"No Certificate Templates Could Be Found" error message when a user requests certificate from CA Web enrollment pages

Article translations Article translations
Article ID: 811418 - View products that this article applies to.
Expand all | Collapse all

SYMPTOMS


When a user tries to request a certificate from the certification authority (CA) Web enrollment pages, the user may receive the following error message:
No certificate templates could be found. You do not have permission to request a certificate from this CA, or an error occurred while accessing the Active Directory.
This behavior occurs if the Web enrollment pages are in an Active Directory domain on an Enterprise CA server. It occurs whether the Web enrollment pages are on the same server or on a different member server.

CAUSE

The CA Web enrollment pages perform a case-sensitive string comparison of two values. One value is the sServerConfig value in the Certdat.inc file in the %systemroot%\System32\Certsrv folder on the certificate server, and the other value is the dnsHostName attribute on the pkiEnrollmentService object in Active Directory. If the two strings do not match, including the case match, the enrollment fails.

RESOLUTION

To correct this behavior, follow these steps:
  1. View the Active Directory dNSHostName attribute on the pkiEnrollmentService object. This object is in the following location:
    CN=CertificateServer,CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=MyDomain,DC=com
    To view the dNSHostName attribute, use ADSIEdit.msc or LDP.exe.
  2. Edit the Certdat.inc file so that the value for sServerConfig is the same as the value for the dNSHostName attribute followed by the Certificate Authority Name.
    Note The sServerConfig value must be in the same exact case as the dNSHostName attribute. If this is not true, you will continue to get the same error.
  3. For example: If the DNS hostname for the Certification Authority is server1.domain.local and name of the Certification Authority is MYCA, then ensure the dNSHostName attribute for "CN=MYCA,CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=Domain,DC=local" object is set to "server1.domain.local" and sServerConfig in the certdat.inc file in the "%systemroot%\system32\certsrv" folder on the Certification Authority should be set to"server1.domain.local\MYCA".
  4. Have the user who wants to request the certificate restart Internet Explorer. This permits the new credentials to pass to the CA.
Note Also make sure that the user is granted Read and Enroll permissions on the certificate template which that user is requesting. You can grant these permissions either by using the ADSIEdit snap-in or the Certificate Templates snap-in.

MORE INFORMATION

For more information about a related issue, click the following article number to view the article in the Microsoft Knowledge Base:
239452 "Access Denied" when requesting certificate through Web access

Properties

Article ID: 811418 - Last Review: November 22, 2010 - Revision: 8.1
APPLIES TO
  • Microsoft Windows Server 2003, Standard Edition (32-bit x86)
  • Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
  • Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
  • Microsoft Windows 2000 Server
  • Microsoft Windows 2000 Advanced Server
  • Microsoft Windows Small Business Server 2003 Premium Edition
  • Microsoft Windows Small Business Server 2003 Standard Edition
Keywords: 
kbprb KB811418

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com