Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to remove Currently Valid and some expired certificates from the Trusted Root Certification Authorities & Active Directory?

Posted on 2012-04-12
1
Medium Priority
?
3,215 Views
Last Modified: 2012-04-13
How to remove Currently Valid and some expired certificates from the Trusted Root Certification Authorities & Active Directory?

The CA was an exchange server (Server 2003) that was carved out of the environment and cannot be brought back.  1 certificates was not revoked and is valid until 2014 another certificate is expired.
The Domain controllers in the environment  are showing
>> Event ID 6>>Automatic certificate enrollment for local system failed (0x800706ba) The RPC server is unavailable.

>> Event ID 13>> Certificate enrollment for Local system failed to enroll for a DomainController certificate with request ID N/A from mailsvr.mydomain.com\CommonName (The RPC server is unavailable. 0x800706ba (WIN32: 1722)).

I have been in ADSI Edit and AD Sites And Services and see the references to this Server and Certificates it has issues.

I have tried using certutil -dcinfo deletebad  << however it skips the CA that it cannot reach.

***I want to remove the instances of the Server in AD along with its issued Certificates (that arent being referenced in Group Policy or being used for any real purpose in the current environment) without any issues to the Environment.  How would I do this? ***

FYI  I cannot mount the Certificate services  console on the last 2003 server because it wont communicate with a missing server.  (The Server Can't be brought back).

Any insight would be appreciated.  Thank you.
0
Comment
Question by:abpExpert
1 Comment
 

Accepted Solution

by:
abpExpert earned 0 total points
ID: 37844547
In Active Directory Sites and Services, Switched the view to Services Mode, and navigated to the Services->Public Key Services->AIA.
As you can see the CA in question (CA Server) was still listed. This was a old CA on the svr.mydomain.COM server that has since been removed. Removed this instance as well as the other listings that were in the CDP, Certificate Authorities, KRA.


Then ran the following commands in a Elevated Commad Prompt:
"certutil -dcinfo deleteBad"
"gpupdate /force"


Domain Controller servers will need a reboot (as discussed)

Certificate errors are no longer being produced
0

Featured Post

Simplify Active Directory Administration

Administration of Active Directory does not have to be hard.  Too often what should be a simple task is made more difficult than it needs to be.The solution?  Hyena from SystemTools Software.  With ease-of-use as well as powerful importing and bulk updating capabilities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

For anyone that has accidentally used newSID with Server 2008 R2 (like I did) and hasn't been able to get the server running again because you were unlucky (as I was) and had no backups - I was able to get things working by doing a Registry Hive rec…
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

885 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question