Removing CA
We are working to remove an enterprise CA that was previously used to test OWA using KB889250. The certificate has been long expired. However, it appears there are two valid certificates issued to the DCs. Given this scenerio is it necessary to maintain a CRL distribution point? Can the certificates be revoked, uninstall CA, remove all AD related objects and remove certificates from the DCs? Many thanks in advance for any assistance.
March 24th, 2010 5:55pm

there are two ways to solve this task: 1) remove all issued certificates from clients (such DCs) and completely remove CA server (AD CS role). This will be fine if CA haven't issued so many certificates. 2) revoke all issued certificates, publish new CRL and remove AD CS role from CA server.http://www.sysadmins.lv
Free Windows Admin Tool Kit Click here and download it now
March 24th, 2010 8:11pm

Thanks for the reply. The only clients that have a certificate are the ones listed under Issued Certificates, is that correct? When you say "remove AD CS role from CA server" do you mean uninstall through Add/Remove Programs/Windows Componets? Does anything have to be manually removed? Thanks again,
March 24th, 2010 9:46pm

> The only clients that have a certificate are the ones listed under Issued Certificates, is that correct? yes. > Does anything have to be manually removed? you may have to manually delete CA objects from AD (configuration partition), such AIA, CDP, NTAuthCertificates, Certification Authorities containers. For detailed info please refer to the mentioned KB889250 article.http://www.sysadmins.lv
Free Windows Admin Tool Kit Click here and download it now
March 24th, 2010 10:07pm

Thanks again. For the AIA and CDP can I just delete the references under Sites and services? Also, in a test enviroment we had trouble with the NTAuthCertificates. The command on the KB would not work. If we use PKView will that remove the NTAuthCertificates related objects? Thanks,
March 24th, 2010 10:13pm

sure. Using pkiview.msc you can review all PKI-related containers in AD (except Certificate Templates) and remove unused certificates/CRLs.http://www.sysadmins.lv
Free Windows Admin Tool Kit Click here and download it now
March 24th, 2010 10:17pm

Thanks so much for working with me on this. So, we just need to: revoke, uninstall, delete folders under Public Key Services in Sites and Services, run pkview and delete anything remaining, remove certificates from servers. Is that right? Many thanks again for all your help.
March 24th, 2010 10:48pm

if you *completely* want to remove CA, you don't need to revoke certificates. This is because when you remove your CA from Trusted Root CAs container, nobody will trust your CRLs. Just remove AD CS role and delete certificates/CRLs from AD using pkiview.msc.http://www.sysadmins.lv
Free Windows Admin Tool Kit Click here and download it now
March 24th, 2010 10:56pm

Thank you. I do wnat it completely removed. Just one last question. Will pkiview find and let us delete objects after the Enterprise CA has been uninstalled?
March 24th, 2010 11:08pm

yes. While pkiview.msc is available (as far as I understand you have Windows Server 2003 CA and pkiview.msc is shipped with reskit tools) you at any time can run it and manage AD containers.http://www.sysadmins.lv
Free Windows Admin Tool Kit Click here and download it now
March 24th, 2010 11:11pm

Thanks again for all your help yesterday. After everything is removed using pkiview do we delete the Public Key Services folder listed in Sites and Services? Thanks again,
March 25th, 2010 4:33pm

no. You MUST NOT delete this container. Just CA entries within this container and subcontainers.http://www.sysadmins.lv
Free Windows Admin Tool Kit Click here and download it now
March 25th, 2010 4:40pm

Thank you for all your help.
March 25th, 2010 4:42pm

This topic is archived. No further replies will be accepted.

Other recent topics Other recent topics