"No Certificate Templates Could Be Found" error message when a user requests certificate from CA Web enrollment pages

Support for Windows Server 2003 ended on July 14, 2015

Microsoft ended support for Windows Server 2003 on July 14, 2015. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.


When a user tries to request a certificate from the certification authority (CA) Web enrollment pages, the user may receive the following error message:
No certificate templates could be found. You do not have permission to request a certificate from this CA, or an error occurred while accessing the Active Directory.
This behavior occurs if the Web enrollment pages are in an Active Directory domain on an Enterprise CA server. It occurs whether the Web enrollment pages are on the same server or on a different member server.
The CA Web enrollment pages perform a case-sensitive string comparison of two values. One value is the sServerConfig value in the Certdat.inc file in the %systemroot%\System32\Certsrv folder on the certificate server, and the other value is the dnsHostName attribute on the pkiEnrollmentService object in Active Directory. If the two strings do not match, including the case match, the enrollment fails.
To correct this behavior, follow these steps:
  1. View the Active Directory dNSHostName attribute on the pkiEnrollmentService object. This object is in the following location:
    CN=CertificateServer,CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=MyDomain,DC=com
    To view the dNSHostName attribute, use ADSIEdit.msc or LDP.exe.
  2. Edit the Certdat.inc file so that the value for sServerConfig is the same as the value for the dNSHostName attribute followed by the Certificate Authority Name.
    Note The sServerConfig value must be in the same exact case as the dNSHostName attribute. If this is not true, you will continue to get the same error.
  3. For example: If the DNS hostname for the Certification Authority is server1.domain.local and name of the Certification Authority is MYCA, then ensure the dNSHostName attribute for "CN=MYCA,CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=Domain,DC=local" object is set to "server1.domain.local" and sServerConfig in the certdat.inc file in the "%systemroot%\system32\certsrv" folder on the Certification Authority should be set to"server1.domain.local\MYCA".
  4. Have the user who wants to request the certificate restart Internet Explorer. This permits the new credentials to pass to the CA.
Note Also make sure that the user is granted Read and Enroll permissions on the certificate template which that user is requesting. You can grant these permissions either by using the ADSIEdit snap-in or the Certificate Templates snap-in.
For more information about a related issue, click the following article number to view the article in the Microsoft Knowledge Base:
239452 "Access Denied" when requesting certificate through Web access
web enrollment permission certificate services request advanced

Article ID: 811418 - Last Review: 11/22/2010 20:28:00 - Revision: 8.1

  • Microsoft Windows Server 2003, Standard Edition (32-bit x86)
  • Microsoft Windows Server 2003, Enterprise Edition (32-bit x86)
  • Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
  • Microsoft Windows 2000 Server
  • Microsoft Windows 2000 Advanced Server
  • Microsoft Windows Small Business Server 2003 Premium Edition
  • Microsoft Windows Small Business Server 2003 Standard Edition
  • kbprb KB811418