-
سلام دوستان .
من با تازگی در تمامی ویندوز های 2003 سرور خودم در Event view با پیغام خطای زیر مواجه میشم :
[QUOTE]Automatic certificate enrollment for local system failed to enroll for one Domain Controller certificate (0x80070005). Access is denied.[/QUOTE]
کسی از دوستان تجربه ای یا راه حلی هم داره ؟ من با جستجو به صفحات زیر رسیدم.منتها چون ین سرورها سرورهای حیاتی مجموعه می باشند .می خواستم قبل از اعمال کردن با شما مشورت کنم
لطف کنن اساتید کمک کنن
[url=http://support.microsoft.com/kb/903220]Description of the changes to DCOM security settings after you install Windows Server 2003 Service Pack 1[/url]
[url=http://social.technet.microsoft.com/Forums/en-US/winserverDS/thread/ab4ddc37-c0cf-4ff7-b42b-afa617b21eb0/]Certificate Services AutoEnrollment Error on Windows 2003 and Windows 2008 Domain Controllers[/url]
این دو تا صفحه رو هم پیدا کردم
[url=http://social.technet.microsoft.com/wiki/contents/articles/3048.aspx]Troubleshooting Certificate Autoenrollment in Active Directory Certificate Services (AD CS) - TechNet Articles - Home - TechNet Wiki[/url]
[url=http://technet.microsoft.com/en-us/library/cc755801%28WS.10%29.aspx]Troubleshooting (Certificate Autoenrollment in Windows Server 2003)[/url]
راستی سوالمو تصحیح کنم که فقط دامین کنترلرهای شبکه چنین خطایی دارند.
دوستان اساتید لطفا کمک کنید
-
-
[url=http://social.technet.microsoft.com/wiki/contents/articles/3048.aspx]Troubleshooting Certificate Autoenrollment in Active Directory Certificate Services (AD CS) - TechNet Articles - Home - TechNet Wiki[/url]
شما چند تا دامين كنترل داري تو شبك؟
ايا همه دامين كنترل ها تحت 2003win هستند?
-
[QUOTE=imannami;333408][URL="http://social.technet.microsoft.com/wiki/contents/articles/3048.aspx"]Troubleshooting Certificate Autoenrollment in Active Directory Certificate Services (AD CS) - TechNet Articles - Home - TechNet Wiki[/URL]
شما چند تا دامين كنترل داري تو شبك؟
ايا همه دامين كنترل ها تحت 2003win هستند?[/QUOTE]
4 تا دامین کنترلر
همه تحت 2003 هستند.
شما تجربه ی این مشکل را داشتید و تونستید مشکلتونو حل کنید؟
-
[url=http://social.technet.microsoft.com/wiki/contents/articles/3048.aspx]Troubleshooting Certificate Autoenrollment in Active Directory Certificate Services (AD CS) - TechNet Articles - Home - TechNet Wiki[/url]
با لينك بالا اين كار رو روي تمامي سرورهاي اكتيو انجام بده مشكل حل ميشه البته پيشنهاد ميكنم زماني اين كار رو بكن كه ارتباط اكتيو رو از تو شبكه قطع كني سپس سرور رو ريستارت كن و بيار داخل شبكه اي مشكل زماني پيش ميايد كه تداخل گروپ پاليسي داري رو شبكه
-
آقا من نتونستم مشکل رو حل کنم .یعنی نفهمیدم این صفحه چی میگه !!! لطفا کمک کنید. من این صفحه رو پیدا کردم و چند بار خوندم .ولی چیزی دستگیرم نشد! [URL="http://technet.microsoft.com/en-us/library/cc755801%28WS.10%29.aspx"]Troubleshooting (Certificate Autoenrollment in Windows Server 2003) [/URL]
[LEFT]
Troubleshooting (Certificate Autoenrollment in Windows Server 2003)
Updated: January 1, 2003
Applies To: Windows Server 2003 with SP1
This section outlines key scenarios that need to be considered when troubleshooting autoenrollment. It also covers how to prepare for autoenrollment failures and lists event logging messages.
[h=2]Key Issues[/h] The following key issues need to be considered when troubleshooting autoenrollment.
[h=3]Infrastructure Requirements[/h] Windows XP clients and Windows Server 2003 CAs will always request LDAP-signed communications with domain controllers as a security function. Before deploying autoenrollment or a Windows Server 2003 CA, all domain controllers running Windows 2000 should be upgraded to Service Pack 3 or greater.
[h=3]Root and Cross-Certificate Download from Active Directory[/h] Autoenrollment automatically downloads root certificates and cross-certificates from Active Directory whenever a change is detected in the directory or when a different domain controller is contacted. If a third-party root certificate or cross-certificate is deleted from the local machine store, autoenrollment will not download the certificates again until a change occurs in Active Directory or a new domain controller is contacted.
To manually force a new download, delete the following registry key and all subordinate keys on all affected machines. [B]HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\AutoEnrollment\AEDirectoryCache[/B]
[h=3]EFS and Autoenrollment[/h] EFS always attempts to enroll for the Basic EFS template by default. The EFS component driver generates an autoenrollment request that autoenrollment tries to fulfill. For customers who want to ensure that a specific template is used for EFS (such as to include key archival), the new template should supersede the Basic EFS template. The Basic EFS template should also be removed from any Enterprise CA. This will ensure that autoenrollment will not attempt enrollment for the Basic EFS template any more. For customers who wish to replace the Basic EFS template with a certificate and key that is archived through the Windows Server 2003, Enterprise Edition CA, the proper procedure is to supersede the Basic EFS template with a new version 2 certificate template.
[h=3]Smartcard Renewal[/h] The Smartcard Logon and Smartcard User version 1 templates may not be renewed through autoenrollment. To renew a version 1 Smartcard Logon or Smartcard User template, the proper procedure is to supersede these templates with a new version 2 template.
Autoenrollment always attempts to generate a new key when performing certificate renewal. For smart cards with limited space that do not support additional key generation, autoenrollment will attempt to reuse the key; however, additional space will still be required to install the new certificate. If no space is available on the card for these operations, the renewal through autoenrollment may fail.
[h=3]Autoenrollment and Strong Private Key Protection[/h] The version 2 certificate template properties on the Request Handling tab support the ability to require a user password when the private key is used by applications. This is set by selecting the Prompt the user during enrollment option and requires user input when the private key is used. It is important to never use this option for smart card certificates as smart card CSPs also do not support this capability. If this option is chosen, autoenrollment may fail.
[h=3]Removal of Certificates on Domain Join/Change Domain[/h] When a machine is removed from a domain or added to a new domain, all the downloaded certificates from Active Directory will be removed and refreshed if applicable. Certificates that were issued or autoenrolled from a previous forest will not be removed unless the machine is a domain controller. All client machines will automatically update certificates when the domain or machine information changes. When machines or users have certificates that are required for secure network communications, wireless communications, and so on, it may be necessary to delete the old certificates after joining a new domain or forest.
[h=3]Autoenrollment Failures[/h] Autoenrollment will warn the user with a warning dialog box when an autoenrollment failure occurs. This feature is only enabled when user interaction is required on the certificate template.
To enable the warning feature for an autoenrollment failure
[LIST][*] Open the specified template in the [B]Certificate Templates[/B] MMC snap-in.[*] Click the [B]Request Handling[/B] tab.[*] Click [B]Prompt the user during enrollment[/B] on the Request Handling tab of the certificate template properties.[/LIST]
[h=3]Re-Initialized Smart Cards[/h] If enrollment for a certificate is based on the existence of a smart card certificate and if the smart card has been re-initialized, the smart card Insertion dialog box will ask the user to insert a smart card matching the key container identified by the old certificate. Since the key container has been deleted, the Insertion dialog box will continue to display despite the fact that the user has removed and inserted the card. The only choice is to click Cancel and fail the enrollment.
[h=2]Enhanced Event Logging[/h] By default, autoenrollment logs errors/failures and successful enrollments in the Application event log on the client machine.
To enable enhanced logging of autoenrollment processes to include warning and informational messages, the following registry values must be created.
[h=3]User Autoenrollment[/h] [B]HKEY_CURRENT_USER\Software\Microsoft\Cryptography\Autoenrollment[/B]: Create a new DWORD value named AEEventLogLevel"; set value to 0.
[h=3]Machine Autoenrollment[/h] [B]HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Autoenrollment[/B]: Create a new DWORD value named "AEEventLogLevel", set value to 0.
[/LEFT]
-
-
هنوز هم کسی نیست
باید بیشتر بگردم
-
من بعد از دو روز گشتن همچنان نتونستم چیزی پیدا کنم!
-
-