text
stringlengths
0
4.23k
Where:
[-f] [-config Machine\CAName] [-dc DCName]
Remarks
The -config option targets a single Certificate Authority (Default is all CAs).
-config
The -f option can be used to override validation errors for the specified sitename or to delete all CA sitenames.
-f
Note
For more information about configuring CAs for Active Directory Domain Services (AD DS) site awareness, see AD DS Site Awareness for AD CS and PKI clients.
-enrollmentserverURL
Displays, adds, or deletes enrollment server URLs associated with a CA.
certutil [options] -enrollmentServerURL [URL authenticationtype [priority] [modifiers]]
certutil [options] -enrollmentserverURL URL delete
Where:
authenticationtype specifies one of the following client authentication methods, while adding a URL:
kerberos - Use Kerberos SSL credentials.
username - Use a named account for SSL credentials.
clientcertificate: - Use X.509 Certificate SSL credentials.
anonymous - Use anonymous SSL credentials.
delete deletes the specified URL associated with the CA.
priority defaults to 1 if not specified when adding a URL.
1
modifiers is a comma-separated list, which includes one or more of the following:
allowrenewalsonly - Only renewal requests can be submitted to this CA via this URL.
allowkeybasedrenewal - Allows use of a certificate that has no associated account in the AD. This applies only with clientcertificate and allowrenewalsonly Mode
[-config Machine\CAName] [-dc DCName]
-adca
Displays Active Directory Certificate Authorities.
certutil [options] -adca [CAName]
[-f] [-split] [-dc DCName]
-ca
Displays enrollment policy Certificate Authorities.
certutil [options] -CA [CAName | templatename]
[-f] [-user] [-silent] [-split] [-policyserver URLorID] [-anonymous] [-kerberos] [-clientcertificate clientcertID] [-username username] [-p password]
-policy
Displays the enrollment policy.
[-f] [-user] [-silent] [-split] [-policyserver URLorID] [-anonymous] [-kerberos] [-clientcertificate clientcertID] [-username username] [-p password]
-policycache
Displays or deletes enrollment policy cache entries.
certutil [options] -policycache [delete]
Where:
delete deletes the policy server cache entries.
-f deletes all cache entries
[-f] [-user] [-policyserver URLorID]
-credstore
Displays, adds, or deletes Credential Store entries.
certutil [options] -credstore [URL]
certutil [options] -credstore URL add
certutil [options] -credstore URL delete
Where:
URL is the target URL. You can also use * to match all entries or https://machine* to match a URL prefix.
*
https://machine*
add adds a credential store entry. Using this option also requires the use of SSL credentials.
delete deletes credential store entries.
-f overwrites a single entry or deletes multiple entries.
[-f] [-user] [-silent] [-anonymous] [-kerberos] [-clientcertificate clientcertID] [-username username] [-p password]
-installdefaulttemplates
Installs default certificate templates.
certutil [options] -installdefaulttemplates
[-dc DCName]
-URLcache
Displays or deletes URL cache entries.
certutil [options] -URLcache [URL | CRL | * [delete]]
Where:
URL is the cached URL.
CRL runs on all cached CRL URLs only.
* operates on all cached URLs.
delete deletes relevant URLs from the current user's local cache.
-f forces fetching a specific URL and updating the cache.
[-f] [-split]
-pulse
Pulses auto enrollment events.
certutil [options] -pulse
[-user]
-machineinfo
Displays information about the Active Directory machine object.
certutil [options] -machineinfo domainname\machinename$
-DCInfo
Displays information about the domain controller. The default displays DC certificates without verification.
certutil [options] -DCInfo [domain] [verify | deletebad | deleteall]
[-f] [-user] [-urlfetch] [-dc DCName] [-t timeout]
Tip
The ability to specify an Active Directory Domain Services (AD DS) domain [Domain] and to specify a domain controller (-dc) was added in Windows Server 2012. To successfully run the command, you must use an account that is a member of Domain Admins or Enterprise Admins. The behavior modifications of this command are as follows:1. If a domain is not specified and a specific domain controller is not specified, this option returns a list of domain controllers to process from the default domain controller.2. If a domain is not specified, but a domain controller is specified, a report of the certificates on the specified domain controller is generated.3. If a domain is specified, but a domain controller is not specified, a list of domain controllers is generated along with reports on the certificates for each domain controller in the list.4. If the domain and domain controller are specified, a list of domain controllers is generated from the targeted domain controller. A report of the certificates for each domain controller in the list is also generated.
For example, assume there is a domain named CPANDL with a domain controller named CPANDL-DC1. You can run the following command to a retrieve a list of domain controllers and their certificates that from CPANDL-DC1: certutil -dc cpandl-dc1 -DCInfo cpandl
certutil -dc cpandl-dc1 -DCInfo cpandl
-entinfo
Displays information about an enterprise Certificate Authority.
certutil [options] -entinfo domainname\machinename$
[-f] [-user]
-tcainfo
Displays information about the Certificate Authority.
certutil [options] -tcainfo [domainDN | -]
[-f] [-enterprise] [-user] [-urlfetch] [-dc DCName] [-t timeout]
-scinfo
Displays information about the smart card.
certutil [options] -scinfo [readername [CRYPT_DELETEKEYSET]]
Where: