
Setup: There are 2 CA Servers hosted on a Windows Failover Cluster having a shared storage, disks of which have been provided by ISCSI Storage. There is a separate CA Web Enrollment Server. IIS is installed on CA Servers for PKI. The Root CA is "Standalone Root CA".
Observation: There are 2 Certs on Ent_CA-Properties; The 1st Cert expired after 1 year and the second Cert's expiry is 5 Years, which is going to expire very soon. From one of the documents created by the old admin, we found that he renewed the cert with new key pair.
Issue: Now when we are trying to generate the CSR for Ent_CA, we are not getting the REQ file being generated.
When we enable debugging we found that the error points to the first certificate saying it is not within the time period etc. Basically it is not going past the 1st Cert.
If we try to renew the Cert with a new Key Pair we will get a REQ File but the problem is we can no longer use that option because we have recently Issued Smart Cards to users around 2-3 years before.
How to remove the Expired Cert from CA_Properties? Technically is it possible to remove Cert, Yes or NO? Some Articles say that it is not advisable to remove that old cert because CRL has that information in building the chain. For my understanding I want to know how to remove the expired cert from ENt_CA Properties.
The Microsoft Guy crashed the server while troubleshooting and we somehow managed to bring up the server.
How can we verify CRL Chain and see if everything is all right?
Under PKIVIEW.msc we see lot of Certs under NT Auth and don't exactly know why there are multiple certs expiring on the same date for the Ent_CA. Under Registry of CA Server, we see hash of two certs only, 1 is expired cert's and the other one is current Cert's hash.
Is there any powershell script which tests the health of the PKI and CRL and point us what exactly has been done wrong.
