Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Certificate is not auto enrolling

Posted on 2015-02-19
10
Medium Priority
?
660 Views
Last Modified: 2015-02-27
Hi,

I'm brand new to experts exchange and am hoping somebody can assist me with the below.

I'm not hugely familiar with CA's, NPS etc but here goes.

We have a Windows 2008 RADIUS server that manages connections to our Wireless network. It uses certificate based authentication.

Group policy takes care of auto enrolling clients. (My computer account is in an OU where the computer settings are set to auto enroll). For some reason I cannot get the CA to issue me a new certificate.
My machine (Windows 7) had a certificate but when trying to connect to the wifi I could see there was an error that I did not match any policy.  I decided to remove the certificate from my machine so I would be issued a new one. This is where it doesn't work. I can see certificates being issued to other clients but it won't for me not matter how many times I log on/off or retstart. There are plenty of other users able to use the wifi with their issued certificates.  If I log onto a machine that has just been rebuilt and not logged onto the domain before, the certificate gets issued. I can then export this to my other machine and it works fine.

When the certificate gets issued, should it go to the certificate store of the user account or computer?

Any help/advice to solve this would be greatly appreciated. I will try to answer any questions that may arise.

Thanks
Mark
0
Comment
Question by:MFAFC
  • 6
  • 4
10 Comments
 

Author Comment

by:MFAFC
ID: 40618568
To add to this, when I look in the NPS event logs I see the error.

Network Policy Server denied access to a user
 and then;
The client could not be authenticated  because the Extensible Authentication Protocol (EAP) Type cannot be processed by the server.

Obviously this is due to the fact I am not getting a certificate.

Thanks
0
 
LVL 22

Expert Comment

by:Jakob Digranes
ID: 40618608
is this user or computer certificate?
Did you also revoke certificate or just delete from local store on computer?

If you just delete it, you need to revoke this on CA-server aswell.
Most likely it is set "Do not reenroll is certificate exist in AD" and if you go to Active Directory Users and Computers - view - Advanced features and look at you user object - you'll see a tab called published certificates. Probably you'll have your cert here.

So:
- revoke
- replicate
- try to reissue (alternatively certutil -pulse and gpupdate /force on computer, or reboot)
0
 

Author Comment

by:MFAFC
ID: 40618640
Hi Jakob,

Thanks for the quick response.

I'm not sure if it's a user or computer certificate - I didn't set this up originally. How would I tell?
I didn't revoke the certs first - I just deleted it from the local store on the machine - from trusted root and intermediate.

Looking at the certificate template settings, the, "Do not automatically reenroll if a duplicate certificate exists in AD" is not checked so it musn't be that.
Looking in AD, there is no certificate listed for me since 11th Feb.
Certutil -pulse gives me an access denied error I'm afraid.

I have just found a temporary workaround. By opening the cert store on the local machine  and from the personal cert folder I can request a new certificate manually for the Wireless authentication. If I then copy and paste this into trusted root, I am able to connect to the wireless. Looking at my account in AD, under published certificates, I can now see a certificate for me today.

Like you advised, as a test is it now worth revoking the certs on the CA server, deleting them from the local store on my machine and allowing group policy to auto enrol me with a new one? Should this then create new entries in the cert store?
How do I know if this is setup to be a user or computer cert?

Thanks you for your help so far - it is very much appreciated.
0
Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:MFAFC
ID: 40618653
Update - running a command prompt as admin and then using Certutil -pulse got rid of the access denied error.
0
 
LVL 22

Accepted Solution

by:
Jakob Digranes earned 2000 total points
ID: 40618659
first of all. In trusted root and intermediate store only certificates from Certification Authority servers are located and only used to build trust. Should not be delted, unless you decomission Certification Authority server.

If you have already a certificate in your AD-object (user name) then this is a user cert. I'd advice to do this:
1. revoke cert
2. delete cert from AD user object
3. delete cert from user store (mmc - user store - personal - delete cert)
4. reboot - fingers crossed

Please make sure that your connection policy on NPS is set ut with eiter EAP-TLS or Protected EAP with EAP-TLS as inner method, and not ms-chapV2
0
 

Author Comment

by:MFAFC
ID: 40618950
Hi Jakob,

I have done the above exactly as you described. I revoked the certs from the CA with the reason of superceeded, removed the certs from my AD account and removed them from the local store under "My User" account"

I have left the certificates in trusted root and intermediate store as I now understand those are present simply from having the CA on the domain.

I have logged back on and the certificate still does not auto enroll. Checking AD there were no published certs for me. Again, I have had to manually request to enroll the certificate. Upon doing so allowed me to connect to wifi.

With regards to the connection policy, it is set to use Microsoft Smart Card - I have attached a screenshot.
Cert.jpg
0
 
LVL 22

Expert Comment

by:Jakob Digranes
ID: 40619769
OK


the autoenrollment can be sketchy business if you first have failed in an enrollment. Try GUPDATE /FORCE

regarding your Network Policy - please uncheck the Mschap and mschap v2 option, as they will allow users to connect using username and password in domain, without certificate, and without setting up an encrpted tunnel
0
 

Author Comment

by:MFAFC
ID: 40620725
I will give that a try throughout the course of the day.

It's strange because I did get auto enrolled originally and the system does actually work for everybody else - until I delete the cert and try to let it auto enroll again.

I will come back with the results.

Thanks
0
 

Author Comment

by:MFAFC
ID: 40620907
Hi Jakob,

I've been doing some more digging and it looks like this could actually be a group policy issue where my computer account is sitting. This GPO is set to auto enroll (computer config settings) to enabled but it looks like this GPO is not applying when I do a gpresult -R. It's the same for each computer that is in that OU actually.

I'm trying to look at why the GPO is not applying but I haven't found anything yet. I'm going to create a new test GPO and see what that does.
0
 
LVL 22

Expert Comment

by:Jakob Digranes
ID: 40620924
as a best practice - you should set autoenroll settings in Default Domain policy and (important) instead restrict autoenrollment on Certificate Templates to groups.

Example: if you set default domain policy to allow automatic certificate enrollment, but only the group grpUserCerts have the permission set to autoenroll, only members of that group would get the certificate.

You limit restrictions to autoenrollment on certificates on certificate templates MMC (certtmpl.msc from RUN).
Also - remove all certificate templates you're not enrolling - they will only be removed from CA and can be EASILY imported back..

ALSO - I'd recommend turning on credentials roaming on user certificate enrollment policy. With this the users will only get one certificate, and this will be loaded from User Object in AD to the user profile on all domain joined (!) devices the users logs on to. A must have if certs are used for encryption or secured email
0

Featured Post

Has Powershell sent you back into the Stone Age?

If managing Active Directory using Windows Powershell® is making you feel like you stepped back in time, you are not alone.  For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Resolving an irritating Remote Desktop connection that stops your saved credentials from being used.
Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
This Micro Tutorial will teach you how to the overview of Microsoft Security Essentials. This is a free anti-virus software that guards your PC against viruses, spyware, worms, and other malicious software. This will be demonstrated using Windows…
The Task Scheduler is a powerful tool that is built into Windows. It allows you to schedule tasks (actions) on a recurring basis, such as hourly, daily, weekly, monthly, at log on, at startup, on idle, etc. This video Micro Tutorial is a brief intro…
Suggested Courses

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question