text stringlengths 0 4.23k |
|---|
Where: |
[-f] [-config Machine\CAName] [-dc DCName] |
Remarks |
The -config option targets a single Certificate Authority (Default is all CAs). |
-config |
The -f option can be used to override validation errors for the specified sitename or to delete all CA sitenames. |
-f |
Note |
For more information about configuring CAs for Active Directory Domain Services (AD DS) site awareness, see AD DS Site Awareness for AD CS and PKI clients. |
-enrollmentserverURL |
Displays, adds, or deletes enrollment server URLs associated with a CA. |
certutil [options] -enrollmentServerURL [URL authenticationtype [priority] [modifiers]] |
certutil [options] -enrollmentserverURL URL delete |
Where: |
authenticationtype specifies one of the following client authentication methods, while adding a URL: |
kerberos - Use Kerberos SSL credentials. |
username - Use a named account for SSL credentials. |
clientcertificate: - Use X.509 Certificate SSL credentials. |
anonymous - Use anonymous SSL credentials. |
delete deletes the specified URL associated with the CA. |
priority defaults to 1 if not specified when adding a URL. |
1 |
modifiers is a comma-separated list, which includes one or more of the following: |
allowrenewalsonly - Only renewal requests can be submitted to this CA via this URL. |
allowkeybasedrenewal - Allows use of a certificate that has no associated account in the AD. This applies only with clientcertificate and allowrenewalsonly Mode |
[-config Machine\CAName] [-dc DCName] |
-adca |
Displays Active Directory Certificate Authorities. |
certutil [options] -adca [CAName] |
[-f] [-split] [-dc DCName] |
-ca |
Displays enrollment policy Certificate Authorities. |
certutil [options] -CA [CAName | templatename] |
[-f] [-user] [-silent] [-split] [-policyserver URLorID] [-anonymous] [-kerberos] [-clientcertificate clientcertID] [-username username] [-p password] |
-policy |
Displays the enrollment policy. |
[-f] [-user] [-silent] [-split] [-policyserver URLorID] [-anonymous] [-kerberos] [-clientcertificate clientcertID] [-username username] [-p password] |
-policycache |
Displays or deletes enrollment policy cache entries. |
certutil [options] -policycache [delete] |
Where: |
delete deletes the policy server cache entries. |
-f deletes all cache entries |
[-f] [-user] [-policyserver URLorID] |
-credstore |
Displays, adds, or deletes Credential Store entries. |
certutil [options] -credstore [URL] |
certutil [options] -credstore URL add |
certutil [options] -credstore URL delete |
Where: |
URL is the target URL. You can also use * to match all entries or https://machine* to match a URL prefix. |
* |
https://machine* |
add adds a credential store entry. Using this option also requires the use of SSL credentials. |
delete deletes credential store entries. |
-f overwrites a single entry or deletes multiple entries. |
[-f] [-user] [-silent] [-anonymous] [-kerberos] [-clientcertificate clientcertID] [-username username] [-p password] |
-installdefaulttemplates |
Installs default certificate templates. |
certutil [options] -installdefaulttemplates |
[-dc DCName] |
-URLcache |
Displays or deletes URL cache entries. |
certutil [options] -URLcache [URL | CRL | * [delete]] |
Where: |
URL is the cached URL. |
CRL runs on all cached CRL URLs only. |
* operates on all cached URLs. |
delete deletes relevant URLs from the current user's local cache. |
-f forces fetching a specific URL and updating the cache. |
[-f] [-split] |
-pulse |
Pulses auto enrollment events. |
certutil [options] -pulse |
[-user] |
-machineinfo |
Displays information about the Active Directory machine object. |
certutil [options] -machineinfo domainname\machinename$ |
-DCInfo |
Displays information about the domain controller. The default displays DC certificates without verification. |
certutil [options] -DCInfo [domain] [verify | deletebad | deleteall] |
[-f] [-user] [-urlfetch] [-dc DCName] [-t timeout] |
Tip |
The ability to specify an Active Directory Domain Services (AD DS) domain [Domain] and to specify a domain controller (-dc) was added in Windows Server 2012. To successfully run the command, you must use an account that is a member of Domain Admins or Enterprise Admins. The behavior modifications of this command are as follows:1. If a domain is not specified and a specific domain controller is not specified, this option returns a list of domain controllers to process from the default domain controller.2. If a domain is not specified, but a domain controller is specified, a report of the certificates on the specified domain controller is generated.3. If a domain is specified, but a domain controller is not specified, a list of domain controllers is generated along with reports on the certificates for each domain controller in the list.4. If the domain and domain controller are specified, a list of domain controllers is generated from the targeted domain controller. A report of the certificates for each domain controller in the list is also generated. |
For example, assume there is a domain named CPANDL with a domain controller named CPANDL-DC1. You can run the following command to a retrieve a list of domain controllers and their certificates that from CPANDL-DC1: certutil -dc cpandl-dc1 -DCInfo cpandl |
certutil -dc cpandl-dc1 -DCInfo cpandl |
-entinfo |
Displays information about an enterprise Certificate Authority. |
certutil [options] -entinfo domainname\machinename$ |
[-f] [-user] |
-tcainfo |
Displays information about the Certificate Authority. |
certutil [options] -tcainfo [domainDN | -] |
[-f] [-enterprise] [-user] [-urlfetch] [-dc DCName] [-t timeout] |
-scinfo |
Displays information about the smart card. |
certutil [options] -scinfo [readername [CRYPT_DELETEKEYSET]] |
Where: |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.