Microsoft KB Archive/331333

= User cannot gain access to certificate functionality after password change or when using a roaming profile =

Article ID: 331333

Article Last Modified on 9/14/2007

-

APPLIES TO


 * Microsoft Windows XP Professional

-



This article was previously published under Q331333



Important This article contains information about how to modify the registry. Make sure to back up the registry before you modify it. Make sure that you know how to restore the registry if a problem occurs. For more information about how to back up, restore, and modify the registry, click the following article number to view the article in the Microsoft Knowledge Base:

256986 Description of the Microsoft Windows registry



SYMPTOMS
When a user tries to use certificate functionality after they change their password or when they use a roaming profile, they may lose access to this certificate functionality. Certificate functionality that may not work as before includes the following:
 * Accessing files that are encrypted with Encrypting File System (EFS)
 * Accessing a secure Web page that requires certificate authentication
 * Signing e-mail with Secure/Multipurpose Internet Mail Extensions (S/MIME)

When they try to access a secure Web site, the following error message is logged:

Schannel Event: 36870

A fatal error occurred when you try to access the SSL client credential private key. The error code returned from the cryptographic module is 0x80090016.



CAUSE
This problem occurs only if the client user account is in a Microsoft Windows NT 4.0 domain and if they are logged on to a Microsoft Windows XP Professional workstation. The Windows XP version of the Data Protection API (DPAPI) function helps to protect EFS private keys and other data that you want to keep secure. The recovery functionality of DPAPI is not supported for users who are members of domains that are running Microsoft Windows NT 4.0 and earlier.



RESOLUTION
To maintain client access to certificate functionality after users change their passwords or when they use roaming profiles, upgrade the domain to Active Directory directory service. Active Directory domains provide a mechanism that helps to protect the DPAPI master key with a public/private key pair. (The DPAPI master key is used to help protect EFS private keys and other certificate-based functions.)

In a Windows NT 4.0 domain, the ability to restore access to the certificate keys and data is located on the workstation. This is not the case in a Microsoft Windows 2000 domain. Because the recovery mechanism is not located on the workstation, Windows 2000 domains provide a significant additional level of protection for certificates if the workstation is physically compromised.

Although you only have to upgrade a single domain controller to take advantage of the DPAPI domain recovery mechanism, consider upgrading at least two domain controllers for fault-tolerance purposes.

It is highly recommended that you plan your Active Directory before you implement it. For more information about Active Directory design, visit the following Microsoft Web site:

http://www.microsoft.com/technet/prodtechnol/windows2000serv/technologies/activedirectory/plan/bpaddsgn.mspx



WORKAROUND
To work around this problem, install Windows XP Service Pack 1 (SP1) or later on the client workstation, and then create the following registry entry to emulate Windows 2000 behavior.

Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall your operating system. Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk. Follow these steps, and then quit Registry Editor:  Click Start, click Run, type regedit, and then click OK. Locate and then click the following key in the registry:

 

 On the Edit menu, point to New, and then click DWORD value. Type MasterKeyLegacyNt4Domain, and then press ENTER. On the Edit menu, click Modify.</li> Type 1, and then click OK.</li></ol>

After you create this entry, the client will determine if the user is a member of a Windows NT 4.0 domain. If they are a member, the Windows XP client will emulate the Windows 2000 behavior, and DPAPI will give users with changed passwords access to their keys.

Note If you work around this problem by editing the registry, you only change the behavior that is described in the Symptoms section from the time that you make the registry change. Any password changes that were made before the change to the registry are not be undone and you will still receive an &quot;access denied&quot; error message when you open the EFS file.

Important security implications
Using this registry entry substantially decreases the security of a physically compromised computer. An attacker with physical access to the computer could access some or all EFS-encrypted files and any Certificate private keys on it.

Recover access to the files after a password change
To regain access to the certificate functionality on an individual workstation after a password change, change the password back to the password that was used when the files were last encrypted.

Note These steps only change the password that you use to log on to your computer. They do not change your domain password.
 * 1) Log on to the computer as the user with the current password.
 * 2) Click Start, and then click Control Panel.
 * 3) Double-click User Accounts.
 * 4) Click to select your user name.
 * 5) Click Reset password.
 * 6) Type your original password in the New password text box, and then type the password in the Confirm new password text box. Click OK.
 * 7) Restart your computer.

<div class="status_section">

STATUS
This behavior is by design.

<div class="moreinformation_section">

MORE INFORMATION
The behavior that is described in the &quot;Symptoms&quot; section of this article applies only to users who are members of a Windows NT 4.0 domain and who log on to computers that run Windows XP. The behavior of Windows XP Professional clients that are members of a workgroup or of a Windows 2000 Active Directory domain differs significantly from the description in this article.

For more information about DPAPI in Windows XP, visit the following Microsoft Web site:

http://msdn2.microsoft.com/en-us/library/ms995355.aspx

For more information about troubleshooting DPAPI issues, including loss of access to a private key or EFS files, click the following article number to view the article in the Microsoft Knowledge Base:

309408 Troubleshooting the Data Protection API (DPAPI)

Keywords: kbprb KB331333

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.