ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Certificate Authority Quagmire

    Scheduled Pinned Locked Moved IT Discussion
    17 Posts 4 Posters 1.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • GreyG
      Grey
      last edited by

      r901Hdi.jpg

      So I have a weird situation, as you can see. I have 5 entries in my AD integrated cert database for discovery. One of them, number 1 in the list, is my 'primary' DC -- DC001, and it has the wrong name.

      • How do I change the cert name?

      I found an article from https://mssec.wordpress.com/2013/03/19/manually-remove-old-ca-references-in-active-directory/ that seems like it covers all of the needs I have over removing the old enries from AD so that there's only the 2 I will need (dc001 and a new one I'll create on dc002).

      • Has anyone done this? What are the risks and/or things you encountered when doing this?
      1 Reply Last reply Reply Quote 1
      • JaredBuschJ
        JaredBusch
        last edited by

        Have not used an internal CA but once in like 2004. No clues on this one.

        1 Reply Last reply Reply Quote 2
        • ObsolesceO
          Obsolesce
          last edited by

          I used a procedure similar to the one in the URL you linked, in a production environment. The case I used it in was to completely remove a PKI and create a new one. I know a little different than in your case, but as long as you do not delete anything you need you will be fine.

          I have two questions to ask that will determine whether or not I can help you:

          1. What command did you use to get that output in PS?

          2. For what purposes are you using your PKI?

          ... and because I can't count
          3. Is it the subject name of the certificate that is not correct? Not sure I understand what you are referring to.

          GreyG 1 Reply Last reply Reply Quote 1
          • GreyG
            Grey @Obsolesce
            last edited by

            @Tim_G said in Certificate Authority Quagmire:

            I used a procedure similar to the one in the URL you linked, in a production environment. The case I used it in was to completely remove a PKI and create a new one. I know a little different than in your case, but as long as you do not delete anything you need you will be fine.

            I have two questions to ask that will determine whether or not I can help you:

            1. What command did you use to get that output in PS?

            2. For what purposes are you using your PKI?

            ... and because I can't count
            3. Is it the subject name of the certificate that is not correct? Not sure I understand what you are referring to.

            • Certutil. Use it on any windows system that's connected to your domain.
            • Internal validation, especially on VDI and internal web servers.
            • Yes.
            ObsolesceO 1 Reply Last reply Reply Quote 0
            • ObsolesceO
              Obsolesce @Grey
              last edited by

              @Grey said in Certificate Authority Quagmire:

              @Tim_G said in Certificate Authority Quagmire:

              I used a procedure similar to the one in the URL you linked, in a production environment. The case I used it in was to completely remove a PKI and create a new one. I know a little different than in your case, but as long as you do not delete anything you need you will be fine.

              I have two questions to ask that will determine whether or not I can help you:

              1. What command did you use to get that output in PS?

              2. For what purposes are you using your PKI?

              ... and because I can't count
              3. Is it the subject name of the certificate that is not correct? Not sure I understand what you are referring to.

              • Certutil. Use it on any windows system that's connected to your domain.
              • Internal validation, especially on VDI and internal web servers.
              • Yes.

              You can't change the name on the certificate. You will need to request a new one from your DC which you can do via certlm.msc.

              How did the DC get a certificate with an incorrect name in the first place?

              GreyG 1 Reply Last reply Reply Quote 4
              • GreyG
                Grey @Obsolesce
                last edited by

                @Tim_G said in Certificate Authority Quagmire:

                @Grey said in Certificate Authority Quagmire:

                @Tim_G said in Certificate Authority Quagmire:

                I used a procedure similar to the one in the URL you linked, in a production environment. The case I used it in was to completely remove a PKI and create a new one. I know a little different than in your case, but as long as you do not delete anything you need you will be fine.

                I have two questions to ask that will determine whether or not I can help you:

                1. What command did you use to get that output in PS?

                2. For what purposes are you using your PKI?

                ... and because I can't count
                3. Is it the subject name of the certificate that is not correct? Not sure I understand what you are referring to.

                • Certutil. Use it on any windows system that's connected to your domain.
                • Internal validation, especially on VDI and internal web servers.
                • Yes.

                You can't change the name on the certificate. You will need to request a new one from your DC which you can do via certlm.msc.

                How did the DC get a certificate with an incorrect name in the first place?

                Imported from an old DC.

                1 Reply Last reply Reply Quote 0
                • DashrenderD
                  Dashrender
                  last edited by

                  That seems weird why would you import a certificate from another active directory server instead of making a new one or requesting a new one

                  GreyG 1 Reply Last reply Reply Quote 0
                  • GreyG
                    Grey @Dashrender
                    last edited by

                    @Dashrender said in Certificate Authority Quagmire:

                    That seems weird why would you import a certificate from another active directory server instead of making a new one or requesting a new one

                    I can advise, suggest and document, but at the end of the day I still have to work with what I have and follow the business directive. Unfortunately, this is one of those times.

                    1 Reply Last reply Reply Quote 0
                    • ObsolesceO
                      Obsolesce
                      last edited by

                      Have you had a chance to replace the certificate yet?

                      GreyG 1 Reply Last reply Reply Quote 0
                      • GreyG
                        Grey @Obsolesce
                        last edited by

                        @Tim_G said in Certificate Authority Quagmire:

                        Have you had a chance to replace the certificate yet?

                        I have a new wildcard cert. I'm not sure I want to use that on the DC. Has anyone done that? I'm unsure if it's a best practice or not.

                        1 Reply Last reply Reply Quote 0
                        • ObsolesceO
                          Obsolesce
                          last edited by

                          On the DC, can't you request another one from your CA via certlm.msc?

                          GreyG 1 Reply Last reply Reply Quote 0
                          • GreyG
                            Grey @Obsolesce
                            last edited by

                            @Tim_G said in Certificate Authority Quagmire:

                            On the DC, can't you request another one from your CA via certlm.msc?

                            The DC is the CA.

                            ObsolesceO 1 Reply Last reply Reply Quote 0
                            • ObsolesceO
                              Obsolesce @Grey
                              last edited by

                              @Grey said in Certificate Authority Quagmire:

                              @Tim_G said in Certificate Authority Quagmire:

                              On the DC, can't you request another one from your CA via certlm.msc?

                              The DC is the CA.

                              Not good... But I guess it is what it is. So let's just focus on fixing it.

                              Is starting over an option?

                              If not...
                              How is your pki set up? How many tiers? From where did you import the wrongly named cert?

                              GreyG 1 Reply Last reply Reply Quote 0
                              • GreyG
                                Grey @Obsolesce
                                last edited by

                                @Tim_G said in Certificate Authority Quagmire:

                                @Grey said in Certificate Authority Quagmire:

                                @Tim_G said in Certificate Authority Quagmire:

                                On the DC, can't you request another one from your CA via certlm.msc?

                                The DC is the CA.

                                Not good... But I guess it is what it is. So let's just focus on fixing it.

                                Is starting over an option?

                                If not...
                                How is your pki set up? How many tiers? From where did you import the wrongly named cert?

                                No. Unsure; I inherited this and I'm hazy on CAs. A previous DC was in use and is decommissioned, but the old cert was imported to keep some cisco products from complaining.

                                ObsolesceO 1 Reply Last reply Reply Quote 0
                                • ObsolesceO
                                  Obsolesce @Grey
                                  last edited by

                                  @Grey said in Certificate Authority Quagmire:

                                  @Tim_G said in Certificate Authority Quagmire:

                                  @Grey said in Certificate Authority Quagmire:

                                  @Tim_G said in Certificate Authority Quagmire:

                                  On the DC, can't you request another one from your CA via certlm.msc?

                                  The DC is the CA.

                                  Not good... But I guess it is what it is. So let's just focus on fixing it.

                                  Is starting over an option?

                                  If not...
                                  How is your pki set up? How many tiers? From where did you import the wrongly named cert?

                                  No. Unsure; I inherited this and I'm hazy on CAs. A previous DC was in use and is decommissioned, but the old cert was imported to keep some cisco products from complaining.

                                  You still need to renew the certificate. You can do it in CA management.

                                  1 Reply Last reply Reply Quote 0
                                  • GreyG
                                    Grey
                                    last edited by

                                    Is there an article for that on technet? I don't want to screw it up.

                                    1 Reply Last reply Reply Quote 0
                                    • ObsolesceO
                                      Obsolesce
                                      last edited by

                                      Do you have an offline root CA or is do you just have a single CA that does it all: certificate issuing, CDP, etc.?

                                      1 Reply Last reply Reply Quote 0
                                      • 1 / 1
                                      • First post
                                        Last post