在 NPS 服务器中测试吊销证书

发布于 2025-01-18 22:44:49 字数 614 浏览 0 评论 0原文

我正在Windows Server 2022中测试NPS服务器(带有证书),设置为:

  • Windows Server 2022 - > AD DS(test.lab),AD CS,NPS
  • Windows 10 - >加入

Windows Server 2022中的域证书:

certs

nps configuration:

nps_eap

结果:

test_connection

连接是成功的,但是现在,我试图撤销拒绝该连接的证书,但我不知道如何遵循步骤...我试图用证书授权撤销证书,但没有工作

I am testing a NPS server in Windows Server 2022, with PEAP (with certificates), the setup is:

  • Windows Server 2022 --> AD DS (test.lab), AD CS, NPS
  • Windows 10 --> Joined to domain

Certs in Windows Server 2022:

certs

NPS configuration:

nps_eap

Result:

test_connection

The connection is succesfull, but now, I am trying to revoke the certificate for reject the connection but I dont know how are following steps... I have tried to revoke the certificate with Certificate Authority, but doesn't work

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(1

听不够的曲调 2025-01-25 22:44:49

要启用吊销检查,请尝试以下操作:

  • 管理员必须启用RootCertificateNameToAccept参数并设置注册表项以启用功能。
  • 要为 IKEv2 VPN 连接启用 CRL(证书吊销列表),
  • 请打开 PowerShell 窗口并执行以下命令:
_$Thumbprint = ‘Root CA Certificate Thumbprint’_
_$RootCACert = (Get-ChildItem -Path cert:\LocalMachine\root | Where-Object {$_.Thumbprint -eq $Thumbprint})_
_Set-VpnAuthProtocol -RootCertificateNameToAccept $RootCACert -PassThru_
_New-ItemProperty -Path ‘HKLM:\SYSTEM\CurrentControlSet\Services\RemoteAccess\Parameters\Ikev2\’ -Name CertAuthFlags -PropertyTYpe DWORD -Value ‘4’ -Force_
_Restart-Service RemoteAccess -PassThru_

吊销证书

  • 管理员必须首先吊销颁发 CA 上的证书。

打开提升的命令窗口并输入以下命令:

_certutil -urlcache * delete_
_certutil -setreg chain\ChainCacheResyncFiletime @now_
  • 如果上述解决方案不起作用,请尝试以下步骤:

单击开始 ->管理工具 ->点击证书颁发机构->扩展您的 CA ->单击颁发的证书文件夹 ->选择颁发证书->点击所有任务->点击撤销证书->在证书吊销对话框中->选择停止操作->单击“确定”

参考:

证书吊销|理查德·希克斯咨询公司 (richardhicks.com)

如何停用 Windows Enterprise 证书颁发机构以及如何删除所有相关对象 - TechNet 文章 - 美国(英语)- TechNet Wiki (microsoft.com)

To enable revocation check, please try the following:

  • Administrators must enable the RootCertificateNameToAccept parameter and set a registry key to enable functionality.
  • To enable CRL (Certification revocation List) for IKEv2 VPN connections,
  • Open a PowerShell window and below commands:
_$Thumbprint = ‘Root CA Certificate Thumbprint’_
_$RootCACert = (Get-ChildItem -Path cert:\LocalMachine\root | Where-Object {$_.Thumbprint -eq $Thumbprint})_
_Set-VpnAuthProtocol -RootCertificateNameToAccept $RootCACert -PassThru_
_New-ItemProperty -Path ‘HKLM:\SYSTEM\CurrentControlSet\Services\RemoteAccess\Parameters\Ikev2\’ -Name CertAuthFlags -PropertyTYpe DWORD -Value ‘4’ -Force_
_Restart-Service RemoteAccess -PassThru_

Revoking certificates

  • The administrator must first revoke the certificate on the issuing CA.

Open a elevated command window and enter the below commands:

_certutil -urlcache * delete_
_certutil -setreg chain\ChainCacheResyncFiletime @now_
  • If the above solution doesn't work, please try the following steps:

Click start -> Administrative Tools -> Click Certification Authority -> Expand your CA -> Click the Issued Certificates folder -> Select issues certificates -> Click All Tasks -> click Revoke Certificate -> In the Certificate Revocation dialog box -> select Cease of Operation -> click OK

References :

certificate revocation | Richard M. Hicks Consulting, Inc. (richardhicks.com).

How to Decommission a Windows Enterprise Certification Authority and How to Remove All Related Objects - TechNet Articles - United States (English) - TechNet Wiki (microsoft.com).

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文