Event ID 51 — AD CS Certification Authority Certificate and Chain Validation
Applies To: Windows Server 2008
Chain or path validation is the process by which end-entity (user or computer) certificates and all certification authority (CA) certificates are processed hierarchically until the certificate chain terminates at a trusted, self-signed certificate. Typically, this is a root CA certificate. Active Directory Certificate Services (AD CS) startup can fail if there are problems with availability, validity, and chain validation for the CA certificate.
|Product:||Windows Operating System|
|Message:||A certificate in the chain for CA certificate %3 for %1 has been revoked. %2.|
Reissue certificates in the chain for a revoked CA certificate
Although it is not common for a certification authority (CA) certificate to be revoked. To resolve this situation:
- Confirm that the CA certificate has been revoked.
- Ask a CA administrator if the revocation was deliberate or unintended. If the certificate was revoked intentionally, then no further action is needed.
- If it was revoked unintentionall, the CA certificate and every certificate in the branch must be reissued through enrollment or autoenrollment.
- If the problem persists, enable CryptoAPI 2.0 Diagnostics to identify and resolve additional errors that might be causing the problem.
To perform these procedures, you must have Manage CA permission, or you must have been delegated the appropriate authority.
Confirm that a CA certificate has been revoked
To confirm that a CA certificate has been revoked:
Open a command prompt window.
Type certutil -urlfetch -verify<CAcert.cer> and press ENTER.
Replace CAcert.cer with the name of the CA certificate file.
To enroll for a CA certificate
To enroll for a CA certificate:
- On the computer hosting the CA, click Start, point to Administrative Tools, and then click Certification Authority.
- Right-click the CA name, select All Tasks and click Request CA Certificate.
- Select the request file and the name of the CA or computer hosting a parent CA to process the request and complete the enrollment.
- After the CA certificate has been installed, you will have to reissue all certificates that had been issued using the revoked CA certificate.
Enable CryptoAPI 2.0 Diagnostics
To enable CryptoAPI 2.0 Diagnostics:
- On the computer hosting the CA, click Start, point to Administrative Tools, and click Event Viewer.
- In the console tree, expand Event Viewer, Applications and Services Logs, Microsoft, Windows, and CAPI2.
- Right-click Operational, and click Enable Log.
- Click Start, point to Administrative Tools, and click Services.
- Right-click Active Directory Certificate Services, and click Restart.
- Scan the CAPI2 diagnostics log for information that relates to this error.
To perform this procedure, you must have Manage CA permission, or you must have been delegated the appropriate authority.
To confirm that the certification authority (CA) certificate and chain are valid:
- On the computer hosting the CA, click Start, type mmc, and then press ENTER.
- If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- On the File menu, click Add/Remove Snap-in, click Certificates, and then click Add.
- Click Computer account, and click Next.
- Click Finish, and then click OK.
- In the console tree, click Certificates (Local Computer), and then click Personal.
- Confirm that a CA certificate that has not expired exists in this store.
- Right-click this certificate and select Export to launch the Certificate Export Wizard.
- Export the certificate to a file named Cert.cer.
- Type Start, cmd and press ENTER.
- Type certutil -urlfetch -verify <cert.cer> and press ENTER.
- If no validation, chain building, or revocation checking errors are reported, the chain is valid.