Monday, May 19, 2014

ID4175: The issuer of the security token was not recognized by the IssuerNameRegistry

Q: IIS threw this error and we couldn't track down the problem for days.
ID4175: The issuer of the security token was not recognized by the IssuerNameRegistry. To accept security tokens from this issuer, configure the IssuerNameRegistry to return a valid name for this issuer.

A: A lot of solutions to this problem return in Google searches.  The one that worked for us was to review the contents of the web.config.  When we copied the trustedIssuers section of the web.config into a new text file in Notepad++, we noticed two question marks inside the thumbprint.  We removed them and copy/pasted that back into the web.config and the site started working.

        <trustedIssuers>
          <add thumbprint="??373837278289473732" name="https://adfs-host/adfs/services/trust" />
        </trustedIssuers>

Monday, May 5, 2014

revocation function was unable to check revocation because the revocation server was offline

q: Suddenly (12 magical months to the day after deploying the customer's CA structure on Windows Server 2008 R2) their issued certificates are not valid.  It started on the CRM and ADFS servers and we tracked it up to the Issuing CA Server with these messages:

An error occurred during an attempt to build the certificate chain for the relying party trust certificate '---' identified by thumbprint ‘---’. Possible causes are that the certificate has been revoked, the certificate chain could not be verified as specified by the relying party trust’s encryption certificate revocation settings or certificate is not within its validity period.

Revocation status for a certificate in the chain for CA certificate 0 for --- could not be verified because a server is currently unavailable. The revocation function was unable to check revocation because the revocation server was offline. 0x80092013 (-2146885613).

Active Directory Certificate Services did not start: Could not load or verify the current CA certificate. --- The revocation function was unable to check revocation because the revocation server was offline. 0x80092013 (-2146885613).

a: Once we found this very well written article it was all clear.

  1. Boot up the offline root ca
  2. open an elevated command prompt
  3. run: certutil -crl
  4. It will issue a new CRL file here: C:\Windows\System32\CertSvr\CertEnroll\
  5. Copy that file to 2 places
  6. \\%appserverhostingyourpkiwebsite%\CertEnroll
  7. \\%issuingCAServer%\c$\Windows\System32\certsrv\CertEnroll
Then we were able to start the 'Active Directory Certificate Services' service on the Issuing CA server and all the certificates issued by that CA were valid again.