Event ID 62 — AD CS Certificate Revocation List (CRL) Publishing

Updated: November 27, 2007

Applies To: Windows Server 2008

yellow

Providing clients with the information that they need to determine whether to trust a certificate is one of the most important security functions of a certification authority (CA) and public key infrastructure (PKI). For the administrator, this means promptly revoking untrusted certificates that have not reached their scheduled expiration dates and publishing this information in certificate revocation lists (CRLs). Monitoring and addressing problems with CRL publication and availability is a critical aspect of PKI security.

Event Details

Product: Windows Operating System
ID: 62
Source: Microsoft-Windows-CertificationAuthority
Version: 6.0
Symbolic Name: MSG_INVALID_CRL_SETTINGS
Message: Active Directory Certificate Services had problems loading valid certificate revocation list (CRL) publication values and has reset the CRL publication interval to its default settings.

Resolve

Configure AD CS to use user-specified CRL publication values

Active Directory Certificate Services (AD CS) is running but is using default certificate revocation list (CRL) publication period settings instead of the user-specified values. To fix this error:

  • Check and, if necessary, correct CRL publication settings.
  • If necessary, modify CRL registry keys.

Check and correct CRL publication settings

To perform this procedure, you must have Manage CA permission, or you must have been delegated the appropriate authority.

To check and fix correct publication settings:

  1. On the computer hosting the CA, click Start, point to Administrative Tools, and click Certification Authority.
  2. Right-click Revoked Certificates, and click Properties.
  3. Note the listed CRL and delta CRL publication intervals.
  4. If one of the settings is not valid, use the procedure "Modify CRL registry settings" to configure a valid setting.

To use the Certutil command-line tool to determine the configured CRL publication settings:

  1. On the computer hosting the CA, click Start, type cmd and press ENTER.
  2. Type certutil -getreg ca\crlperiod* and press ENTER, and then type certutil -getreg ca\crldeltaperiod* and press ENTER.
  3. If one of these settings is not valid, use the following procedure to configure a valid setting.

Modify CRL registry keys

To perform this procedure, you must have membership in local Administrators, or you must have been delegated the appropriate authority.

To set valid registry keys:

Caution: Incorrectly editing the registry might severely damage your system. Before making changes to the registry, you should back up any valued data.

  1. On the computer hosting the CA, click Start, type regedit, and then press ENTER.
  2. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\ Configuration\CA name.
  3. Enter valid registry values for CRLPeriod and CRLDeltaPeriod. Valid values are Years, Months, Weeks, Days, or Hours.
  4. Enter valid registry values for CRLPeriodUnits and CRLDeltaPeriodUnits. Valid values are integers (1, 15, or 31, for example).

Note: The text CA name in the actual registry key will be replaced by the name of your CA.

Verify

To perform this procedure, you must have Manage CA permission, or you must have been delegated the appropriate authority.

To confirm that certificate revocation list (CRL) publishing is working properly, perform the following procedure on a recently issued end-entity (user or computer) certificate:

  1. Open a command prompt window on a computer that is connected to the network.
  2. Type certutil -url <cert.cer> and press ENTER.

    Replace <cert.cer> with the name of a certificate file that you created by exporting a certificate using the Certificate Export Wizard.

  3. In the dialog box that appears, under Retrieve, click CRLs (from CDP), and click Retrieve.
  4. Confirm that the status of all retrieved CRL distribution points is listed as Verified.

Related Management Information

AD CS Certificate Revocation List (CRL) Publishing

Active Directory Certificate Services

Community Additions

ADD
Show: