This is Windows 2000 Server AD. During my testing phase learning how to
migrate user cert from a subordinate CA server to another subordinate CA
server, I must have accidentally removed the pKIEnrollmentService that
reference to production subordinate CA server at AD Sites & Services mmc.
Users now cannot request for new cert with the error message "cannot open
certificate template...". I have simulated my action at test lab, even if I
have tried with the CA restore or removing CA server then re-installing using
the existing key & database wont add back the deleted "pKIEnrollmentService"
object. Any clue? Thanks a bunch!!!
--
David B. Cross [MS]
--
This posting is provided "AS IS" with no warranties, and confers no rights.
"seeker01" <seek...@discussions.microsoft.com> wrote in message
news:15A87A38-857C-4E9A...@microsoft.com...
As David stated, you do not have to rebuild the existing CA, just
install (and then probably remove) another enterprise CA. This will re-
create the missing AD objects. The deletion will not remove them, but
will leave them available for the existing CA.
If you choose to reinstall the existing CA, when you do the
reinstallation, choose to re-use the existing certificate, and there is
an option to use the existing database as well at that point.
Brian
In article <6436D27D-5CE9-4448...@microsoft.com>,
seek...@discussions.microsoft.com says...
--
==
Brian Komar
MVP - Windows - Security
http://www.identit.ca/blogs/brian
To be safe, I would do the following beforehand:
- Backup the CA key pair:
md backup
certutil -backupkey c:\Backup
** this creates the PKCS#12 file in the c:\backup folder
- Backup the CA database
certutil -backupdb c:\Backup
** This backups the CA database in the c:\Backup folder
I would also take a System State backup of the CA computer.
Once all of your backups are done, uninstall Certificate Services.
Then reinstall Certificate Services, but on the page where you identify
the CSP, enable the option to use an existing certificate. You should
see the CA name in the listing. If you do not, refer to the PKCS #12
file in the C:\Backup folder. On the folder locations page, you should
be able to enable the option to re-use the existing CA datbase.
Brian
No. The System State is actually the preferred method of restoring in
the event of CA failure. What I *do* recommend is that you go through
both processes a few times in a test network, just to make sure.
In addition, I would recommend backing up the CertSvc registry key, so
that all settings are maintained if you restore using a manual backup.
I will backup the registry too. Is restoring CA from the system state
considered AD corruption? Do I do authoritative restore or non-authoritative
restore? Thanks.
Brian
In article <EB0C6258-A10E-4172...@microsoft.com>,
seek...@discussions.microsoft.com says...