Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

2-Tier PKI (Offline Root CA) can't renew subordinate CA certificates

Posted on 2016-10-19
5
Medium Priority
?
334 Views
Last Modified: 2016-10-24
I'm migrating my 2-tier Microsoft PKI from SHA1 to SHA256 and am following this document:

https://blogs.technet.microsoft.com/askds/2015/10/26/sha1-key-migration-to-sha256-for-a-two-tier-pki-hierarchy/

I am/was already using KSP. I've already converted, renewed, and published my offline Root CAs certificate, with a new CRL. So really, I simply had to run the certutil -setreg part and renew my certs.

I converted my 2 subordinates to SHA256 for all new certs but I can't renew their certs (the second step 10). They are both 2012 server core. When I manage them from a remote machine, under all tasks where you would find the Renew Certificate option is only Install certificate. I select it and a progress bar goes by but there is no dialog. Then I tried the following command but received this output and am not finding very much helpful info:

certutil -renewCert ReuseKeys
CertUtil: -renewCert command FAILED: 0x8007139f (WIN32: 5023)
CertUtil: The group or resource is not in the correct state to perform the requested operation.


How do I get the new SHA256 certs for the subordinates? Can I simply use certutil to generate brand new requests, USB key them to my offline Root CA to sign them and then finish it like i did when I first created them or would that cause a problem since they're existing and not new?
0
Comment
Question by:DaveQuance
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
5 Comments
 
LVL 83

Expert Comment

by:David Johnson, CD, MVP
ID: 41849663
You can't do it online, so you have to do the create request, copy to usb, import, authorize request, copy to usb
0
 

Author Comment

by:DaveQuance
ID: 41851079
I understood that part but I couldn't get the file to generate. I found that adding the -f option to the certutil command took care of that for me. I'll see if I can finish from there now that I finally have the req file.
0
 

Author Comment

by:DaveQuance
ID: 41851161
I have it issued and obtained the cert file from the Offline Root but I'm having trouble figuring out how to complete the request on the subordinate itself. All references I find use the GUI right clicking -> All Tasks -> Install a certificate. However, when I do that it never prompts me to find the file. I also tried certreq -accept but that throws an error about not finding the object.
0
 

Accepted Solution

by:
DaveQuance earned 0 total points
ID: 41851180
I'm fine now, the last comment was me just overcomplicating it seriously.

If you run into my issue, use the -f option on the certutil -renewcert. If you use Reusekeys put the -f in-between -renewcert and ReuseKeys.

This will get you  your req file. Go to your offline root with it, submit a new request, use the request file, go to pending certificates, issue it, then go to issued certificates, double click it, go to the details tab and Copy to File. Take your cer file and run certutil -installcert <cerFile>. A restart of certificate services will be required before it is used.
0
 

Author Closing Comment

by:DaveQuance
ID: 41856727
It was the only steps that helped get passed the hurdles.
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes Administrators rights are not enough. These cases call for the SYSTEM account. The process in this article outlines the steps required to execute commands using the SYSTEM account.
Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question