I'm honestly not sure if this is a PKI-related issue involving AD, or an AD-related issue involving PKI... But there is no PKI-specific option under "Windows Server" for this forum site.
What I'm trying to do: Use a special Domain Controller certificate template to make a certificate request on a DC which includes a list of SANs (Subject Alternative Names). (Yes, I know auto-enroll will not work!!) With a SAN, you can use a load-balancer
with Secure LDAP (port 636/tcp) and a common name.
I've done this before and it worked great. Downside is you have to manually renew certs. Not a problem here. I am NOT trying to publish the certificate into AD: that option is UNchecked in the certificate template.
The issue is that I am getting this error on the step where I run the command
certreq -f -submit -config "ca.corp.nydomain.com\My PKI Name" $csrFile $certFile
Where I get an error:
Certificate retrieved(Issued) Issued Could not publish Certificate. Insufficient access rights to perform the operation. 0x80072098 (WIN32: 8344 ERROR_DS_INSUFF_ACCESS_RIGHTS)
In the CAPI2 event log, the only message helpful is:
The certificate is not valid for the requested usage. |
I actually cloned the new template from the default/built-in "Domain Controllers" template, it's just be updated to 2012 R2 with some other parameters for the usage I am trying implement.
I've gone through all the things that come to mind, like special rights for "cert publishers" on the template, making sure the "Domain Admins" and "Domain Controllers" groups have rights... I'm not sure if I've MISSED something
simple!!!
I'm probably going to have to open a Premier ticket, but I was hoping that someone might point out something obvious I've missed.
The domain structure is a root domain, and I am working in a sub-domain, and the AD-integrated PKI servers are domain members of a different sub-domain. (So "A" is the root domain, "B" is the corp sub-domain, and "C" is the
sub-domain under "A" in which I am working on with the DC's.)
The DC is Windows Server 2012 R2 and the CA server is Windows Server 2012 R2.
Any thoughts would be greatly appreciated!!
-- Rob "I" --