Microsoft KB Archive/271470

= Users Granted Permission to Manage the Certificate Authority Are Unable to Access It Remotely =

Article ID: 271470

Article Last Modified on 3/1/2007

-

APPLIES TO


 * Microsoft Windows 2000 Server
 * Microsoft Windows 2000 Advanced Server

-



This article was previously published under Q271470



IMPORTANT: This article contains information about modifying the registry. Before you modify the registry, make sure to back it up and make sure that you understand how to restore the registry if a problem occurs. For information about how to back up, restore, and edit the registry, click the following article number to view the article in the Microsoft Knowledge Base:

256986 Description of the Microsoft Windows Registry



SYMPTOMS
When users who have been granted the right to manage certificates on a Windows 2000 Certificate Authority (CA) attempt to remotely access the CA through the CA snap-in, they receive the following error message:

Access is Denied. 0x5 (5)



CAUSE
The CA snap-in requires users to have remote access to the following registry key on the CA:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration

If users do not have access to this registry key, they receive the error message described in the Symptoms section.



RESOLUTION
WARNING: If you use Registry Editor incorrectly, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from using Registry Editor incorrectly. Use Registry Editor at your own risk.

To resolve this issue, give the user permission to manage the CA. To grant this access to a non-administrative account, follow these steps:
 * 1) Open the CA snap-in.
 * 2) Right-click Certificate Authority Root and click Properties.
 * 3) Click the Security tab.
 * 4) Add the user who needs access and grant that user the required permissions.

The CA snap-in must be installed on the remote machine for the user to have remote access to the CA.

To give a non-administrative account permission to remotely manage a CA, follow these steps:  Open the CA, click Run, and then type Regedt32 . Navigate to the following registry key:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg\AllowedPaths

 Open the Machine key and at the bottom of the key add the following value:

SYSTEM\CurrentControlSet\Services\CertSvc\Configuration

 Click Save.

The remote user now has remote access to the CA.



STATUS
Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article.

<div class="moreinformation_section">

MORE INFORMATION
For additional information about restricting access to the registry from a remote computer, click the article number below to view the article in the Microsoft Knowledge Base:

153183 How to Restrict Access to NT Registry from a Remote Computer

Additional query words: Certificate Services 2.0

Keywords: kbcertservices kbprb kbsecconfiged KB271470

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.