Export (0) Print
Expand All

Event ID 94 — AD CS Active Directory Domain Services Connection

Updated: November 27, 2007

Applies To: Windows Server 2008

red

Active Directory Certificate Services (AD CS) requires at least Read access, and in some instances Write access, to certain objects in Active Directory Domain Services (AD DS). Failure to access these Active Directory objects can prevent AD CS from starting.

Event Details

Product: Windows Operating System
ID: 94
Source: Microsoft-Windows-CertificationAuthority
Version: 6.0
Symbolic Name: MSG_CA_CERT_NO_AUTH_STORE
Message: Active Directory Certificate Services %1 cannot open the certificate store at CN=NTAuthCertificates,CN=Public Key Services,CN=Services in the Active Directory's configuration container.

Resolve

Enable the CA to open AD DS containers

To resolve this problem:

  • Confirm that the certification authority (CA) has necessary permissions to essential Active Directory Domain Services (AD DS) containers and objects.
  • If the CA certificate is missing from the NTAuth store, publish it manually.

To perform this procedure, you must have membership in Domain Admins, or you must have been delegated the appropriate authority.

Confirm permissions on essential AD DS containers and objects

To confirm that the CA has necessary permissions on AD DS containers and objects within these containers:

  1. On a domain controller, click Start, point to Administrative Tools, and click Active Directory Sites and Services.
  2. Click Active Directory Sites and Services [domainname] where [domainname] is the name of your domain.
  3. On the View menu, click Show Services Node.
  4. Double-click Services, double-click Public Key Services, and right-click each container listed below, or the objects listed within the container, and click Properties
  5. On the Security tab, confirm the required permissions.

The following are all Active Directory permissions required by a computer hosting a CA. Some of these permissions are achieved via membership in the Cert Publishers group.

  • Enrollment Services container. The CA computer has Read and Write access to its own object.
  • AIA container. The Cert Publishers group has Full Control access on the AIA container and the CA computer has Full Control access on its own object within the AIA container.
  • CDP container. The Cert Publishers group has Full Control access on every CA's container under the CDP container, and the CA computer has Full Control access on every certification revocation list (CRL) object in its own container.
  • Certification Authorities container. The Cert Publishers group has Full Control access on the objects within this container.
  • Certificate Templates container. The Enterprise Admins and Domain Admins groups (not the CA computer) have Full Control access or Read and Write access to this container and to most objects within it.
  • KRA container. The CA computer has Full Control access on its own object. 
  • OID container. The Enterprise Admins and Domain Admins groups, not the CA computer, have Full Control access or Read and Write access to this container and to the containers and objects within it.
  • NTAuthCertificates object. The Enterprise Admins and Domain Admins groups, not the CA computer, have Full Control access or Read and Write access.
  • Domain Computers and Domain Users containers. The Cert Publishers group has Read and Write permissions on the userCertificate property of each user and computer object in the forest in which AD CS is deployed.

To perform these procedures, you must have Manage CA permission, or you must have been delegated the appropriate authority.

Publish a CA certificate

To manually publish the CA certificate:

  1. On the CA, open a command prompt window.
  2. Type certutil -viewstore ldap:///CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=<domainname>,DC=<com> and press ENTER to check whether the CA certificate is in the NTAuth store.
  3. If it is not, type the following command: certutil -f -dspublish <cert.cer> NTAuthCA and press ENTER.

Note:  The placeholders <domainname> and <com> are the namespace names of the domain in which the CA is installed. <Cert.cer> is the name of the CA certificate file. The "-f" option re-creates the object even if it has been deleted.

If you do not know where your CA certificate is located, you can identify it by completing the following procedure on the computer hosting your CA. By default, this file is stored in %systemroot%\system32\certsrv\certenroll.

Locate the CA certificate file on a computer

To locate the CA certificate file on the local file system:

  1. On the CA, open a command prompt window.
  2. Type certutil -getreg CA\CACertPublicationURLs and press ENTER.

Verify

To perform this procedure, you must have membership in local Administrators on the computer hosting the certification authority (CA), or you must have been delegated the appropriate authority.

To check the connection between a CA and Active Directory Domain Services (AD DS):

  1. Open a command prompt window on the computer hosting the CA.
  2. Type nltest /sc_verify: [domainname] and press ENTER.
  3. Use the following procedure to confirm permisssions on essential AD DS containers and objects.

Replace [domainname] with the name of the namespace in which the CA is installed.

Confirm permissions on essential AD DS containers and objects

To perform this procedure, you must have membership in Domain Admins, or you must have been delegated the appropriate authority.

To confirm that the CA has necessary permissions on AD DS containers and objects within these containers:

  1. On a domain controller, click Start, point to Administrative Tools, and click Active Directory Sites and Services.
  2. Click Active Directory Sites and Services [domainname] where [domainname] is the name of your domain.
  3. On the View menu, click Show Services Node.
  4. Double-click Services, double-click Public Key Services, and right-click each container listed below, or the objects listed within the container, and click Properties.
  5. On the Security tab, confirm the required permissions.

The following are all Active Directory permissions required by a computer hosting a CA. Some of these permissions are achieved via membership in the Cert Publishers group.

  • Enrollment Services container. The CA computer has Read and Write access to its own object.
  • AIA container. The Cert Publishers group has Full Control access on the AIA container and the CA computer has Full Control access on its own object within the AIA container.
  • CDP container. The Cert Publishers group has Full Control access on every CA's container under the CDP container, and the CA computer has Full Control access on every certification revocation list (CRL) object in its own container.
  • Certification Authorities container. The Cert Publishers group has Full Control access on the objects within this container.
  • Certificate Templates container. The Enterprise Admins and Domain Admins groups (not the CA computer) have Full Control access or Read and Write access to this container and to most objects within it.
  • KRA container. The CA computer has Full Control access on its own object.
  • OID container. The Enterprise Admins and Domain Admins groups, not the CA computer, have Full Control access or Read and Write access to this container and to the containers and objects within it.
  • NTAuthCertificates object. The Enterprise Admins and Domain Admins groups, not the CA computer, have Full Control access or Read and Write access.
  • Domain Computers and Domain Users containers. The Cert Publishers group has Read and Write permissions on the userCertificate property of each user and computer object in the forest in which AD CS is deployed.

Related Management Information

AD CS Active Directory Domain Services Connection

Active Directory Certificate Services

Was this page helpful?
(1500 characters remaining)
Thank you for your feedback

Community Additions

ADD
Show:
© 2014 Microsoft