EFS certificate on smartcard not working
Hello all! I cannot get my EFS-certificate on a smart card to work and would appreciate any help. I've set the Local Security Policy to Require a smart card for EFS (I'm running Windows Server 2008 R2). When I try to encrypt a folder and choose Use an exiting smart card certificate I get this message: "No certificate available: No certificate meet the application..." - I got the certificate on the smartcard by creating a offline custom request (from a standalone Root CA that is trusted). - It includes the EKU Encrypting File System. - It's valid, trusted and I can reach the CRL (event though EFS apparently doesn't check CRL). - The certificate is populated in the Personal Store of my user account and indicates that I have the private key. What are the complete requirements for EFS certificate? What am I missing? Tom Aafloen, IT-security Consultant Onevinn AB
February 8th, 2012 6:01am

Besides the application policy you need to check the properties of your smart card template and make sure that the basic key usage allows encryption. Edit your certificate template and on the request handling tab check the Purpose is set to signature and encryption /Hasain
Free Windows Admin Tool Kit Click here and download it now
February 8th, 2012 7:29am

Since it's a Standalone CA I don't have templates, so everything has to be specified in the request itself. I already had the Key Usage Data encipherment and Key encipherment in the non-working certificate. What is the "signature and encryption" equivalance in a custom request? When I create my custom request I only enter/change the following: Subject: CN=TestKey Usage: Data encipherment and Key enciphermentExtended Key Usage: Encrypting File SystemCSP: Microsoft Base Smart Card Crypto ProviderKey size: 2048 But this is not enough...Tom Aafloen, IT-security Consultant Onevinn AB
February 8th, 2012 8:00am

Based on a sample certificate, Key Usage must be Key Encipherment only (0x20) Also, in a duplicate of Basic EFS, the following is enable: SMIMECapabilities I recommend that you request a basic EFS cert from an enterprise CA, use that as your certificate profile, and modify your request accordingly Brian
Free Windows Admin Tool Kit Click here and download it now
February 8th, 2012 10:00am

Based on a sample certificate, Key Usage must be Key Encipherment only (0x20) Also, in a duplicate of Basic EFS, the following is enable: SMIMECapabilities I recommend that you request a basic EFS cert from an enterprise CA, use that as your certificate profile, and modify your request accordingly Brian
February 8th, 2012 5:59pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics