Solved

Prevent Old CA Certificate from being distributed to Domain Clients

Posted on 2016-09-08
7
11 Views
Last Modified: 2016-10-07
Hi,

I run a Server 2012 R2 Domain.

I had an issue that my original CA certificate that expires in 2021 did not have the crl url in it so I created a new CA certificate created CA certificate that expires in 2026.

in the Certificate Authority General tab I can see both certificates.

I need to stop the original certificate from being distributed to the Domain Clients as its causing errors on my S4B servers.

I have tried going into the MMC certificates snap in (where you can see both the Old and New CA certificate) and deleting the old CA certificate on a client computer - but it just gets re-added.

any help would be appreciated

many thanks

jack
0
Comment
Question by:jackbenson
  • 5
  • 2
7 Comments
 
LVL 29

Accepted Solution

by:
Rich Weissler earned 500 total points (awarded by participants)
ID: 41789715
Okay... what I know.
There are two mechanisms thru which your trusted CA certificate is getting pushed to clients:
  1. Would be via Group Policy -- so you'd want to look thru the policies applied to your clients to make certain that isn't happening.
  2. Via certutil -dspubilsh.  In that case, I believe your certificate will be visible via ADSIEdit in Configuration,Services,Public Key Services, Certification Authorities.  Now, I fear -- that is the edge of my knowledge.  I suspect certutil -delstore is the best way to remove the old CA... but I don't know what impact manually deleting the CA Certificate might have.

In either case, fixing those will only prevent the client from receiving the CA on the local machine AGAIN after you remove them... it won't remove them.
0
 
LVL 29

Expert Comment

by:Rich Weissler
ID: 41817529
Original request was to stop the certificate from propagating to the client machines.  There are two ways the root certificate would be distributed to clients, and this answer addresses each.
0
 
LVL 29

Expert Comment

by:Rich Weissler
ID: 41832441
Adding additional information: This is the procedure to remove an Enterprise CA from an environment.  Steps 6 & 7 are of particular interest if your CA is being distributed from AD (rather than by group policy.)
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 
LVL 1

Author Comment

by:jackbenson
ID: 41833143
I do not need to remove the Certificate Authority

I originally created the  Certificate Authority in 2011 and it created a CA Certificate.

that original CA Certificate did not have a crl so I created a new CA Certificate in 2016.

every time I delete the old CA Certificate from a domain client - it gets replaced.

its not group policy that is causing it.

I need to stop the client computers getting the 2011 CA Certificate

thanks

jack
0
 
LVL 29

Expert Comment

by:Rich Weissler
ID: 41833470
I believe I understand.  If the certificate isn't propagated by a Group policy, then there are objects in AD which still exist from the Certificate Authority created in 2011.  Because an Enterprise Certificate authority writes objects into the Active Directory, I believe you need to run thru the Certificate Authority decommissioning steps for that certificate authority.  I believe the specific object that needs to be removed is the certificationAuthority object specifies as the third object in step 6 -- but I'd advocate you run thru all of steps 5 and 6 to clean up the old installation.
0
 
LVL 1

Author Comment

by:jackbenson
ID: 41833474
Rich,

can I check that you understand that I have not installed a new Certificate Authority - just a new certificate for the authority created in 2011

thanks

jack
0
 
LVL 29

Expert Comment

by:Rich Weissler
ID: 41833497
Apologies.  Just step six then... there are two certificateAuthority objects which contain the old certificate.  It's the object in "CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=ForestRoot,DC=com. " which is causing that certificate to repopulate to your client machines... but be sure to only remove the 2011 certificate.

(And hopefully your new CA certificate isn't signed using the SHA1 algorithm.  Early next years, a fair amount of software will stop honoring certificates signed by CAs using SHA1.  Less of an issue for an internal CA, but could cause some software which checks to fail without a message.)
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Big data transfers via information superhighways require special attention and protection. Learn more about the IT-regulations of the country where your server is located. Analyze cloud providers and their encryption systems for safe data transit. S…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
This tutorial will walk an individual through the process of installing of Data Protection Manager on a server running Windows Server 2012 R2, including the prerequisites. Microsoft .Net 3.5 is required. To install this feature, go to Server Manager…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now