How to create 3rd Party CA NTAuth trust without autoenroll


as sets certificate authentication third party web applications, 1 of hardest things in windows troubleshoot certificate authentication failures.  during process, unless iis involved in particular step (checking crl / validating account), getting logging near impossible.  

i have tried looking security audit event logs information security audit logs not have detailed error information indexed anywhere. site listed below provides great example of logon failure status , sub status codes codes normal authentication methods.  i have yet see guide on troubleshooting logon failure events coming lsass.exe , schannel.  

windows security log event id 4625 - account failed log on

my sub-status code, 0x80090325, not included in guide.

where can list of comprehensive failure status codes future troubleshooting?  how can more advanced logs active directory mapped client certificate authentication iis 7/8?


for future reference capi event log in:

event viewer (local) > windows logs > application , service logs > microsoft > windows > capi2

i found issue.  apparently the ca root not trusted ntauth store, extremely weird since used enterprise pki snap in add public key of root ca ntauth store.  below capi error:

<result value="800b0112">a certification chain processed correctly, 1 of ca certificates not trusted policy provider.</result> 

the odd thing the "certutil -dspublish -f filename ntauthcacommand did not work claiming cert existed, when instead used  "certutil -enterprise -addstore ntauth ca_certfilename.cer" a certificate got added , certutil replied public key added (i confirmed checking registry hkey_local_machine\software\microsoft\enterprisecertificates\ntauth\certificates).  i find odd.




Windows Server  >  Security



Comments

Popular posts from this blog

Edit Group Policy

Hyper-V VM not reaching OS 'Logon' screen

DNS question...