Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

PKI Template has been configured but not being deployed ?

Posted on 2015-01-30
1
Medium Priority
?
151 Views
Last Modified: 2015-02-12
Hi Everyone,

I have deployed a 3-tier PKI infrastructure in a Windows 2008 R2 envinronment.  There is a GPO in place for auto-enrollement of certigicates via a GPO.  Attached to the GPO is a security filter which has a group that only contains computer objects to deploy certificates to. I have copied the Computer template, duplicated and called 'Test AE'.  When I open the certificate on the test server, the 'Geneeral' tab displays the purpose of the certificate as 'All applications policies'.  If I click on the 'Details' tab and scroll down, where it details 'Certificate Template Name' the value is SubCA.  I expect the 'Certificate Template Name' to be 'Test AE' ?  

In the AD CS management console under 'Certificate Templatres' it does have the 'Test AE' displayed.  Also, the template on the security setting has the group I associated in AD to the GPO.  I have the group with 'Read','Enroll' and 'Autoenroll' configured.

Does anyone have any ideas as to why this is happening ?
0
Comment
Question by:CaussyR
1 Comment
 
LVL 39

Accepted Solution

by:
Mahesh earned 2000 total points
ID: 40579600
The certificate you seen is from subordinate CA and I don't think it is got deployed through GPO
Delete that cert from test server and run gpupdate /force again to see what certificate is getting installed

do not duplicate computer certificate, it is default certificate template
U can directly use it via GPO, in GPO, under "computer configuration\policies\windows settings\security settings\ public key policies" enable certificate enrollment and auto enrollment
Then navigate to automatic certificate request settings and add "computer" certificate template there which will take care of auto enrollment
https://technet.microsoft.com/en-us/library/dd379529(v=ws.10).aspx

If you wanted just client authentication, do above auto enrollment settings in policy and duplicate workstation authentication certificate and check if it works
Because computer template contains both server authentication and client authentication
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
If you’ve ever visited a web page and noticed a cool font that you really liked the look of, but couldn’t figure out which font it was so that you could use it for your own work, then this video is for you! In this Micro Tutorial, you'll learn yo…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question