Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Question
Thursday, January 15, 2015 8:33 AM
I'm having some trouble with issuing a certificate from a CA hosted on a Windows Server 2008 R2 server for a SAP system using the Web Server template. I'm attempting to use web interface to issue the certificate using a CSR request.
If I check the Issued certificates list there is already quite a few certificates issued to other SAP systems were the Web Server template was used.
However the certificate can't be issued by the CA and the error message in the web interface reads: The disposition message is "Denied by Policy Module"
If I look at the Event Viewer the error message is: Active Directory Certificate Services denied request 197 because The certificate is not valid for the requested usage. 0x800b0110 (-2146762480). The request was for CN=sapdeg.(removed).net, OU=ABAP, O=(removed), C=DK. Additional information: Denied by Policy Module
I have inherited the CA setup from a former colleague so I'm afraid that I'm not that familiar with the setup yet, so please bare with me.
Any help will be greatly appreciated.
All replies (6)
Thursday, January 15, 2015 9:10 AM ✅Answered
can you post the output of the following command:
certutil -dump path\requestfile.csr
put your actual path to a request file. You can mask private information.
Vadims Podāns, aka PowerShell CryptoGuy
My weblog: en-us.sysadmins.lv
PowerShell PKI Module: pspki.codeplex.com
PowerShell Cmdlet Help Editor pscmdlethelpeditor.codeplex.com
Check out new: SSL Certificate Verifier
Check out new: PowerShell File Checksum Integrity Verifier tool.
Thursday, January 15, 2015 12:12 PM ✅Answered | 1 vote
I only speculate here, but your request contains 1024bit DSA public key. I am not sure, if it is still supported, or does not collide with your CA's settings. Would you be able to check the other, already issued, certificates in CA database, if they also show DSA public keys?
ondrej.
Thursday, January 15, 2015 12:45 PM ✅Answered | 1 vote
Agree with Ondrej, the problem is with public key algorithm: DSA (digital signature algorithm) is intended for digital signatures and do not allow key exchange operations which are required for client/server authentication (because they use public keys to encrypt and exchange session key).
Vadims Podāns, aka PowerShell CryptoGuy
My weblog: en-us.sysadmins.lv
PowerShell PKI Module: pspki.codeplex.com
PowerShell Cmdlet Help Editor pscmdlethelpeditor.codeplex.com
Check out new: SSL Certificate Verifier
Check out new: PowerShell File Checksum Integrity Verifier tool.
Thursday, January 15, 2015 9:15 AM
The certutil -dump command returns the following:
PKCS10 Certificate Request:
Version: 1
Subject:
CN=sapdeg.(removed).net
OU=ABAP
O=(removed)
C=DK
Public Key Algorithm:
Algorithm ObjectId: 1.2.840.10040.4.1 DSA
Algorithm Parameters:
0000 30 82 01 1f 02 81 81 00 ff ec 5e 55 77 e3 f4 7b
0010 11 6a 04 04 8f 0f 05 90 1b 6e 36 3d 32 ba 3e 32
0020 7b 07 27 37 ee 57 e0 f5 60 3f cf ad e4 77 23 30
0030 8d 0b e6 53 bf 21 03 00 91 43 ee 40 68 02 76 5f
0040 e4 0b 4a 7a 1a 50 5f 78 6e 12 fc bb 91 9f ea 25
0050 4c 23 f7 6a 19 2d 3e 0c a3 bd d9 c6 b4 2c 73 4d
0060 f3 b4 7e ed a2 8d 5d c1 87 d6 c7 d8 d0 d8 bd 2e
0070 07 8a 55 d1 09 ae 6f bb 27 5a 88 5f c7 d6 ee 32
0080 6d 57 7f d8 ad ca 51 c5 02 15 00 d2 eb 3c 8c 94
0090 11 99 9d e9 8f 0f d2 f4 bf d3 e9 30 a0 27 d1 02
00a0 81 81 00 9c cc b0 e4 3a 85 6d ec 1c 33 17 a5 f7
00b0 89 0e 7b 35 c8 dd 5b a6 3d 6a cf a6 49 59 c7 fd
00c0 b4 88 52 8a 7b 9d 55 24 5b 8a a2 8c a0 ed 13 cd
00d0 b1 e7 c0 ad 4b 1d c2 d8 28 e8 89 1d 0c ae 40 42
00e0 e3 3c 04 9a 1c 89 40 8e 37 45 08 ff 82 f2 79 b8
00f0 39 dd c6 11 1f 8d 5e b4 82 d6 50 0d 03 fc bc d0
0100 18 c8 f0 5d b1 f5 14 99 4a 50 ee 93 a7 67 a9 63
0110 fc 96 c5 23 a9 8c a5 dd f7 d5 21 73 c5 45 6d 7f
0120 ff 0a ff
0000 02 81 81 00 ff ec 5e 55 77 e3 f4 7b 11 6a 04 04
0010 8f 0f 05 90 1b 6e 36 3d 32 ba 3e 32 7b 07 27 37
0020 ee 57 e0 f5 60 3f cf ad e4 77 23 30 8d 0b e6 53
0030 bf 21 03 00 91 43 ee 40 68 02 76 5f e4 0b 4a 7a
0040 1a 50 5f 78 6e 12 fc bb 91 9f ea 25 4c 23 f7 6a
0050 19 2d 3e 0c a3 bd d9 c6 b4 2c 73 4d f3 b4 7e ed
0060 a2 8d 5d c1 87 d6 c7 d8 d0 d8 bd 2e 07 8a 55 d1
0070 09 ae 6f bb 27 5a 88 5f c7 d6 ee 32 6d 57 7f d8
0080 ad ca 51 c5
0000 02 15 00 d2 eb 3c 8c 94 11 99 9d e9 8f 0f d2 f4
0010 bf d3 e9 30 a0 27 d1
0000 02 81 81 00 9c cc b0 e4 3a 85 6d ec 1c 33 17 a5
0010 f7 89 0e 7b 35 c8 dd 5b a6 3d 6a cf a6 49 59 c7
0020 fd b4 88 52 8a 7b 9d 55 24 5b 8a a2 8c a0 ed 13
0030 cd b1 e7 c0 ad 4b 1d c2 d8 28 e8 89 1d 0c ae 40
0040 42 e3 3c 04 9a 1c 89 40 8e 37 45 08 ff 82 f2 79
0050 b8 39 dd c6 11 1f 8d 5e b4 82 d6 50 0d 03 fc bc
0060 d0 18 c8 f0 5d b1 f5 14 99 4a 50 ee 93 a7 67 a9
0070 63 fc 96 c5 23 a9 8c a5 dd f7 d5 21 73 c5 45 6d
0080 7f ff 0a ff
Public Key Length: 1024 bits
Public Key: UnusedBits = 0
0000 02 81 81 00 9c ee 29 f8 90 10 3f c8 0c f2 7a 9e
0010 e1 04 0c 53 9c 39 a4 f8 47 4c 79 6a 4c d1 39 dd
0020 6f a9 8c f2 a3 5e 9e fc 90 40 a4 44 ed 8a 38 af
0030 a7 ba 34 be 57 e9 c5 47 4e eb 66 e4 c3 18 a8 ed
0040 70 e2 7b fc f4 79 f5 4a d0 24 c9 10 fa 8f de 4d
0050 c1 d2 4d 7f 3c 8f 22 00 e3 83 b9 24 66 d0 25 43
0060 d2 bc 49 95 cd 7a c2 11 a8 02 ec b8 c3 1c 26 ee
0070 51 46 61 b6 81 3a 02 04 3c 6d 81 da 09 f7 f3 3f
0080 9e 7b f0 cf
Request Attributes: 0
0 attributes:
Signature Algorithm:
Algorithm ObjectId: 1.2.840.10040.4.3 sha1DSA
Algorithm Parameters: NULL
Signature: UnusedBits=0
0000 c8 37 84 54 dd 49 c6 14 40 90 92 a8 68 79 54 3b
0010 cf 7d a5 32 14 02 82 82 b8 70 cf 92 74 ee e2 22
0020 f7 2b 80 3c a9 bb 76 65 e5 b5 00 15 02 2d 30
Signature matches Public Key
Key Id Hash(rfc-sha1): 17 af ba 9c d7 76 0d cf 09 ad b6 99 86 42 bf d1 91 36 87
24
Key Id Hash(sha1): d4 e5 76 d6 cb 04 cf b5 8b 8c 3a c6 d6 6b 16 0c 62 6a e5 2a
CertUtil: -dump command completed successfully.
Thursday, January 15, 2015 4:56 PM | 1 vote
Or more specifically, the Web Server template (v1) in 2008 sets a minimum key size of 2048, so this request would be denied.
Mark B. Cooper, President and Founder of PKI Solutions Inc., former Microsoft Senior Engineer and subject matter expert for Microsoft Active Directory Certificate Services (ADCS). Known as “The PKI Guy” at Microsoft for 10 years. Connect with Mark at http://www.pkisolutions.com
Friday, January 16, 2015 1:22 PM
Thank you very much for your responses, you were right on with DSA being the issue.