Retired Microsoft Blog disclaimer

This directory is a mirror of retired "Windows PKI Team" TechNet blog and is provided as is. All posting authorship and copyrights belong to respective authors.

Posts on this page:

Original URL: https://blogs.technet.microsoft.com/pki/2007/08/18/windows-pki-documentation-reference/
Post name: Windows PKI documentation reference
Original author: MS2065 [MSFT]
Posting date: 2007-08-18T18:42:00+00:00


Note: This post is not updated anymore since May 2010. The new PKI reference page is a WIKI page.

We have a broad list of documentation for the Windows PKI. To let you find the right content quicker, I have put together a grouped list of the current papers, knowledge base articles and web casts related to the technology.

General information

Training

Internet Newsgroup

Envision

Plan

Build

Deploy

Windows Server 2003

Windows Server 2008

Online Certificate Status Protocol

Windows Server 2008 R2

Operate

Certificate enrollment

Certificate management

Powershell

Windows Vista

Windows Server 2008

Develop

Extend

Original URL: https://blogs.technet.microsoft.com/pki/2007/08/06/how-to-re-install-the-default-certificate-templates/
Post name: How to re-install the default certificate templates?
Original author: MS2065 [MSFT]
Posting date: 2007-08-06T14:58:00+00:00



When you launch the certificate templates MMC snap-in (certtmpl.msc) for the first time, the certificate templates are installed automatically in the background. Installing the templates is independent of the availability of an enterprise CA. Enterprise Administrator permissions are required to successfully install the templates.


That's nice and convenient but what happens if you accidentally deleted the template objects from Active Directory? The templates can be viewed and also deleted (with appropriate permissions) through the Active Directory Sites and Services MMC snap-in (dssites.msc) or any other LDAP client can be used.





So, what to do if the templates or the OID container have disappeared? With a single command-line, you can get them back. As prerequisite to install the certificate templates you must have create child access to the template container in Active Directory which is the default setting for an enterprise administrator.



If you are running Windows Server 2003, use the following command with enterprise administrator permissions:



regsvr32 /i:i /n certcli.dll



If you have Windows Vista or Windows Server 2008 already in place, certutil.exe understands a new verb to re-install the templates. Certutil is included in all Windows Vista SKUs by default.



certutil -installdefaulttemplates



After performing one of the above commands you must restart the CA service.



The following two knowledgebase articles describe scenarios where re-installation of certificate templates can make sense:



Original URL: https://blogs.technet.microsoft.com/pki/2007/07/29/marking-private-keys-as-non-exportable-with-certutil-importpfx/
Post name: Marking private keys as non-exportable with certutil -importpfx
Original author: MS2065 [MSFT]
Posting date: 2007-07-29T16:00:00+00:00


When importing a PFX-file with the certificate import wizard, you can choose if the private key should be exportable or not. Your choice is stored in the key storage property identifier that is key-storage specific. In other words, there is no information in the certificate about the exportability of the related private key. It is possible that if you import the same PFX-file into different computers that the private key is maked as exportable on one computer and is not marked as exportable on another.

To perform a PFX-file import at a command-line you may be familiar with the certutil -importPFX command. Since Windows Server 2003 SP1, certutil understands extra arguments to improve the PFX import.


Here is the abstract syntax:


certutil -importPFX {PFXfile} [NoExport|NoCert|AT_SIGNATURE|AT_KEYEXCHANGE]


To make the private key non-exportable, use the following command:


certutil -importPFX [PFXfile] NoExport


To just install the private key but not the certificate, use the NoCert argument. It can be combined with the NoExport argument.


certutil -importPFX [PFXfile] NoCert


There are two more arguments forcing AT_SIGNATURE or AT_KEYEXCHANGE. Both cannot be used in combination and may require a conversion to a RSA key.


certutil -importPFX [PFXfile] AT_SIGNATURE


certutil -importPFX [PFXfile] AT_KEYEXCHANGE


To combine multiple modifiers with one command, all modifiers must appear comma seperated as a single common line parameter. For example:

Original URL: https://blogs.technet.microsoft.com/pki/2007/07/21/credential-roaming-hot-fix-available/
Post name: Credential Roaming Hot Fix Available
Original author: MS2065 [MSFT]
Posting date: 2007-07-21T15:51:00+00:00


If you have you already deployed Credential Roaming (see the whitepaper or webcast) or if you have plans to do so, you should be very aware of a new knowledgebase article because the size of your Active Directory might grow unnecessarily.

Refer to knowledgebase article 934797 for more information.

Original URL: https://blogs.technet.microsoft.com/pki/2007/05/27/the-missing-edit-button-in-the-ca-properties-extensions-tab/
Post name: The missing EDIT button in the CA properties extensions tab
Original author: MS2065 [MSFT]
Posting date: 2007-05-27T08:54:00+00:00


To adjust the CRL and AIA distribution point there are at least threechoices to do it. The most familiar way to change the distribution point might be through the CA MMC user interface. The second way is to directly change the registry key CACertPublicationURLs or CRLPublicationURLs with regedit.exe. Alternatively, you can use certutil -setreg to change these keys in the registry.

While having full editing control over the multi-valued registry key, you may miss an edit button in the UI to conveniently change an existing entry without retyping the full URL.


Only very few people are aware that you can use a copy/paste trick to overcome the missing edit button. Here are the steps to copy an existing CRL or AIA entry and create a new one:



  1. Open the Certification Authority MMC snap-in.

  2. Open the CA properties.

  3. Go to the Extensions tab.

  4. Select the entry that you want to copy from the list of available CRL or AIA entries.

  5. Press <CTRL>+<C> to copy the entry into the clip-board.

  6. Click the Add… button and press <CTRL>+<V>. The paste operation is certainly not limited to the Add Location window. Once the URL has been copied into the clipboard it can be pasted everywhere.

  7. Change the distribution point as appropriate.