Partager via


Event ID 81 — AD CS Key Archival and Recovery

Applies To: Windows Server 2008

Active Directory Certificate Services (AD CS) requires key recovery agent certificates, exchange (XCHG) certificates, and keys in order to support key archival. The functioning of key recovery agent certificates, XCHG certificates, and the cryptographic service providers (CSPs) needed to create them is critical to a public key infrastructure.

Event Details

Product: Windows Operating System
ID: 81
Source: Microsoft-Windows-CertificationAuthority
Version: 6.0
Symbolic Name: MSG_E_KRA_NOT_ADVANCED_SERVER
Message: Active Directory Certificate Services key archival is only supported on Enterprise and Datacenter editions of Windows Server. %1

Resolve

Use a version of Windows Server 2008 that supports AD CS key archival

Key archival is available only with certification authorities (CAs) that are installed on computers running the Windows Server 2008 Enterprise operating system or the Windows Server 2008 Datacenter operating system.

Confirm that the CA you are using is installed on a computer running Windows Server 2008 Enterprise or Windows Server 2008 Datacenter.

To identify the Windows edition:

  1. Open an Explorer window, right-click Computer, and click Properties.
  2. In the section titled Windows edition, confirm that one of the versions that support key archival is listed.

Verify

To perform this procedure, you must have Manage CA permission, or you must have been delegated the appropriate authority.

To confirm that key archival and recovery is working properly:

  1. On the computer hosting the CA, click Start, point to Administrative Tools, and click Certification Authority.
  2. In the console tree, right-click the name of the certification authority (CA), and then click Properties.
  3. Click the Recovery Agents tab.
  4. Confirm that all key recovery agent certificates are listed as Valid.
  5. In the Certificate Templates container, confirm that an encryption certificate has the option Archive subject's encryption private key configured on the Request Handling tab.
  6. Open the Certificates snap-in for a user account that has permissions to enroll for a certificate based on this certificate template.
  7. In the console tree, right-click Personal, point to All Tasks, and click Request New Certificate to start the Certificate Enrollment wizard.
  8. Enroll for a certificate based on the encryption template, and confirm that the enrollment completes successfully and no errors are reported.
  9. When the enrollment is complete, open the Certification Authority snap-in.
  10. In the console tree, click Issued Certificates.
  11. Locate the entry for the certificate that was just issued, and add the Archived Key column to the snap-in display list.
  12. Confirm that the word Yes appears in the Archived Key column for the certificate that was just issued.

AD CS Key Archival and Recovery

Active Directory Certificate Services