<< < 1 2 3 4 5 6 >   ∑:133  Sort:Date

Find Certificates
The Find Certificates dialog box allows you to locate certificates based on criteria that you specify. Users or local Administrators is the minimum group membership required to complete this procedure. Review the details in "Additional considerations" in this topic. ☞ To find a certificate In the...
2016-07-21, ∼2783🔥, 0💬

Troubleshoot Certificate-Related Problems
This section lists a few common issues you may encounter when using the Certificates snap-in or working with certificates. What problem are you having? I cannot enroll for a new certificate by using the Certificate Request Wizard. I get a message indicating that I need to enroll for a new certificat...
2016-07-15, ∼2773🔥, 0💬

Submit a User Certificate Request over the Web
When you request certificates from a Windows-based stand-alone certification authority (CA), you use the CA Web enrollment pages. Web enrollment pages can also be used to request certificates from enterprise CAs if you want to set optional request features that are not available in the Certificate R...
2016-07-30, ∼2725🔥, 0💬

What Is Windows PowerShell
What is Windows PowerShell? PowerShell is an automation platform and scripting language for Windows and Windows Server that allows you to simplify the management of your systems. Unlike other text-based shells, PowerShell harnesses the power of the .NET Framework, providing rich objects and a massiv...
2016-07-31, ∼2689🔥, 0💬

Public and Private Keys
In public key encryption, two different keys are used to encrypt and decrypt information. The private key is a key that is known only to its owner, while the public key can be made known and available to other entities on the network. The two keys are different but complementary in function. For exa...
2016-07-15, ∼2665🔥, 0💬

Certification Path Tab
Using the Certification Path tab, you can view the path from the selected certificate to the certification authorities (CAs) that issue the certificate. Before a certificate is trusted, Windows must verify that the certificate comes from a trusted source. This verification process is called path val...
2016-07-25, ∼2656🔥, 0💬

Request a Certificate
You can use the Certificates snap-in to request certificates. You can request any type of certificate that has been preconfigured and made available by an administrator of the certification authority (CA) that will process the certificate request. Users or local Administrators is the minimum group m...
2016-08-06, ∼2621🔥, 0💬

Cryptographic Service Providers
A cryptographic service provider (CSP) is the program that performs authentication, encoding, and encryption services that Windows-based applications access through the Microsoft Cryptography application programming interface (CryptoAPI). Each CSP provides a different implementation of the CryptoAPI...
2016-08-06, ∼2544🔥, 0💬

Certificate Enrollment Policy Web Service Overview
The Certificate Enrollment Policy Web Service is an Active Directory Certificate Services (AD CS) role service that enables users and computers to obtain certificate enrollment policy information. Together with the Certificate Enrollment Web Service, this enables policy-based certificate enrollment...
2016-08-01, ∼2465🔥, 0💬

Export a Certificate with the Private Key
In some cases, you may want to export a certificate with its private key to store on removable media or to use on a different computer. There are some restrictions to this procedure: A private key is exportable only when it is specified in the certificate request or certificate template that was use...
2016-07-20, ∼2389🔥, 0💬

Delete a Certificate
Certificates can become obsolete for a number of reasons, such as when they are compromised, become corrupted, or are replaced by a new certificate. However, even when a certificate is deleted, the corresponding private key is not deleted. ! Important Before deleting a certificate, be sure that you ...
2016-07-21, ∼2362🔥, 0💬

Certificate Enrollment Web Service Overview
The Certificate Enrollment Web Service is an Active Directory Certificate Services (AD CS) role service that enables users and computers to perform certificate enrollment by using the HTTPS protocol. Together with the Certificate Enrollment Policy Web Service, this enables policy-based certificate ...
2016-08-01, ∼2341🔥, 0💬

Certificate Properties Cross-Certificates Tab
Cross-certificates are used to establish trust between separate certification hierarchies, such as in separate networks or portions of a network. In these cases, cross-certificates are typically configured to: Define the namespaces for which certificates issued in one certification hierarchy can be ...
2016-07-22, ∼2332🔥, 0💬

Autoenroll for a Certificate from the Certificates Snap-in
Many organizations will use Group Policy to automatically enroll users, computers, or services for certificates. With automatic enrollment, a user might see a reminder with a prompt to complete the enrollment. However, there might also be times when a user or administrator wants to verify that all p...
2016-08-10, ∼2271🔥, 0💬

Request a Certificate Over the Web
Certification authorities (CAs) can be accessed by using CA Web enrollment pages, which can be used to perform a variety of tasks related to requesting certificates. The default location of the CA Web enrollment pages is http:// servername /certsrv, where servername is the name of the server that ho...
2016-07-30, ∼2257🔥, 0💬

Certificate Properties Extended Validation Tab
The Extended Validation tab is used by administrators to add an Extended Validation (EV) certificate policy to root certificates that are distributed by Group Policy. Adding the EV certificate policy to root certificates and certificates issued to intranet Web sites provides a visual indicator that ...
2016-07-22, ∼2253🔥, 0💬

Save a Certificate Request in a File
You can prepare a certificate request for use later, or to retain a copy of the request even if it is processed at the same time as it is saved. Users or local Administrators is the minimum group membership required to complete this procedure. Review the details in "Additional considerations" in thi...
2016-08-01, ∼2228🔥, 0💬

Certificate Validity Periods
The Certificates snap-in enables you to renew a certificate issued from a Windows-based enterprise certification authority (CA) before or after the end of its validity period by using the Certificate Renewal Wizard. About certificate validity Every certificate has a validity period. After the end of...
2016-07-25, ∼2210🔥, 0💬

Import a Certificate
You should only import certificates obtained from trusted sources. Importing an unreliable certificate could compromise the security of any system component that uses the imported certificate. You can import a certificate into any logical or physical store. In most cases, you will import certificate...
2016-07-20, ∼2176🔥, 0💬

General Tab
You can view information about the fields, extensions, and properties that define an issued certificate by double-clicking any certificate displayed in the certificate store. Clicking the General tab provides a general overview of the certificate, including the following information: Supported uses ...
2016-07-27, ∼2161🔥, 0💬

Export a Certificate
You can export a certificate in order to import a copy on a different computer or device or to store a copy in a secure location. If you are exporting certificates for import onto a computer running Windows, PKCS #7 format is the preferred export format. This format preserves the chain of certifica...
2016-07-20, ∼2134🔥, 0💬

View Certificates
Certificates can be issued and used for many purposes. It can be useful to examine certificate stores, certificate information and properties, and information about archived and revoked certificates. Display Certificate Stores View Certificate Information View Certificate Properties View the Certifi...
2016-07-28, ∼2124🔥, 0💬

Display Certificates by Logical Certificate Stores
Logical certificate stores organize certificates in logical, functional categories for users, computers, and services. The use of logical certificate stores eliminates the need to store duplicates of common public key objects, such as trusted root certificates, certificate trust lists (CTLs), and ce...
2016-07-27, ∼2114🔥, 0💬

Certificate Extensions
The Extensions tab allows an administrator to define specific application policies, issuance policies, certificate subject types, and key usage attributes for a certificate template. Application policies Application policies are settings that inform a target that the subject holds a certificate that...
2016-08-06, ∼2108🔥, 0💬

<< < 1 2 3 4 5 6 >   ∑:133  Sort:Date