Solved

Removing failed Certificate Authority from Active Directory

Posted on 2013-02-01
1
3,949 Views
Last Modified: 2013-02-15
Hi,

I have been having some problems with an old CA on our domain that I believe is conflicting with a new one.
I was unaware that an old one had existed and that server no longer exists (I wrote failed in the title to get more hits, although it is effectively the same thing). I have then installed a new Root enterprise CA and sub CA in the same domain without first removing the old one.

What is the best course of action to take? I understand that I may have to manually remove files but have been able to find a good guide. Just ones that for for removing CAs that are still running.

At the minute I am able to see both CRLs and certificates in the domain but the new CRL is not being noticed.

I am using windows server 2008r2

I hope someone can help me a again.

Josh
0
Comment
Question by:Joshwright100
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 24

Accepted Solution

by:
Sandeshdubey earned 500 total points
ID: 38845584
Have a look at below link how to remove failed server.You need to run PKIView.msc to remove the remove the obsolete certificate authority server.http://social.technet.microsoft.com/Forums/en/winserversecurity/thread/cb86e4a0-3164-42e4-8689-a89f9719dadd
0

Featured Post

Office 365 Training for IT Pros

Learn how to provision tenants, synchronize on-premise Active Directory, implement Single Sign-On, customize Office deployment, and protect your organization with eDiscovery and DLP policies.  Only from Platform Scholar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Had a business requirement to store the mobile number in an environmental variable. This is just a quick article on how this was done.
This process allows computer passwords to be managed and secured without using LAPS. This is an improvement on an existing process, enhanced to store password encrypted, instead of clear-text files within SQL
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question