Certutil
Applies To: Windows Server 2012, Windows 8
Certutil.exe is a command-line program that is installed as part of Certificate Services. You can use Certutil.exe to dump and display certification authority (CA) configuration information, configure Certificate Services, backup and restore CA components, and verify certificates, key pairs, and certificate chains.
When certutil is run on a certification authority without additional parameters, it displays the current certification authority configuration. When cerutil is run on a non-certification authority, the command defaults to running the certutil -dump verb.
Warning
Earlier versions of certutil may not provide all of the options that are described in this document. You can see all the options that a specific version of certutil provides by running the commands shown in the Syntax notations section.
Menu
The major sections in this document are:
Verbs
The following table describes the verbs that can be used with the certutil command.
Verbs |
Description |
---|---|
Dump configuration information or files |
|
Parse ASN.1 file |
|
-decodehex-decodehex |
Decode hexadecimal-encoded file |
Decode a Base64-encoded file |
|
Encode a file to Base64 |
|
Deny a pending certificate request |
|
Resubmit a pending certificate request |
|
Set attributes for a pending certificate request |
|
Set an extension for a pending certificate request |
|
Revoke a certificate |
|
Display the disposition of the current certificate |
|
Get the default configuration string |
|
Attempt to contact the Active Directory Certificate Services Request interface |
|
-pingadmin |
Attempt to contact the Active Directory Certificate Services Admin interface |
Display information about the certification authority |
|
Retrieve the certificate for the certification authority |
|
Retrieve the certificate chain for the certification authority |
|
Get a certificate revocation list (CRL) |
|
Publish new certificate revocation lists (CRLs) [or only delta CRLs] |
|
Shutdown Active Directory Certificate Services |
|
Install a certification authority certificate |
|
Renew a certification authority certificate |
|
Dump the schema for the certificate |
|
Dump the certificate view |
|
Dump the raw database |
|
Delete a row from the server database |
|
Backup Active Directory Certificate Services |
|
Backup the Active Directory Certificate Services database |
|
Backup the Active Directory Certificate Services certificate and private key |
|
Restore Active Directory Certificate Services |
|
Restore the Active Directory Certificate Services database |
|
Restore the Active Directory Certificate Services certificate and private key |
|
Import certificate and private key |
|
Display a dynamic file list |
|
Display database locations |
|
Generate and display a cryptographic hash over a file |
|
Dump the certificate store |
|
Add a certificate to the store |
|
Delete a certificate from the store |
|
Verify a certificate in the store |
|
Repair a key association or update certificate properties or the key security descriptor |
|
Dump the certificates store |
|
Delete a certificate from the store |
|
Publish a certificate or certificate revocation list (CRL) to Active Directory |
|
Display AD templates |
|
Display certificate templates |
|
Display the certification authorities (CAs) for a certificate template |
|
Display templates for CA |
|
Manage Site Names for CAs |
|
Display, add or delete enrollment server URLs associated with a CA |
|
Display AD CAs |
|
Display Enrollment Policy CAs |
|
Display Enrollment Policy |
|
Display or delete Enrollment Policy Cache entries |
|
Display, add or delete Credential Store entries |
|
Install default certificate templates |
|
Display or delete URL cache entries |
|
Pulse auto enrollment events |
|
Display information about the Active Directory machine object |
|
Display information about the domain controller |
|
Display information about an enterprise CA |
|
Display information about the CA |
|
Display information about the smart card |
|
Manage smart card root certificates |
|
Verify a public or private key set |
|
Verify a certificate, certificate revocation list (CRL), or certificate chain |
|
Verify AuthRoot or Disallowed Certificates CTL |
|
Re-sign a certificate revocation list (CRL) or certificate |
|
Create or delete web virtual roots and file shares |
|
Create or delete web virtual roots for an OCSP web proxy |
|
Add an Enrollment Server application |
|
Delete an Enrollment Server application |
|
Add a Policy Server application |
|
Delete a Policy Server application |
|
Display the object identifier or set a display name |
|
Display the message text associated with an error code |
|
Display a registry value |
|
Set a registry value |
|
Delete a registry value |
|
Import user keys and certificates into the server database for key archival |
|
Import a certificate file into the database |
|
Retrieve an archived private key recovery blob |
|
Recover an archived private key |
|
Merge PFX files |
|
Convert a PFX file into an EPF file |
|
-? |
Displays the list of verbs |
-<verb> -? |
Displays help for the verb specified. |
-? -v |
Displays a full list of verbs and |
Return to Menu
Syntax notations
For basic command line syntax, run certutil -?
For the syntax on using certutil with a specific verb, run certutil <verb> -?
To send all of the certutil syntax into a text file, run the following commands:
certutil -v -? > certutilhelp.txt
notepad certutilhelp.txt
The following table describes the notation used to indicate command-line syntax.
Notation |
Description |
---|---|
Text without brackets or braces |
Items you must type as shown |
<Text inside angle brackets> |
Placeholder for which you must supply a value |
[Text inside square brackets] |
Optional items |
{Text inside braces} |
Set of required items; choose one |
Vertical bar (|) |
Separator for mutually exclusive items; choose one |
Ellipsis (…) |
Items that can be repeated |
Return to Menu
-dump
CertUtil [Options] [-dump]
CertUtil [Options] [-dump] File
Dump configuration information or files
[-f] [-silent] [-split] [-p Password] [-t Timeout]
Return to Menu
-asn
CertUtil [Options] -asn File [type]
Parse ASN.1 file
type: numeric CRYPT_STRING_* decoding type
Return to Menu
-decodehex
CertUtil [Options] -decodehex InFile OutFile [type]
type: numeric CRYPT_STRING_* encoding type
[-f]
Return to Menu
-decode
CertUtil [Options] -decode InFile OutFile
Decode Base64-encoded file
[-f]
Return to Menu
-encode
CertUtil [Options] -encode InFile OutFile
Encode file to Base64
[-f] [-UnicodeText]
Return to Menu
-deny
CertUtil [Options] -deny RequestId
Deny pending request
[-config Machine\CAName]
Return to Menu
-resubmit
CertUtil [Options] -resubmit RequestId
Resubmit pending request
[-config Machine\CAName]
Return to Menu
-setattributes
CertUtil [Options] -setattributes RequestId AttributeString
Set attributes for pending request
RequestId -- numeric Request Id of pending request
AttributeString -- Request Attribute name and value pairs
Names and values are colon separated.
Multiple name, value pairs are newline separated.
Example: "CertificateTemplate:User\nEMail:[email protected]"
Each "\n" sequence is converted to a newline separator.
[-config Machine\CAName]
Return to Menu
-setextension
CertUtil [Options] -setextension RequestId ExtensionName Flags {Long | Date | String | @InFile}
Set extension for pending request
RequestId -- numeric Request Id of a pending request
ExtensionName -- ObjectId string of the extension
Flags -- 0 is recommended. 1 makes the extension critical, 2 disables it, 3 does both.
If the last parameter is numeric, it is taken as a Long.
If it can be parsed as a date, it is taken as a Date.
If it starts with '@', the rest of the token is the filename containing binary data or an ascii-text hex dump.
Anything else is taken as a String.
[-config Machine\CAName]
Return to Menu
-revoke
CertUtil [Options] -revoke SerialNumber [Reason]
Revoke Certificate
SerialNumber: Comma separated list of certificate serial numbers to revoke
Reason: numeric or symbolic revocation reason
0: CRL_REASON_UNSPECIFIED: Unspecified (default)
1: CRL_REASON_KEY_COMPROMISE: Key Compromise
2: CRL_REASON_CA_COMPROMISE: CA Compromise
3: CRL_REASON_AFFILIATION_CHANGED: Affiliation Changed
4: CRL_REASON_SUPERSEDED: Superseded
5: CRL_REASON_CESSATION_OF_OPERATION: Cessation of Operation
6: CRL_REASON_CERTIFICATE_HOLD: Certificate Hold
8: CRL_REASON_REMOVE_FROM_CRL: Remove From CRL
-1: Unrevoke: Unrevoke
[-config Machine\CAName]
Return to Menu
-isvalid
CertUtil [Options] -isvalid SerialNumber | CertHash
Display current certificate disposition
[-config Machine\CAName]
Return to Menu
-getconfig
CertUtil [Options] -getconfig
Get default configuration string
[-config Machine\CAName]
Return to Menu
-ping
CertUtil [Options] -ping [MaxSecondsToWait | CAMachineList]
Ping Active Directory Certificate Services Request interface
CAMachineList -- Comma-separated CA machine name list
For a single machine, use a terminating comma
Displays the site cost for each CA machine
[-config Machine\CAName]
Return to Menu
-CAInfo
CertUtil [Options] -CAInfo [InfoName [Index | ErrorCode]]
Display CA Information
InfoName -- indicates the CA property to display (see below). Use "*" for all properties.
Index -- optional zero-based property index
ErrorCode -- numeric error code
[-f] [-split] [-config Machine\CAName]
InfoName argument syntax:
file: File version
product: Product version
exitcount: Exit module count
exit [Index]: Exit module description
policy: Policy module description
name: CA name
sanitizedname: Sanitized CA name
dsname: Sanitized CA short name (DS name)
sharedfolder: Shared folder
error1 ErrorCode: Error message text
error2 ErrorCode: Error message text and error code
type: CA type
info: CA info
parent: Parent CA
certcount: CA cert count
xchgcount: CA exchange cert count
kracount: KRA cert count
kraused: KRA cert used count
propidmax: Maximum CA PropId
certstate [Index]: CA cert
certversion [Index]: CA cert version
certstatuscode [Index]: CA cert verify status
crlstate [Index]: CRL
krastate [Index]: KRA cert
crossstate+ [Index]: Forward cross cert
crossstate- [Index]: Backward cross cert
cert [Index]: CA cert
certchain [Index]: CA cert chain
certcrlchain [Index]: CA cert chain with CRLs
xchg [Index]: CA exchange cert
xchgchain [Index]: CA exchange cert chain
xchgcrlchain [Index]: CA exchange cert chain with CRLs
kra [Index]: KRA cert
cross+ [Index]: Forward cross cert
cross- [Index]: Backward cross cert
CRL [Index]: Base CRL
deltacrl [Index]: Delta CRL
crlstatus [Index]: CRL Publish Status
deltacrlstatus [Index]: Delta CRL Publish Status
dns: DNS Name
role: Role Separation
ads: Advanced Server
templates: Templates
ocsp [Index]: OCSP URLs
aia [Index]: AIA URLs
cdp [Index]: CDP URLs
localename: CA locale name
subjecttemplateoids: Subject Template OIDs
Return to Menu
-ca.cert
CertUtil [Options] -ca.cert OutCACertFile [Index]
Retrieve the CA's certificate
OutCACertFile: output file
Index: CA certificate renewal index (defaults to most recent)
[-f] [-split] [-config Machine\CAName]
Return to Menu
-ca.chain
CertUtil [Options] -ca.chain OutCACertChainFile [Index]
Retrieve the CA's certificate chain
OutCACertChainFile: output file
Index: CA certificate renewal index (defaults to most recent)
[-f] [-split] [-config Machine\CAName]
Return to Menu
-GetCRL
CertUtil [Options] -GetCRL OutFile [Index] [delta]
Get CRL
Index: CRL index or key index (defaults to CRL for newest key)
delta: delta CRL (default is base CRL)
[-f] [-split] [-config Machine\CAName]
Return to Menu
-CRL
CertUtil [Options] -CRL [dd:hh | republish] [delta]
Publish new CRLs [or delta CRLs only]
dd:hh -- new CRL validity period in days and hours
republish -- republish most recent CRLs
delta -- delta CRLs only (default is base and delta CRLs)
[-split] [-config Machine\CAName]
Return to Menu
-shutdown
CertUtil [Options] -shutdown
Shutdown Active Directory Certificate Services
[-config Machine\CAName]
Return to Menu
-installCert
CertUtil [Options] -installCert [CACertFile]
Install Certification Authority certificate
[-f] [-silent] [-config Machine\CAName]
Return to Menu
-renewCert
CertUtil [Options] -renewCert [ReuseKeys] [Machine\ParentCAName]
Renew Certification Authority certificate
Use -f to ignore an outstanding renewal request, and generate a new request.
[-f] [-silent] [-config Machine\CAName]
Return to Menu
-schema
CertUtil [Options] -schema [Ext | Attrib | CRL]
Dump Certificate Schema
Defaults to Request and Certificate table
Ext: Extension table
Attrib: Attribute table
CRL: CRL table
[-split] [-config Machine\CAName]
Return to Menu
-view
CertUtil [Options] -view [Queue | Log | LogFail | Revoked | Ext | Attrib | CRL] [csv]
Dump Certificate View
Queue: Request queue
Log: Issued or revoked certificates, plus failed requests
LogFail: Failed requests
Revoked: Revoked certificates
Ext: Extension table
Attrib: Attribute table
CRL: CRL table
csv: Output as Comma Separated Values
To display the StatusCode column for all entries: -out StatusCode
To display all columns for the last entry: -restrict "RequestId==$"
To display RequestId and Disposition for three requests: -restrict "RequestId>=37,RequestId<40" -out "RequestId,Disposition"
To display Row Ids and CRL Numbers for all Base CRLs: -restrict "CRLMinBase=0" -out "CRLRowId,CRLNumber" CRL
To display Base CRL Number 3: -v -restrict "CRLMinBase=0,CRLNumber=3" -out "CRLRawCRL" CRL
To display the entire CRL table: CRL
Use "Date[+|-dd:hh]" for date restrictions
Use "now+dd:hh" for a date relative to the current time
[-silent] [-split] [-config Machine\CAName] [-restrict RestrictionList] [-out ColumnList]
Return to Menu
-db
CertUtil [Options] -db
Dump Raw Database
[-config Machine\CAName] [-restrict RestrictionList] [-out ColumnList]
Return to Menu
-deleterow
CertUtil [Options] -deleterow RowId | Date [Request | Cert | Ext | Attrib | CRL]
Delete server database row
Request: Failed and pending requests (submission date)
Cert: Expired and revoked certificates (expiration date)
Ext: Extension table
Attrib: Attribute table
CRL: CRL table (expiration date)
To delete failed and pending requests submitted by January 22, 2001: 1/22/2001 Request
To delete all certificates that expired by January 22, 2001: 1/22/2001 Cert
To delete the certificate row, attributes and extensions for RequestId 37: 37
To delete CRLs that expired by January 22, 2001: 1/22/2001 CRL
[-f] [-config Machine\CAName]
Return to Menu
-backup
CertUtil [Options] -backup BackupDirectory [Incremental] [KeepLog]
Backup Active Directory Certificate Services
BackupDirectory: directory to store backed up data
Incremental: perform incremental backup only (default is full backup)
KeepLog: preserve database log files (default is to truncate log files)
[-f] [-config Machine\CAName] [-p Password]
Return to Menu
-backupDB
CertUtil [Options] -backupDB BackupDirectory [Incremental] [KeepLog]
Backup Active Directory Certificate Services database
BackupDirectory: directory to store backed up database files
Incremental: perform incremental backup only (default is full backup)
KeepLog: preserve database log files (default is to truncate log files)
[-f] [-config Machine\CAName]
Return to Menu
-backupKey
CertUtil [Options] -backupKey BackupDirectory
Backup Active Directory Certificate Services certificate and private key
BackupDirectory: directory to store backed up PFX file
[-f] [-config Machine\CAName] [-p Password] [-t Timeout]
Return to Menu
-restore
CertUtil [Options] -restore BackupDirectory
Restore Active Directory Certificate Services
BackupDirectory: directory containing data to be restored
[-f] [-config Machine\CAName] [-p Password]
Return to Menu
-restoreDB
CertUtil [Options] -restoreDB BackupDirectory
Restore Active Directory Certificate Services database
BackupDirectory: directory containing database files to be restored
[-f] [-config Machine\CAName]
Return to Menu
-restoreKey
CertUtil [Options] -restoreKey BackupDirectory | PFXFile
Restore Active Directory Certificate Services certificate and private key
BackupDirectory: directory containing PFX file to be restored
PFXFile: PFX file to be restored
[-f] [-config Machine\CAName] [-p Password]
Return to Menu
-importPFX
CertUtil [Options] -importPFX [CertificateStoreName] PFXFile [Modifiers]
Import certificate and private key
CertificateStoreName: Certificate store name. See -store.
PFXFile: PFX file to be imported
Modifiers: Comma separated list of one or more of the following:
AT_SIGNATURE: Change the KeySpec to Signature
AT_KEYEXCHANGE: Change the KeySpec to Key Exchange
NoExport: Make the private key non-exportable
NoCert: Do not import the certificate
NoChain: Do not import the certificate chain
NoRoot: Do not import the root certificate
Protect: Protect keys with password
NoProtect: Do not password protect keys
Defaults to personal machine store.
[-f] [-user] [-p Password] [-csp Provider]
Return to Menu
-dynamicfilelist
CertUtil [Options] -dynamicfilelist
Display dynamic file List
[-config Machine\CAName]
Return to Menu
-databaselocations
CertUtil [Options] -databaselocations
Display database locations
[-config Machine\CAName]
Return to Menu
-hashfile
CertUtil [Options] -hashfile InFile [HashAlgorithm]
Generate and display cryptographic hash over a file
Return to Menu
-store
CertUtil [Options] -store [CertificateStoreName [CertId [OutputFile]]]
Dump certificate store
CertificateStoreName: Certificate store name. Examples:
"My", "CA" (default), "Root",
"ldap:///CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?one?objectClass=certificationAuthority" (View Root Certificates)
"ldap:///CN=CAName,CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority" (Modify Root Certificates)
"ldap:///CN=CAName,CN=MachineName,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint" (View CRLs)
"ldap:///CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority" (Enterprise CA Certificates)
ldap: (AD computer object certificates)
-user ldap: (AD user object certificates)
CertId: Certificate or CRL match token. This can be a serial number, an SHA-1 certificate, CRL, CTL or public key hash, a numeric cert index (0, 1, and so on), a numeric CRL index (.0, .1, and so on), a numeric CTL index (..0, ..1, and so on), a public key, signature or extension ObjectId, a certificate subject Common Name, an e-mail address, UPN or DNS name, a key container name or CSP name, a template name or ObjectId, an EKU or Application Policies ObjectId, or a CRL issuer Common Name. Many of these may result in multiple matches.
OutputFile: file to save matching cert
Use -user to access a user store instead of a machine store.
Use -enterprise to access a machine enterprise store.
Use -service to access a machine service store.
Use -grouppolicy to access a machine group policy store.
Examples:
-enterprise NTAuth
-enterprise Root 37
-user My 26e0aaaf000000000004
CA .11
[-f] [-enterprise] [-user] [-GroupPolicy] [-silent] [-split] [-dc DCName]
Return to Menu
-addstore
CertUtil [Options] -addstore CertificateStoreName InFile
Add certificate to store
CertificateStoreName: Certificate store name. See -store.
InFile: Certificate or CRL file to add to store.
[-f] [-enterprise] [-user] [-GroupPolicy] [-dc DCName]
Return to Menu
-delstore
CertUtil [Options] -delstore CertificateStoreName CertId
Delete certificate from store
CertificateStoreName: Certificate store name. See -store.
CertId: Certificate or CRL match token. See -store.
[-enterprise] [-user] [-GroupPolicy] [-dc DCName]
Return to Menu
-verifystore
CertUtil [Options] -verifystore CertificateStoreName [CertId]
Verify certificate in store
CertificateStoreName: Certificate store name. See -store.
CertId: Certificate or CRL match token. See -store.
[-enterprise] [-user] [-GroupPolicy] [-silent] [-split] [-dc DCName] [-t Timeout]
Return to Menu
-repairstore
CertUtil [Options] -repairstore CertificateStoreName CertIdList [PropertyInfFile | SDDLSecurityDescriptor]
Repair key association or update certificate properties or key security descriptor
CertificateStoreName: Certificate store name. See -store.
CertIdList: comma separated list of Certificate or CRL match tokens. See -store CertId description.
PropertyInfFile -- INF file containing external properties:
[Properties]
19 = Empty ; Add archived property, OR:
19 = ; Remove archived property
11 = "{text}Friendly Name" ; Add friendly name property
127 = "{hex}" ; Add custom hexadecimal property
_continue_ = "00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f"
_continue_ = "10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f"
2 = "{text}" ; Add Key Provider Information property
_continue_ = "Container=Container Name&"
_continue_ = "Provider=Microsoft Strong Cryptographic Provider&"
_continue_ = "ProviderType=1&"
_continue_ = "Flags=0&"
_continue_ = "KeySpec=2"
9 = "{text}" ; Add Enhanced Key Usage property
_continue_ = "1.3.6.1.5.5.7.3.2,"
_continue_ = "1.3.6.1.5.5.7.3.1,"
[-f] [-enterprise] [-user] [-GroupPolicy] [-silent] [-split] [-csp Provider]
Return to Menu
-viewstore
CertUtil [Options] -viewdelstore [CertificateStoreName [CertId [OutputFile]]]
Dump certificate store
CertificateStoreName: Certificate store name. Examples:
"My", "CA" (default), "Root",
"ldap:///CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?one?objectClass=certificationAuthority" (View Root Certificates)
"ldap:///CN=CAName,CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority" (Modify Root Certificates)
"ldap:///CN=CAName,CN=MachineName,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint" (View CRLs)
"ldap:///CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority" (Enterprise CA Certificates)
ldap: (AD machine object certificates)
-user ldap: (AD user object certificates)
CertId: Certificate or CRL match token. This can be a serial number, an SHA-1 certificate, CRL, CTL or public key hash, a numeric cert index (0, 1, and so on), a numeric CRL index (.0, .1, and so on), a numeric CTL index (..0, ..1, and so on), a public key, signature or extension ObjectId, a certificate subject Common Name, an e-mail address, UPN or DNS name, a key container name or CSP name, a template name or ObjectId, an EKU or Application Policies ObjectId, or a CRL issuer Common Name. Many of these may result in multiple matches.
OutputFile: file to save matching cert
Use -user to access a user store instead of a machine store.
Use -enterprise to access a machine enterprise store.
Use -service to access a machine service store.
Use -grouppolicy to access a machine group policy store.
Examples:
-enterprise NTAuth
-enterprise Root 37
-user My 26e0aaaf000000000004
CA .11
[-f] [-enterprise] [-user] [-GroupPolicy] [-dc DCName]
Return to Menu
-viewdelstore
CertUtil [Options] -viewdelstore [CertificateStoreName [CertId [OutputFile]]]
Delete certificate from store
CertificateStoreName: Certificate store name. Examples:
"My", "CA" (default), "Root",
"ldap:///CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?one?objectClass=certificationAuthority" (View Root Certificates)
"ldap:///CN=CAName,CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority" (Modify Root Certificates)
"ldap:///CN=CAName,CN=MachineName,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint" (View CRLs)
"ldap:///CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority" (Enterprise CA Certificates)
ldap: (AD machine object certificates)
-user ldap: (AD user object certificates)
CertId: Certificate or CRL match token. This can be a serial number, an SHA-1 certificate, CRL, CTL or public key hash, a numeric cert index (0, 1, and so on), a numeric CRL index (.0, .1, and so on), a numeric CTL index (..0, ..1, and so on), a public key, signature or extension ObjectId, a certificate subject Common Name, an e-mail address, UPN or DNS name, a key container name or CSP name, a template name or ObjectId, an EKU or Application Policies ObjectId, or a CRL issuer Common Name. Many of these may result in multiple matches.
OutputFile: file to save matching cert
Use -user to access a user store instead of a machine store.
Use -enterprise to access a machine enterprise store.
Use -service to access a machine service store.
Use -grouppolicy to access a machine group policy store.
Examples:
-enterprise NTAuth
-enterprise Root 37
-user My 26e0aaaf000000000004
CA .11
[-f] [-enterprise] [-user] [-GroupPolicy] [-dc DCName]
Return to Menu
-dsPublish
CertUtil [Options] -dsPublish CertFile [NTAuthCA | RootCA | SubCA | CrossCA | KRA | User | Machine]
CertUtil [Options] -dsPublish CRLFile [DSCDPContainer [DSCDPCN]]
Publish certificate or CRL to Active Directory
CertFile: certificate file to publish
NTAuthCA: Publish cert to DS Enterprise store
RootCA: Publish cert to DS Trusted Root store
SubCA: Publish CA cert to DS CA object
CrossCA: Publish cross cert to DS CA object
KRA: Publish cert to DS Key Recovery Agent object
User: Publish cert to User DS object
Machine: Publish cert to Machine DS object
CRLFile: CRL file to publish
DSCDPContainer: DS CDP container CN, usually the CA machine name
DSCDPCN: DS CDP object CN, usually based on the sanitized CA short name and key index
Use -f to create DS object.
[-f] [-user] [-dc DCName]
Return to Menu
-ADTemplate
CertUtil [Options] -ADTemplate [Template]
Display AD templates
[-f] [-user] [-ut] [-mt] [-dc DCName]
-Template
CertUtil [Options] -Template [Template]
Display Enrollment Policy templates
[-f] [-user] [-silent] [-PolicyServer URLOrId] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password]
Return to Menu
-TemplateCAs
CertUtil [Options] -TemplateCAs Template
Display CAs for template
[-f] [-user] [-dc DCName]
Return to Menu
-CATemplates
CertUtil [Options] -CATemplates [Template]
Display templates for CA
[-f] [-user] [-ut] [-mt] [-config Machine\CAName] [-dc DCName]
Return to Menu
-SetCASites
CertUtil [Options] -SetCASites [set] [SiteName]
CertUtil [Options] -SetCASites verify [SiteName]
CertUtil [Options] -SetCASites delete
Set, Verify or Delete CA site names
Use the -config option to target a single CA (Default is all CAs)
SiteName is allowed only when targeting a single CA
Use -f to override validation errors for the specified SiteName
Use -f to delete all CA site names
[-f] [-config Machine\CAName] [-dc DCName]
Note
For more information on configuring CAs for Active Directory Domain Services (AD DS) site awareness, see AD DS Site Awareness for AD CS and PKI clients.
Return to Menu
-enrollmentServerURL
CertUtil [Options] -enrollmentServerURL [URL AuthenticationType [Priority] [Modifiers]]
CertUtil [Options] -enrollmentServerURL URL delete
Display, add or delete enrollment server URLs associated with a CA
AuthenticationType: Specify one of the following client authentication methods while adding a URL
Kerberos: Use Kerberos SSL credentials
UserName: Use named account for SSL credentials
ClientCertificate: Use X.509 Certificate SSL credentials
Anonymous: Use anonymous SSL credentials
delete: deletes the specified URL associated with the CA
Priority: defaults to '1' if not specified when adding a URL
Modifiers -- Comma separated list of one or more of the following:
AllowRenewalsOnly: Only renewal requests can be submitted to this CA via this URL
AllowKeyBasedRenewal: Allows use of a certificate that has no associated account in the AD. This applies only with ClientCertificate and AllowRenewalsOnly Mode
[-config Machine\CAName] [-dc DCName]
Return to Menu
-ADCA
CertUtil [Options] -ADCA [CAName]
Display AD CAs
[-f] [-split] [-dc DCName]
Return to Menu
-CA
CertUtil [Options] -CA [CAName | TemplateName]
Display Enrollment Policy CAs
[-f] [-user] [-silent] [-split] [-PolicyServer URLOrId] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password]
Return to Menu
-Policy
Display Enrollment Policy
[-f] [-user] [-silent] [-split] [-PolicyServer URLOrId] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password]
Return to Menu
-PolicyCache
CertUtil [Options] -PolicyCache [delete]
Display or delete Enrollment Policy Cache entries
delete: delete Policy Server cache entries
-f: use -f to delete all cache entries
[-f] [-user] [-PolicyServer URLOrId]
Return to Menu
-CredStore
CertUtil [Options] -CredStore [URL]
CertUtil [Options] -CredStore URL add
CertUtil [Options] -CredStore URL delete
Display, add or delete Credential Store entries
URL: target URL. Use * to match all entries. Use https://machine* to match a URL prefix.
add: add a Credential Store entry. SSL credentials must also be specified.
delete: delete Credential Store entries
-f: use -f to overwrite an entry or to delete multiple entries.
[-f] [-user] [-silent] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password]
Return to Menu
-InstallDefaultTemplates
CertUtil [Options] -InstallDefaultTemplates
Install default certificate templates
[-dc DCName]
Return to Menu
-URLCache
CertUtil [Options] -URLCache [URL | CRL | * [delete]]
Display or delete URL cache entries
URL: cached URL
CRL: operate on all cached CRL URLs only
*: operate on all cached URLs
delete: delete relevant URLs from the current user's local cache
Use -f to force fetching a specific URL and updating the cache.
[-f] [-split]
Return to Menu
-pulse
CertUtil [Options] -pulse
Pulse autoenrollment events
[-user]
Return to Menu
-MachineInfo
CertUtil [Options] -MachineInfo DomainName\MachineName$
Display Active Directory computer object information
Return to Menu
-DCInfo
CertUtil [Options] -DCInfo [Domain] [Verify | DeleteBad | DeleteAll]
Display domain controller information
Default is to display DC certs without verification
[-f] [-user] [-urlfetch] [-dc DCName] [-t Timeout]
Tip
The ability to specify an Active Directory Domain Services (AD DS) domain [Domain] and to specify a domain controller (-dc) was added in Windows Server 2012. To successfully run the command, you must use an account that is a member of Domain Admins or Enterprise Admins. The behavior modifications of this command are as follows: If a domain is not specified and a specific domain controller is not specified, this option returns a list of domain controllers to process from the default domain controller. If a domain is not specified, but a domain controller is specified, a report of the certificates on the specified domain controller is generated. If a domain is specified, but a domain controller is not specified, a list of domain controllers is generated along with reports on the certificates for each domain controller in the list. If the domain and domain controller are specified, a list of domain controllers is generated from the targeted domain controller. A report of the certificates for each domain controller in the list is also generated.
For example, assume there is a domain named CPANDL with a domain controller named CPANDL-DC1. You could run the following command to a retrieve a list of domain controllers and their certificates that from CPANDL-DC1: certutil -dc cpandl-dc1 -dcinfo cpandl
Return to Menu
-EntInfo
CertUtil [Options] -EntInfo DomainName\MachineName$
[-f] [-user]
Return to Menu
-TCAInfo
CertUtil [Options] -TCAInfo [DomainDN | -]
Display CA information
[-f] [-enterprise] [-user] [-urlfetch] [-dc DCName] [-t Timeout]
Return to Menu
-SCInfo
CertUtil [Options] -SCInfo [ReaderName [CRYPT_DELETEKEYSET]]
Display smart card information
CRYPT_DELETEKEYSET: Delete all keys on the smart card
[-silent] [-split] [-urlfetch] [-t Timeout]
Return to Menu
-SCRoots
CertUtil [Options] -SCRoots update [+][InputRootFile] [ReaderName]
CertUtil [Options] -SCRoots save @OutputRootFile [ReaderName]
CertUtil [Options] -SCRoots view [InputRootFile | ReaderName]
CertUtil [Options] -SCRoots delete [ReaderName]
Manage smart card root certificates
[-f] [-split] [-p Password]
Return to Menu
-verifykeys
CertUtil [Options] -verifykeys [KeyContainerName CACertFile]
Verify public/private key set
KeyContainerName: key container name of the key to verify. Defaults to machine keys. Use -user for user keys.
CACertFile: signing or encryption certificate file
If no arguments are specified, each signing CA cert is verified against its private key.
This operation can only be performed against a local CA or local keys.
[-f] [-user] [-silent] [-config Machine\CAName]
Return to Menu
-verify
CertUtil [Options] -verify CertFile [ApplicationPolicyList | - [IssuancePolicyList]]
CertUtil [Options] -verify CertFile [CACertFile [CrossedCACertFile]]
CertUtil [Options] -verify CRLFile CACertFile [IssuedCertFile]
CertUtil [Options] -verify CRLFile CACertFile [DeltaCRLFile]
Verify certificate, CRL or chain
CertFile: Certificate to verify
ApplicationPolicyList: optional comma separated list of required Application Policy ObjectIds
IssuancePolicyList: optional comma separated list of required Issuance Policy ObjectIds
CACertFile: optional issuing CA certificate to verify against
CrossedCACertFile: optional certificate cross-certified by CertFile
CRLFile: CRL to verify
IssuedCertFile: optional issued certificate covered by CRLFile
DeltaCRLFile: optional delta CRL
If ApplicationPolicyList is specified, chain building is restricted to chains valid for the specified Application Policies.
If IssuancePolicyList is specified, chain building is restricted to chains valid for the specified Issuance Policies.
If CACertFile is specified, fields in CACertFile are verified against CertFile or CRLFile.
If CACertFile is not specified, CertFile is used to build and verify a full chain.
If CACertFile and CrossedCACertFile are both specified, fields in CACertFile and CrossedCACertFile are verified against CertFile.
If IssuedCertFile is specified, fields in IssuedCertFile are verified against CRLFile.
If DeltaCRLFile is specified, fields in DeltaCRLFile are verified against CRLFile.
[-f] [-enterprise] [-user] [-silent] [-split] [-urlfetch] [-t Timeout]
Return to Menu
-verifyCTL
CertUtil [Options] -verifyCTL CTLObject [CertDir] [CertFile]
Verify AuthRoot or Disallowed Certificates CTL
CTLObject: Identifies the CTL to verify:
AuthRootWU: read AuthRoot CAB and matching certificates from the URL cache. Use -f to download from Windows Update instead.
DisallowedWU: read Disallowed Certificates CAB and disallowed certificate store file from the URL cache. Use -f to download from Windows Update instead.
AuthRoot: read registry cached AuthRoot CTL. Use with -f and a CertFile that is not already trusted to force updating the registry cached AuthRoot and Disallowed Certificate CTLs.
Disallowed: read registry cached Disallowed Certificates CTL. -f has the same behavior as with AuthRoot.
CTLFileName: file or http: path to CTL or CAB
CertDir: folder containing certificates matching CTL entries. An http: folder path must end with a path separator. If a folder is not specified with AuthRoot or Disallowed, multiple locations will be searched for matching certificates: local certificate stores, crypt32.dll resources and the local URL cache. Use -f to download from Windows Update when necessary. Otherwise defaults to the same folder or web site as the CTLObject.
CertFile: file containing certificate(s) to verify. Certificates will be matched against CTL entries, and match results displayed. Suppresses most of the default output.
[-f] [-user] [-split]
Return to Menu
-sign
CertUtil [Options] -sign InFileList|SerialNumber|CRL OutFileList [StartDate+dd:hh] [+SerialNumberList | -SerialNumberList | -ObjectIdList | @ExtensionFile\]
CertUtil [Options] -sign InFileList|SerialNumber|CRL OutFileList [#HashAlgorithm] [+AlternateSignatureAlgorithm | -AlternateSignatureAlgorithm]
Re-sign CRL or certificate
InFileList: comma separated list of Certificate or CRL files to modify and re-sign
SerialNumber: Serial number of certificate to create. Validity period and other options must not be present.
CRL: Create an empty CRL. Validity period and other options must not be present.
OutFileList: comma separated list of modified Certificate or CRL output files. The number of files must match InFileList.
StartDate+dd:hh: new validity period: optional date plus; optional days and hours validity period; If both are specified, use a plus sign (+) separator. Use "now[+dd:hh]" to start at the current time. Use "never" to have no expiration date (for CRLs only).
SerialNumberList: comma separated serial number list to add or remove
ObjectIdList: comma separated extension ObjectId list to remove
@ExtensionFile: INF file containing extensions to update or remove:
[Extensions]
2.5.29.31 = ; Remove CRL Distribution Points extension
2.5.29.15 = "{hex}" ; Update Key Usage extension
_continue_="03 02 01 86"
HashAlgorithm: Name of the hash algorithm preceded by a # sign
AlternateSignatureAlgorithm: alternate Signature algorithm specifier
A minus sign causes serial numbers and extensions to be removed. A plus sign causes serial numbers to be added to a CRL. When removing items from a CRL, the list may contain both serial numbers and ObjectIds. A minus sign before AlternateSignatureAlgorithm causes the legacy signature format to be used. A plus sign before AlternateSignatureAlgorithm causes the alternature signature format to be used. If AlternateSignatureAlgorithm is not specified then the signature format in the certificate or CRL is used.
[-nullsign] [-f] [-silent] [-Cert CertId]
Return to Menu
-vroot
CertUtil [Options] -vroot [delete]
Create/delete web virtual roots and file shares
Return to Menu
-vocsproot
CertUtil [Options] -vocsproot [delete]
Create/delete web virtual roots for OCSP web proxy
Return to Menu
-addEnrollmentServer
CertUtil [Options] -addEnrollmentServer Kerberos | UserName | ClientCertificate [AllowRenewalsOnly] [AllowKeyBasedRenewal]
Add an Enrollment Server application
Add an Enrollment Server application and application pool if necessary, for the specified CA. This command does not install binaries or packages. One of the following authentication methods with which the client connects to a Certificate Enrollment Server.
Kerberos: Use Kerberos SSL credentials
UserName: Use named account for SSL credentials
ClientCertificate: Use X.509 Certificate SSL credentials
AllowRenewalsOnly: Only renewal requests can be submitted to this CA via this URL
AllowKeyBasedRenewal -- Allows use of a certificate that has no associated account in the AD. This applies only with ClientCertificate and AllowRenewalsOnly mode.
[-config Machine\CAName]
Return to Menu
-deleteEnrollmentServer
CertUtil [Options] -deleteEnrollmentServer Kerberos | UserName | ClientCertificate
Delete an Enrollment Server application
Delete an Enrollment Server application and application pool if necessary, for the specified CA. This command does not remove binaries or packages. One of the following authentication methods with which the client connects to a Certificate Enrollment Server.
Kerberos: Use Kerberos SSL credentials
UserName: Use named account for SSL credentials
ClientCertificate: Use X.509 Certificate SSL credentials
[-config Machine\CAName]
Return to Menu
-addPolicyServer
CertUtil [Options] -addPolicyServer Kerberos | UserName | ClientCertificate [KeyBasedRenewal]
Add a Policy Server application
Add a Policy Server application and application pool if necessary. This command does not install binaries or packages. One of the following authentication methods with which the client connects to a Certificate Policy Server:
Kerberos: Use Kerberos SSL credentials
UserName: Use named account for SSL credentials
ClientCertificate: Use X.509 Certificate SSL credentials
KeyBasedRenewal: Only policies that contain KeyBasedRenewal templates are returned to the client. This flag applies only for UserName and ClientCertificate authentication.
Return to Menu
-deletePolicyServer
CertUtil [Options] -deletePolicyServer Kerberos | UserName | ClientCertificate [KeyBasedRenewal]
Delete a Policy Server application
Delete a Policy Server application and application pool if necessary. This command does not remove binaries or packages. One of the following authentication methods with which the client connects to a Certificate Policy Server:
Kerberos: Use Kerberos SSL credentials
UserName: Use named account for SSL credentials
ClientCertificate: Use X.509 Certificate SSL credentials
KeyBasedRenewal: KeyBasedRenewal policy server
Return to Menu
-oid
CertUtil [Options] -oid ObjectId [DisplayName | delete [LanguageId [Type]]]
CertUtil [Options] -oid GroupId
CertUtil [Options] -oid AlgId | AlgorithmName [GroupId]
Display ObjectId or set display name
ObjectId -- ObjectId to display or to add display name
GroupId -- decimal GroupId number for ObjectIds to enumerate
AlgId -- hexadecimal AlgId for ObjectId to look up
AlgorithmName -- Algorithm Name for ObjectId to look up
DisplayName -- Display Name to store in DS
delete -- delete display name
LanguageId -- Language Id (defaults to current: 1033)
Type -- DS object type to create: 1 for Template (default), 2 for Issuance Policy, 3 for Application Policy
Use -f to create DS object.
[-f]
Return to Menu
-error
CertUtil [Options] -error ErrorCode
Display error code message text
Return to Menu
-getreg
CertUtil [Options] -getreg [{ca|restore|policy|exit|template|enroll|chain|PolicyServers}\[ProgId\]][RegistryValueName]
Display registry value
ca: Use CA's registry key
restore: Use CA's restore registry key
policy: Use policy module's registry key
exit: Use first exit module's registry key
template: Use template registry key (use -user for user templates)
enroll: Use enrollment registry key (use -user for user context)
chain: Use chain configuration registry key
PolicyServers: Use Policy Servers registry key
ProgId: Use policy or exit module's ProgId (registry subkey name)
RegistryValueName: registry value name (use "Name*" to prefix match)
Value: new numeric, string or date registry value or filename. If a numeric value starts with "+" or "-", the bits specified in the new value are set or cleared in the existing registry value.
If a string value starts with "+" or "-", and the existing value is a REG_MULTI_SZ value, the string is added to or removed from the existing registry value. To force creation of a REG_MULTI_SZ value, add a "\n" to the end of the string value.
If the value starts with "@", the rest of the value is the name of the file containing the hexadecimal text representation of a binary value. If it does not refer to a valid file, it is instead parsed as [Date][+|-][dd:hh] -- an optional date plus or minus optional days and hours. If both are specified, use a plus sign (+) or minus sign (-) separator. Use "now+dd:hh" for a date relative to the current time.
Use "chain\ChainCacheResyncFiletime @now" to effectively flush cached CRLs.
[-f] [-user] [-GroupPolicy] [-config Machine\CAName]
Return to Menu
-setreg
CertUtil [Options] -setreg [{ca|restore|policy|exit|template|enroll|chain|PolicyServers}\[ProgId\]]RegistryValueName Value
Set registry value
ca: Use CA's registry key
restore: Use CA's restore registry key
policy: Use policy module's registry key
exit: Use first exit module's registry key
template: Use template registry key (use -user for user templates)
enroll: Use enrollment registry key (use -user for user context)
chain: Use chain configuration registry key
PolicyServers: Use Policy Servers registry key
ProgId: Use policy or exit module's ProgId (registry subkey name)
RegistryValueName: registry value name (use "Name*" to prefix match)
Value: new numeric, string or date registry value or filename. If a numeric value starts with "+" or "-", the bits specified in the new value are set or cleared in the existing registry value.
If a string value starts with "+" or "-", and the existing value is a REG_MULTI_SZ value, the string is added to or removed from the existing registry value. To force creation of a REG_MULTI_SZ value, add a "\n" to the end of the string value.
If the value starts with "@", the rest of the value is the name of the file containing the hexadecimal text representation of a binary value. If it does not refer to a valid file, it is instead parsed as [Date][+|-][dd:hh] -- an optional date plus or minus optional days and hours. If both are specified, use a plus sign (+) or minus sign (-) separator. Use "now+dd:hh" for a date relative to the current time.
Use "chain\ChainCacheResyncFiletime @now" to effectively flush cached CRLs.
[-f] [-user] [-GroupPolicy] [-config Machine\CAName]
Return to Menu
-delreg
CertUtil [Options] -delreg [{ca|restore|policy|exit|template|enroll|chain|PolicyServers}\[ProgId\]][RegistryValueName]
Delete registry value
ca: Use CA's registry key
restore: Use CA's restore registry key
policy: Use policy module's registry key
exit: Use first exit module's registry key
template: Use template registry key (use -user for user templates)
enroll: Use enrollment registry key (use -user for user context)
chain: Use chain configuration registry key
PolicyServers: Use Policy Servers registry key
ProgId: Use policy or exit module's ProgId (registry subkey name)
RegistryValueName: registry value name (use "Name*" to prefix match)
Value: new numeric, string or date registry value or filename. If a numeric value starts with "+" or "-", the bits specified in the new value are set or cleared in the existing registry value.
If a string value starts with "+" or "-", and the existing value is a REG_MULTI_SZ value, the string is added to or removed from the existing registry value. To force creation of a REG_MULTI_SZ value, add a "\n" to the end of the string value.
If the value starts with "@", the rest of the value is the name of the file containing the hexadecimal text representation of a binary value. If it does not refer to a valid file, it is instead parsed as [Date][+|-][dd:hh] -- an optional date plus or minus optional days and hours. If both are specified, use a plus sign (+) or minus sign (-) separator. Use "now+dd:hh" for a date relative to the current time.
Use "chain\ChainCacheResyncFiletime @now" to effectively flush cached CRLs.
[-f] [-user] [-GroupPolicy] [-config Machine\CAName]
Return to Menu
-ImportKMS
CertUtil [Options] -ImportKMS UserKeyAndCertFile [CertId]
Import user keys and certificates into server database for key archival
UserKeyAndCertFile -- Data file containing user private keys and certificates to be archived. This can be any of the following:
Exchange Key Management Server (KMS) export file
PFX file
CertId: KMS export file decryption certificate match token. See -store.
Use -f to import certificates not issued by the CA.
[-f] [-silent] [-split] [-config Machine\CAName] [-p Password] [-symkeyalg SymmetricKeyAlgorithm[,KeyLength]]
Return to Menu
-ImportCert
CertUtil [Options] -ImportCert Certfile [ExistingRow]
Import a certificate file into the database
Use ExistingRow to import the certificate in place of a pending request for the same key.
Use -f to import certificates not issued by the CA.
The CA may also need to be configured to support foreign certificate import: certutil -setreg ca\KRAFlags +KRAF_ENABLEFOREIGN
[-f] [-config Machine\CAName]
Return to Menu
-GetKey
CertUtil [Options] -GetKey SearchToken [RecoveryBlobOutFile]
CertUtil [Options] -GetKey SearchToken script OutputScriptFile
CertUtil [Options] -GetKey SearchToken retrieve | recover OutputFileBaseName
Retrieve archived private key recovery blob, generate a recovery script, or recover archived keys
script: generate a script to retrieve and recover keys (default behavior if multiple matching recovery candidates are found, or if the output file is not specified).
retrieve: retrieve one or more Key Recovery Blobs (default behavior if exactly one matching recovery candidate is found, and if the output file is specified)
recover: retrieve and recover private keys in one step (requires Key Recovery Agent certificates and private keys)
SearchToken: Used to select the keys and certificates to be recovered.
Can be any of the following:
Certificate Common Name
Certificate Serial Number
Certificate SHA-1 hash (thumbprint)
Certificate KeyId SHA-1 hash (Subject Key Identifier)
Requester Name (domain\user)
UPN (user@domain)
RecoveryBlobOutFile: output file containing a certificate chain and an associated private key, still encrypted to one or more Key Recovery Agent certificates.
OutputScriptFile: output file containing a batch script to retrieve and recover private keys.
OutputFileBaseName: output file base name. For retrieve, any extension is truncated and a certificate-specific string and the .rec extension are appended for each key recovery blob. Each file contains a certificate chain and an associated private key, still encrypted to one or more Key Recovery Agent certificates. For recover, any extension is truncated and the .p12 extension is appended. Contains the recovered certificate chains and associated private keys, stored as a PFX file.
[-f] [-UnicodeText] [-silent] [-config Machine\CAName] [-p Password] [-ProtectTo SAMNameAndSIDList] [-csp Provider]
Return to Menu
-RecoverKey
CertUtil [Options] -RecoverKey RecoveryBlobInFile [PFXOutFile [RecipientIndex]]
Recover archived private key
[-f] [-user] [-silent] [-split] [-p Password] [-ProtectTo SAMNameAndSIDList] [-csp Provider] [-t Timeout]
Return to Menu
-MergePFX
CertUtil [Options] -MergePFX PFXInFileList PFXOutFile [ExtendedProperties]
PFXInFileList: Comma separated PFX input file list
PFXOutFile: PFX output file
ExtendedProperties: Include extended properties
The password specified on the command line is a comma separated password list. If more than one password is specified, the last password is used for the output file. If only one password is provided or if the last password is "*", the user will be prompted for the output file password.
[-f] [-user] [-split] [-p Password] [-ProtectTo SAMNameAndSIDList] [-csp Provider]
Return to Menu
-ConvertEPF
CertUtil [Options] -ConvertEPF PFXInFileList EPFOutFile [cast | cast-] [V3CACertId][,Salt]
Convert PFX files to EPF file
PFXInFileList: Comma separated PFX input file list
EPF: EPF output file
cast: Use CAST 64 encryption
cast-: Use CAST 64 encryption (export)
V3CACertId: V3 CA Certificate match token. See -store CertId description.
Salt: EPF output file salt string
The password specified on the command line is a comma separated password list. If more than one password is specified, the last password is used for the output file. If only one password is provided or if the last password is "*", the user will be prompted for the output file password.
[-f] [-silent] [-split] [-dc DCName] [-p Password] [-csp Provider]
Return to Menu
Options
This section defines the options that you can specify with the command.
Options |
Description |
---|---|
-nullsign |
Use hash of data as signature |
-f |
Force overwrite |
-enterprise |
Use local machine Enterprise registry certificate store |
-user |
Use HKEY_CURRENT_USER keys or certificate store |
-GroupPolicy |
Use Group Policy certificate store |
-ut |
Display user templates |
-mt |
Display machine templates |
-Unicode |
Write redirected output in Unicode |
-UnicodeText |
Write output file in Unicode |
-gmt |
Display times as GMT |
-seconds |
Display times with seconds and milliseconds |
-silent |
Use silent flag to acquire crypt context |
-split |
Split embedded ASN.1 elements, and save to files |
-v |
Verbose operation |
-privatekey |
Display password and private key data |
-pin PIN |
Smart Card PIN |
-urlfetch |
Retrieve and verify AIA Certs and CDP CRLs |
-config Machine\CAName |
CA and computer name string |
-PolicyServer URLOrId |
Policy Server URL or Id. For selection U/I, use -PolicyServer. For all Policy Servers, use -PolicyServer * |
-Anonymous |
Use anonymous SSL credentials |
-Kerberos |
Use Kerberos SSL credentials |
-ClientCertificate ClientCertId |
Use X.509 Certificate SSL credentials. For selection U/I, use -clientCertificate. |
-UserName UserName |
Use named account for SSL credentials. For selection U/I, use -UserName. |
-Cert CertId |
Signing certificate |
-dc DCName |
Target a specific Domain Controller |
-restrict RestrictionList |
Comma separated Restriction List. Each restriction consists of a column name, a relational operator and a constant integer, string or date. One column name may be preceded by a plus or minus sign to indicate the sort order. Examples: "RequestId = 47" "+RequesterName >= a, RequesterName < b" "-RequesterName > DOMAIN, Disposition = 21" |
-out ColumnList |
Comma separated Column List |
-p Password |
Password |
-ProtectTo SAMNameAndSIDList |
Comma separated SAM Name/SID List |
-csp Provider |
Provider |
-t Timeout |
URL fetch timeout in milliseconds |
-symkeyalg SymmetricKeyAlgorithm[,KeyLength] |
Name of Symmetric Key Algorithm with optional key length, example: AES,128 or 3DES |
Return to Menu
Additional certutil examples
For some examples of how to use this command, see
Certutil Examples for Managing Active Directory Certificate Services (AD CS) from the Command Line
Binary Request Export Using the CertUtil.exe Command-Line Tool Walkthrough
Return to Menu