Certificate templates for Active Directory Certificate Services (AD CS) have multiple values related to versioning. In the Certificate Templates console, you can see two versioning attributes:
· Schema Version - This defines the options available in a Certificate Template. If you search for information about certificate template versions (such as https://technet.microsoft.com/en-us/library/cc725838(v=ws.11).aspx), the reference to different versions is the schema version. These schema versions are consisten across Windows servers.
·
Version - This number is unique for your AD CS
implementation. When you modify the template, this version number is
incremented.
Byron Web Server
template: Schema Version 2, Version 100.3 |
The version number for your certificate templates is composed of a major
version number and a minor version number. In this example:
· Major version: 100
· Minor version: 3
When you make any edit to a certificate template, the minor version number is
incremented. Even minor edits such as changing the security configuration for
the certificate template increment the minor version number. This number is
primarily for your own auditing purposes to identify that a change has been
made. Incrementing the minor version number has no immediate impact on clients
using autoenrollment.
When you right-click a certificate template and select Reenroll All
Certificate Holders, the major version number is incremented and minor
version number is reset to zero. Clients using autoenrollment see that major
version has been incremented and renew their certificate using the updated
certificate template.
If you use ADSIedit to view the properties of a certificate template, you can
see the major and minor version numbers stored as the following attributes:
· revision
· msPKI-Template-Minor-Revision
If you manually edit the revision attribute and increment the value, it will
trigger an update for autoenrollment clients just as if you had selected the Reenroll
All Certificate Holders option in the Certificate Templates Console.
On the client side, autoenrollment is triggered by a scheduled tasks in \Task
Scheduler Library\Microsoft\Windows\CertificateServiceClient. The triggers
for enrollement are:
SystemTask (for computer certificates): At startup, repeat every 8 hours
UserTask (for user certificates): At sign in, repeat every 8 hours
If you are testing, you can manually run these tasks rather than restarting the
computer or signing out and signing back in.
0 Comments