Let me ask this, is there a way to prevent a server from pulling these certificates from AD through configurations? What could one do to stop the autoenrollment process from downloading roots and intermediates from the AIA and Certificate Authorities containers in AD?
Why when I deploy my roots and intermediate CA Certificates to AD do some servers automatically download them and others do not?
I am very confused by the process of publishing Root and Intermediate certificates to AD and how they deploy to servers across an enterprise. When I publish the Root and Intermediate CA certs to the AIA and Certification Authorities Containers in AD, some servers will pull the new certificates into their trust stores and others will not.
When looking for any documentation around this process, I cannot find much. Does anyone out there know the process from beginning to end? Also, does anyone have an idea of why some would pull the certs from AD and others would not?
Thank you to anyone who can shed light on these dark times.
Windows for business Windows Client for IT Pros Directory services Active Directory
Windows for business Windows Server User experience Other
Windows for business Windows Server Devices and deployment Configure application groups
12 answers
Sort by: Newest
-
-
Thameur-BOURBITA 36,261 Reputation points Moderator
2020-10-22T23:38:31.39+00:00 These are live production servers. No network issues, regular restarts, but ___domain rejoins are out of the question. Any other ideas?
In this case you case you can export the root certificate from another server and installer it in all impacted servers manually in the right store.
Please don't forget to mark this reply as answer if it help to fix your issue
-
Thameur-BOURBITA 36,261 Reputation points Moderator
2020-10-22T23:31:56.59+00:00 When you say check Network flow, are you referring to network connectivity?
Yes
Please don't forget to mark this reply as answer if it help to fix your issue
-
Thameur-BOURBITA 36,261 Reputation points Moderator
2020-10-22T23:25:46.613+00:00 Try one of the following actions:
- Check network flow
- Restart impacted servers and launch the following command certutil -pulse
- Rejoin impacted server to ___domain
Please don't forget to mark this reply as answer if it help to fix your issue
-
Chamby112 1 Reputation point
2020-10-22T23:19:47.297+00:00 This is where I'm getting to. This is not occurring on all of our systems. The large majority are, but I am seeing some that are not. I am trying to narrow down why they may not be updating on some. Are there instances others have seen where this is an issue? I.e. something disabled on the system, some GPO blocking this, etc.
I am trying to understand the whole process so I can try and isolate it to something specific, but I cannot find a detailed description of the process end-to-end.