Black Friday Special! Get 30% off Training Subscriptions with code BLACKFRIDAY30 at checkout!
Schedule a Demo
Blog October 19, 2022 Certificate Requests, Certificate Templates, Enrollment, Known Issues, PKI

The mystery of “Valid existing certificate” setting in ADCS certificate templates – demystified

by Vadims Podāns
Person sitting at a laptop while viewing the PKI Spotlight Dashboard.

Expand Your PKI Visibility

Discover why seeing is securing with revolutionary PKI monitoring and alerting.

Learn More About PKI Spotlight®

Let’s re-iterate the problem. ADCS Certificate Templates provide configuration for issuance requirements, which allows you to forcibly put request in pending state (no automatic issuance) and/or enrollment agent co-signing:

Many articles suggest to enable “Valid existing certificate” option and you will be fine. Unfortunately, there is very little information on what this option does or how it works. In general, it is known that it will override other issuance requirements, such as CA manager approval and/or enrollment agent co-signing. This is useful, when initial request requires additional checks/steps and they are not enforced by automatic certificate renewal. However, it is not true in various scenarios. A couple of examples:

Admins expect this flag to work in always, but it doesn’t. I was under same delusion of this flag and communicated with Open Specifications support to figure out what’s wrong with the setting. A week ago, Microsoft updated [MS-WCCE] document which contains a clear and definitive behavior:

If the CT_FLAG_PREVIOUS_APPROVAL_VALIDATE_REENROLLMENT flag is set in the template, the CA MUST verify that all the following conditions are satisfied before enforcing the CT_FLAG_PREVIOUS_APPROVAL_VALIDATE_REENROLLMENT flag:

  • The old certificate, based on which the reenrollment is occurring, MUST contain the Certificate Template OID extension.
  • The TemplateID from the old certificate MUST match the TemplateID of the current template.
  • If the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is set, then the CA MUST verify that subject name is supplied in the request, and that it matches with the subject of the old certificate.
  • If the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is not set, then the old certificate MUST contain the subject alternative name (SubjectAltName) extension.
  • If the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is not set, then the SubjectAltName extension from the old certificate MUST contain either an rfc822Name or otherName with OID szOID_NT_PRINCIPAL_NAME (1.3.6.1.4.1.311.20.2.3).
  • If the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is not set and the SubjectAltName contains otherName, then the value of otherName MUST match the value of the userPrincipalName attribute from the requestor’s user object in the working directory.
  • If the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is not set,and the SubjectAltName contains the rfc822Name, then the value of rfc822Name MUST match the value of the mail attribute from the requestor’s user object in the working directory

.

If we look at failing examples, first example fails 5th requirement. Machine certificates don’t use RFC822 or UPN name types, they use DNS Name name which is ignored by this logic. Second example fails on 2nd requirement, new template doesn’t match the one in signing certificate.

Related Resources

  • Blog A representation of PKI and digital certificate with a key lying on a blue circuit board
    November 7, 2024

    PKI Insights Recap – Is Your PKI Healthy? The Essential Guide to Comprehensive Assessments

    PKI, PKI Insights
  • Blog Image of a person sitting at a desk working on a laptop with PKI Spotlight on the screen.
    October 4, 2024

    Announcing the October 2024 PKI Spotlight® Release

    PKI, PKI Spotlight
  • Blog
    August 16, 2024

    To Revoke or Not to Revoke: Balancing Security with Performance and Operational Complexity

    CA, Certificate Authority, Certificate Revocation List, CRL, OCSP, PKI, VPN

Vadims Podāns

PKI Software Architect

View All Posts by Vadims Podāns

Comments

  • Fascinating – does this basically kill any chance of getting any custom CEP templates with initial CA Manager approval working with auto-enrollment after the initial approval?

    • > does this basically kill any chance of getting any custom CEP templates with initial CA Manager approval working with auto-enrollment after the initial approval?

      right.

  • Vadims,

    I was able to get this working if I chose “Supply In The Request” and “Use subject information from existing certificates for autoenrollment renewal requests.” I’m guessing that is because the flag referenced in the fifth condition is set and the condition is therefore bypassed:

    If the CT_FLAG_ENROLLEE_SUPPLIES_SUBJECT flag is not set, then the SubjectAltName extension from the old certificate MUST contain either an rfc822Name or otherName with OID szOID_NT_PRINCIPAL_NAME (1.3.6.1.4.1.311.20.2.3).

    I suspect you already know this which leads me to ask the question; aside from the obvious security concerns around that setting — is there another reason this is not preferred or best practice?

    Lastly, is there any guidance or explanation around the various policy types and application policy for the “This number of authorized signatures” setting under Issuance Requirements? I noticed your template includes that setting for “Certificate Request Agent” – I suspect I know what it means, but I’m not 100%. Is this just a setting to ensure the enrollment request must include a valid certificate with the Certificate Request Agent application policy? I am testing this setting on the next renewal and I will see if automatically re-enrolls – thanks.

    Thanks again for the post!

    • > Use subject information from existing certificates for autoenrollment renewal requests.

      with this option, renewal request copies identity information from existing cert, so it should be fine

      > is there another reason this is not preferred or best practice?

      I would ask Microsoft what they thought.

      > Is this just a setting to ensure the enrollment request must include a valid certificate with the Certificate Request Agent application policy?

      yes. This is used for ROBO enrollments and enrollment agent’s cert must comply with settings in Issuance Requirements tab.

      • Thanks Vadims!

        Just as a follow-up for those that may read this; if I set the template on the initial enrollment to “Supply In The Request” and “Use subject information from existing certificates for autoenrollment renewal requests”, I was able to get auto-renewal to process successfully. Likewise; I was able to apply signature requirements that bound the request to have the certificate request agent application policy within the cert for subsequent renewals AFTER I performed the initial enrollment manually.

Leave a Reply

Your email address will not be published. Required fields are marked *