CA Certificates
Last updated
Was this helpful?
Last updated
Was this helpful?
The CA Certificates
page provides a list of enumerated certificate authority certificates in entire Acitve Directory. The list contains the Thumbprint
, Root Certificate
, In NtAuth Store
and Subject Name
columns.
Details page contains the Risk Score
of the certificate authority certificate and Information
pane.
You can analyze objects in the Graph module
by clicking the Visualize
button on the upper left side of the Information Pane
.
Information pane contains attributes below about certificate authority certificate object.
Thumbprint
The hash value computed over the complete certificate, which includes all its fields, including the signature.
Serial Number
A number that uniquely identifies the certificate and is issued by the certification authority.
Start Date
Issue date of the CA certificate.
End Date
Expiry date of the CA certificate.
Version
Version of the certificate.
Signature Algorithm
The algorithm used to create the signature of a certificate.
Belong To
The owner computer object of the certificate.
Subject Name
The subject name of the CA certificate.
Issuer Name
The name of the certificate issuer.
Certificate Chain
The list of certificates that start from a server's certificate and terminate with the root certificate
Root Certificate
Whether the CA certificate belongs to a root CA.
Enrollment Certificate
Whether the CA certificate can process certificate requests and issue certificates.
In NTAuth Store
Whether the CA certificate in the NTAuthCertificates
container. This object defines one or more CA certificates in its cacertificate
attribute and AD uses it during authentication. The domain controller checks if NTAuthCertificates
object contains an entry for the CA specified in the authenticating certificate's Issuer field. If it is, authentication proceeds. If the certificate is not in the NTAuthCertificates
object, authentication fails.
Key Usage
Key usage extensions define the purpose of the public key contained in a certificate. You can use them to restrict the public key to as few or as many operations as needed.