Select the product you need help with
- Internet Explorer
- Windows Phone
- More products
How to import third-party certification authority (CA) certificates into the Enterprise NTAuth store
Article ID: 295663 - View products that this article applies to.
This article was previously published under Q295663
This article describes two methods you can use to import the certificates of third-party certification authorities (CAs) into the Enterprise NTAuth store. This process is required if you are using a third-party CA to issue smart card logon or domain controller certificates. By publishing the CA certificate to the Enterprise NTAuth store, the Administrator indicates that the CA is trusted to issue certificates of these types. Windows CAs automatically publish their CA certificates to this store.
The NTAuth store is an Active Directory directory service object that is located in the Configuration container of the forest. The Lightweight Directory Access Protocol (LDAP) distinguished name is similar to the following:
CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=MyDomain,DC=comCertificates that are published to the NTAuth store are written to the cACertificate multiple-valued attribute. There are two supported methods to append a certificate to this attribute.
Method 1: Import a certificate by using the PKI Health ToolPKI Health Tool (PKIView) is an MMC snap-in component that displays the status of one or more Microsoft Windows certification authorities that comprise a public key infrastructure (PKI). It is available as part of the Windows Server 2003 Resource Kit Tools. To download these tools, visit the following Microsoft Web site:
http://www.microsoft.com/downloads/details.aspx?familyid=9d467a69-57ff-4ae7-96ee-b18c4790cffd&displaylang=enPKIView gathers information about the CA certificates and certificate revocation lists (CRLs) from each CA in the enterprise. Then, PKIView validates the certificates and CRLs to ensure that they are working correctly. If they are not working correctly or if they are about to fail, PKIView provides a detailed warning or some error information.
PKIView displays the status of Windows Server 2003 certification authorities that are installed in an Active Directory forest. You can use PKIView to discover all PKI components, including subordinate and root CAs that are associated with an enterprise CA. The tool can also manage important PKI containers, such as root CA trust and NTAuth stores, that are also contained in the configuration partition of an Active Directory forest. This article discusses this latter functionality. For more information about the PKIView, see the Microsoft Windows Server 2003 Resource Kit Tools documentation.
Note You can use PKIView to manage both Windows 2000 CAs and Windows Server 2003 CAs. To install the Windows Server 2003 Resource Kit Tools, your computer must be running Windows XP or later.
To import a CA certificate into the Enterprise NTAuth store, follow these steps:
Method 2: Import a certificate by using Certutil.exeCertutil.exe is a command-line utility for managing a Windows CA. In Windows Server 2003, you can use Certutil.exe to publish certificates to Active Directory. Certutil.exe is installed with Windows Server 2003. It is also available as part of the Microsoft Windows Server 2003 Administration Tools Pack. To download this tools pack, visit the following Microsoft Web site:
http://www.microsoft.com/downloads/details.aspx?FamilyID=c16ae515-c8f4-47ef-a1e4-a8dcbacff8e3&DisplayLang=enTo import a CA certificate into the Enterprise NTAuth store, follow these steps:
This registry key should be automatically updated to reflect the certificates that are published to the NTAuth store in the Active Directory configuration container. This behavior occurs when Group Policy settings are updated and when the client-side extension that is responsible for autoenrollment executes. In certain scenarios, such as Active Directory replication latency or when the Do not enroll certificates automatically policy setting is enabled, the registry is not updated. In such scenarios, you can run the following command manually to insert the certificate into the registry location:
certutil -enterprise -addstore NTAuth CA_CertFilename.cer
Article ID: 295663 - Last Review: June 18, 2008 - Revision: 3.1