Domain Controller Certificate Key Usage
Digital signature key encipherment.
Domain controller certificate key usage. The common name cn in the subject field. The certificate key usage section must contain. Domain controller authentication and directory e mail replication.
The certificate key usage section must contain. The enhanced key usage extension includes the server authentication 1 3 6 1 5 5 7 3 1 object identifier also known as oid. Our domain controllers use certificate enrolled from kerberos authentication template from old pki to provide ldaps connections.
The domain administrator will need to obtain a certificate with the kdc eku for the domain controller to resolve this error. None of the certificates in the chain exceed 2048 bits and things work happily. Domain controller certificates must be issued with a set of specific extensions and values.
Application lifecycle is few years and there s no upgrade available at the moment which would allow us to use move toward larger key sizes. The kdc certificate for the domain controller does not contain the kdc extended key usage eku. The certificate profile for each domain controller must meet the following requirements.
The kdc then uses cryptoapi to verify the digital signature on the signed authenticator that was included in the preauthentication data fields. Application policies or enhanced key usage. The certificate key usage extension must contain.
The active directory fully qualified domain name of the domain controller for example dc01 domain com must appear in one of the following places. Optionally the certificate basic constraints section should contain. Subject type end entity path length constraint none the certificate enhanced key usage section must contain.