Chain or path validation is the process by which end-entity (user or computer) certificates and all certification authority (CA) certificates are processed hierarchically until the certificate chain terminates at a trusted, self-signed certificate. Typically, this is a root CA certificate. Active Directory Certificate Services (AD CS) startup can fail if there are problems with availability, validity, and chain validation for the CA certificate.
Reissue certificates in the chain for a revoked CA certificate
Although it is not common for a certification authority (CA) certificate to be revoked. To resolve this situation:
Confirm that the CA certificate has been revoked.
Ask a CA administrator if the revocation was deliberate or unintended. If the certificate was revoked intentionally, then no further action is needed.
If it was revoked unintentionall, the CA certificate and every certificate in the branch must be reissued through enrollment or autoenrollment.
If the problem persists, enable CryptoAPI 2.0 Diagnostics to identify and resolve additional errors that might be causing the problem.
To perform these procedures, you must have Manage CA permission, or you must have been delegated the appropriate authority.
Confirm that a CA certificate has been revoked
To confirm that a CA certificate has been revoked:
Open a command prompt window.
Type certutil -urlfetch -verify<CAcert.cer> and press ENTER.
Replace CAcert.cer with the name of the CA certificate file.
To enroll for a CA certificate
To enroll for a CA certificate:
On the computer hosting the CA, click Start, point to Administrative Tools, and then click Certification Authority.
Right-click the CA name, select All Tasks and click Request CA Certificate.
Select the request file and the name of the CA or computer hosting a parent CA to process the request and complete the enrollment.
After the CA certificate has been installed, you will have to reissue all certificates that had been issued using the revoked CA certificate.
Enable CryptoAPI 2.0 Diagnostics
To enable CryptoAPI 2.0 Diagnostics:
On the computer hosting the CA, click Start, point to Administrative Tools, and click Event Viewer.
In the console tree, expand Event Viewer, Applications and Services Logs, Microsoft, Windows, and CAPI2.
Right-click Operational, and click Enable Log.
Click Start, point to Administrative Tools, and click Services.
Right-click Active Directory Certificate Services, and click Restart.
Scan the CAPI2 diagnostics log for information that relates to this error.