since been removed. Removed this instance as well as the other listings that were in the CDP, Certificate Authorities, KRA.


Then ran the following commands in a Elevated Commad Prompt:
"certutil -dcinfo deleteBad"
"gpupdate /force"


Domain Controller servers will need a reboot (as discussed)

Certificate errors are no longer being produced
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question