The change to the NTAuth note (issue and merge) still got it wrong. It‘s not the root CA certificate that needs to go into the NTAuth container. It‘s the DC certs‘ issuing CA. That‘s important to note, because that’s a different CA/certificate in multi-tier PKIs.
For the best PKI technical reference, grab this book .
⚠Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.
@Skorfulose - Thank you for your feedback. Can you please confirm if the below note will be the correct one? Or please let me know how that should look like so that I can create the PR for the same.
The domain controller's certificate must chain to a root in the NTAuth store. By default, the Domain Controller Certificate issuing CA certificate is added to the NTAuth store. If you are using a third-party CA, this may not be done by default. If the domain controller certificate does not chain to a root in the NTAuth store, user authentication will fail.
*Please note: I am not an expert or experienced in this topic, so I might not know enough facts to be certain what the correct phrasing should be.
@joinimran : if I have read the text correctly, you are proposing this change:
- By default, the Active Directory Certificate Authority's root certificate is added to the NTAuth store.
+ By default, the Domain Controller Certificate issuing CA certificate is added to the NTAuth store.
The point I find to be a bit challenging for my understanding, is the effective meaning of: issuing
For me to make sense of that, it would need to be either:
Maybe I could ask @JohanFreelancer9 for a quick feedback, in case this would be more clear to him. For all I know, your current suggestion could be correct.
edit: Feedback from the ticket author, @Skorfulose , would also be helpful.
@illfated - valid point. However, I would prefer to wait for @Skorfulose and @joinimran's feedback and the PR to be created. Thanks.
@illfated , @JohanFreelancer9 - I am also waiting for feedback from @Skorfulose. This rephrasing is a bit confusing for me as well.
@Skorfulose - Waiting for your feedback to further look into these issues.
Thanks
Imran.
Hey all, thanks for your effort on this. I think clarification on this technical peculiarity will help others to better troubleshoot deployment problems.
The complexity describing the NTAuth issue comes from the multiple possible scenarios:
So to reflect that, here is my proposal:
- The domain controller's certificate must chain to a root in the NTAuth store. By default, the Active Directory Certificate Authority's root certificate is added to the NTAuth store. If you are using a third-party CA, this may not be done by default. If the domain controller certificate does not chain to a root in the NTAuth store, user authentication will fail.
+ The CA issuing the domain controller certificate must be included in the NTAuth store. By default, the Active Directory Certificate Authority's root certificate is added to the NTAuth store. If you are using a multi-tier CA hierarchy or a third-party CA, this may not be done by default. If the Domain Controller certificate does not directly chain to a CA certificate in the NTAuth store, user authentication will fail.
Maybe you might also want to add instructions how to check:
certutil -viewstore -enterprise NTAuth
└─ Root / Issuing Certificate Authority <-- This certificate is required in the NTAuth store
└─ Domain Controller Certificate
└─ Root Certificate Authority
└─ Intermediate Certificate Authority
└─ Issuing Certificate Authority <-- This certificate is required in the NTAuth store
└─ Domain Controller Certificate
Thank you very much for the detailed feedback, @Skorfulose . Those points seem quite legit to me, aside from the fact that I am not an expert in this topic.
@joinimran : Do you find the reply to be practical enough to you, so you could make a Pull Request based on that material?
Thanks, @Skorfulose for sharing the detailed information. This was something complex which you have made simple. I have updated the doc and created a PR for the same. Let's see how the doc author will respond.
(ref. #8936 )
Closing via #8936
Thank you