AD CS publish certificate issue
Hi, I setup a lab environment where I'm testing the AD CS stuff before I implement this in production. I have a root domain (msad.loopx.org) and a child domain (sub.msad.loopx.org). For the PKI environment I chose the 2 tier way with a standalone Root CA and an Enterprise Issuing Subordinate CA. The standalone RootCA runs on a workgroup server and the Issuing CA runs on a member server. This member server is joined to the child domain. I want to keep the forest root as clean as possible. Everything is working good so far, the DCs got automatically his certificates. My question is about a warning in the Application log from the Enterprise CA server. Below is the warning that I get. I get this warning for DCs in both domains, the root and the child domain. Active Directory Certificate Services could not publish a Certificate for request 7 to the following location on server fkmsdc2.sub.msad.loopx.org: CN=FKMSDC4,OU=Domain Controllers,DC=sub,DC=msad,DC=loopx,DC=org. Insufficient access rights to perform the operation. 0x80072098 (WIN32: 8344). ldap: 0x32: 00002098: SecErr: DSID-03150BB9, problem 4003 (INSUFF_ACCESS_RIGHTS), data 0 Should I care about this warning? I don't know where to check to fix this. The Enterprise CA computer was automatically in the Cert Publishers group of the child domain where he is a member of. Maybe someone has an idea? Thanks Marco
June 17th, 2010 11:54pm

Hi, Please refer to the following article and verify that the Cert Publishers group has Read userCertificate and Write userCertificate permission on the computer objects. Certification Authority configuration to publish certificates in Active Directory of trusted domain http://support.microsoft.com/kb/281271 After that, on the CA server, at a command prompt, run the following three commands: certutil -setreg SetupStatus -SETUP_DCOM_SECURITY_UPDATED_FLAG net stop certsvc net start certsvc If the issue persists, I think that the CA computer account does not have the Cert Publishers sid in its token. Please restart the CA server and check the result.Please remember to click Mark as Answer on the post that helps you, and to click Unmark as Answer if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread.
Free Windows Admin Tool Kit Click here and download it now
June 22nd, 2010 10:31am

Thanks for your reply Joson. I already found that 281271 article and tried some parts of it. Some items don't exist in my setup. Like #3 Configure the CA Exit Module to publish certificates to Active Directory. Your magic sentence was "Please restart the CA server...". Actually I never restarted the server after I installed the Enterprise CA. Installation was successful without any notice that a reboot is required. So I didn't reboot it. So this god damn reboot was the solution. There was no need to modify anything manually. Only thing I did was putting the CA server computer account in the "Cert Publishers" group of the forest root domain. He was automatically member of this group in the child child domain where he is a member server. After the reboot when the DCs get their certificates it's published fine in the userCertificate attribute to the DC object in the OU Domain Controllers. Thanks again Marco
June 23rd, 2010 1:46pm

On Wed, 23 Jun 2010 10:46:36 +0000, Marco Schirrmeister wrote: Your magic sentence was "Please restart the CA server...". Actually I never restarted the server after I installed the Enterprise CA. Installation was successful without any notice that a reboot is required. So I didn't reboot it. So this god damn reboot was the solution. There was no need to modify anything manually. Only thing I did was putting the CA server computer account in the "Cert Publishers" group of the forest root domain. He was automatically member of this group in the child child domain where he is a member server. After the reboot when the DCs get their certificates it's published fine in the?userCertificate attribute to the DC object in the OU Domain Controllers. This is Windows Security 101. When you add or remove a computer from a group you need to restart the computer in order to get the changed group membership reflected in the access token. Same for a user account, though in the case of a user account, you only need to log off and then log on again to get the updated group membership. FWIW - there's really no need to have the DC's certificates published in the directory. Paul Adare MVP - Identity Lifecycle Manager http://www.identit.ca
Free Windows Admin Tool Kit Click here and download it now
June 23rd, 2010 2:12pm

Thanks for clarification Paul. And yes, everything was working without the published certificate, but I just want clean logs and tried to fix errors and warnings. It publishes the certs by default. I did not enabled this and it's also not enabled in the templates from what I can see.
June 23rd, 2010 4:08pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics