Event ID 27 — AD CS Online Responder Service
Applies To: Windows Server 2008
The status and functioning of the Microsoft Online Responder service has dependencies on numerous features and components, including the ability to access timely certificate revocation data, the validity of the certification authority (CA) certificate and chain, and overall system response and availability.
Event Details
Product: | Windows Operating System |
ID: | 27 |
Source: | Microsoft-Windows-OnlineResponder |
Version: | 6.0 |
Symbolic Name: | MSG_W_CACONFIG_UPDATE_THREAD_FAILED |
Message: | Online Responder Services: For configuration %1, the signing certificate was not updated.(%2) |
Resolve
Request a signing certificate for an Online Responder
To resolve this problem:
- Follow the procedure in the "Renew the signing certificate for an Online Responder" section.
- If necessary, enable the renewal of the OCSP Response Signing certificate with an existing key by following the procedure in the "Enable the renewal of OCSP Response Signing certificates by using existing CA keys" section.
To perform these procedures, you must have membership in local Administrators, or you must have been delegated the appropriate authority.
Renew the signing certificate for an Online Responder
To renew the signing certificate for an Online Responder:
- Click Start, type mmc, and then press ENTER.
- If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
- On the File menu, click Add/Remove Snap-in, click Certificates, and then click Add.
- Click Computer account, and click Next.
- Select the computer hosting the Online Responder, click Finish, and then click OK.
- In the console tree, double-click Certificates, and then double-click Personal.
- In the details pane, right-click Certificates, point to All Tasks, and click Renew Certificate with New Key to start the Certificate Renewal Wizard.
- Complete the steps in the wizard.
Note: The previous procedure assumes that the OCSP Response Signing certificate was configured for manual enrollment. If the OCSP Response Signing certificate template was configured for autoenrollment, you can use the same procedure but open the Certificates snap-in for the Online Responder service account rather than the computer account.
A problem can occur when renewing an OCSP Response Signing certificate during the period between the time the certification authority (CA) certificate was renewed to the expiration date of the renewed CA certificate. The problem arises because the same CA key that was used to sign issued certificates must be used to sign the OCSP Response Signing certificates. Since this key is no longer available on the CA, no signing certificates can be issued. To overcome this limitation, the Windows Server 2008-based CA was updated to allow the renewal of OCSP Response Signing certificates by using existing keys. This feature is not enabled by default. Use the following procedure to allow the renewal of OCSP Response Signing certificates by using existing CA keys.
Enable the renewal of OCSP Response Signing certificates by using existing CA keys
To allow the renewal of OCSP Response Signing certificates by using existing CA keys:
- On the CA computer, open a command prompt window.
- Type certutil -setreg ca\UseDefinedCACertInRequest and press ENTER.
- Restart the CA service.
Note: This procedure must be performed before renewing the CA certificate.
Verify
An Online Responder serves as an intermediary between clients that need to check certificate validity and a certification authority (CA) that issues certificates and certificate revocation lists (CRLs). To verify that the Online Responder service is functioning properly, you need to isolate the Online Responder and client from the CA and any CRL distribution points to confirm that revocation checking continues to take place and that revocation data is originating only from the Online Responder. The best way to confirm this scenario is to complete the following steps that involve the CA, the client, CRL distribution points, and the Online Responder:
- Issue new certificates.
- Revoke a certificate.
- Publish a CRL.
- Remove CRL distribution point extensions from the issuing CA.
- Confirm that client computers can still obtain revocation data.
To perform these procedures, you must be a member of local Administrators on the computer hosting the Online Responder and on the client computer, and you must have Manage CA permissions on the computer hosting the CA, or you must have been delegated the appropriate authority.
Issue new certificates
To issue new certificates:
On the computer hosting the CA, click Start, point to Administrative Tools, and then click Certification Authority.
Configure several certificate templates to autoenroll certificates for a computer running Windows Vista or Windows XP Professional.
When information about the new certificates has been published to Active Directory domain controllers, open a command prompt window on the client computer and enter the following command to start certificate autoenrollment: certutil -pulse.
Note: It can take up to eight hours for information about new certificates to be replicated to Active Directory domain controllers.
On the client computer, use the Certificates snap-in to confirm that the certificates have been issued to the user and to the computer, as appropriate. If they have not been issued, repeat step 2. You can also stop and restart the client computer to initiate certificate autoenrollment.
Revoke a certificate
To revoke a certificate:
- On the computer hosting the CA, click Start, point to Administrative Tools, and then click Certification Authority.
- In the console tree, click Issued Certificates, and then select the certificate you want to revoke.
- On the Action menu, point to All Tasks, and then click Revoke Certificate.
- Select the reason for revoking the certificate, and click Yes.
Publish a CRL
To publish a CRL:
- On the computer hosting the CA, clickStart, point to Administrative Tools, and then click Certification Authority.
- In the console tree, click Revoked Certificates.
- On the Action menu, point to All Tasks, and then click Publish.
Remove all CRL distribution point extensions from the issuing CA
To remove all CRL distribution point extensions from the issuing CA:
- On the computer hosting the CA, click Start, point to Administrative Tools, and then click Certification Authority.
- Select the CA.
- On the Action menu, click Properties.
- On the Extensions tab, confirm that Select extension is set to CRL Distribution Point (CDP).
- Click any CRL distribution points that are listed, click Remove, and click OK.
- Stop and restart the CA.
- Configure a new certificate template, and complete autoenrollment again.
Confirm that client computers can obtain revocation data
To confirm that client computers can obtain revocation data:
Click Start, type mmc, and then press ENTER.
If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Continue.
On the File menu, click Add/Remove Snap-in, click Certificates, and then click Add.
Select the user or computer account to whom the certificate was issued, click Finish, and then click OK.
Open the Personal Certificates store, right-click the most recently issued certificate, point to All Tasks, and then click Export to start the Certificate Export Wizard. Export the certificate to a .cer* *file.
Open a command prompt window.
Type **certutil -url<exportedcert.cer> **and press ENTER.
Exportedcert.cer is the file name of the certificate that was exported in the previous step.
In the Verify and Retrieve dialog box that appears, click From CDP and From OCSP, and confirm that the revocation data is retrieved from the Online Responder and not from a CRL distribution point.