J
Jonathan Forbes
Hello,
I'm working in a native 2003 AD domain. We sign and encrypt email to and
from both inter and intra-domain users. We recieve our certificates from
third party CA. These certificates have a finite time of validity and
eventually need to be renewed.
We have renewed a particular users certs in the accepted fashion; cleaned
old certs by publishing blank to GAL within outlook, created new security
settings with new certs and republished to GAL. The newly published cert has
been confirmed in AD using AD Users/Computers snap-in, as well as ADSIEdit
snap-in.
At this time only one interdomain user is able to encrypt a message to the
newly cert-ed user. 3 other interdomain users (myself included) send
encrypted messages to the user, but the user cannot open them (the ubiquitos
Cannot open this item. Your Digital ID...etc)
We have a CRL program (Tumbleweed) shimmed between Outlook and Microsoft
CAPI. as well as a Smart Card middleware program (ActivClient) handling
certs. Tumbleweed logs CRL checking for any certificate activity. When I send
an encrypted message to the user in question, the event log for Tumbleweed
fires a success audit for the certificate used to encrypt the message. The
problem is it's clearly the wrong certificate (the cert that was cleaned from
AD and deleted from my contacts list). This explains why the user cannot open
encrypted messages from me. The user can open encrypted mail from only one
intra-domain user so far; and that users Tumbleweed log shows the correct
cert being used.
I'm aware of 3 places Outlook obtains encryption certs from: AD attribute
userS/MIMECertificate...the clients contact list...and OAB. I believe I've
cleaned all these of the old cert yet my Outlook client continues to use it,
and the Outlook client of at least one user is using the new one.
Since it seems client-centric, what must be done on an Outlook client to
definitively ensure that only one (the newest) cert is used for each AD user
object?
I'm working in a native 2003 AD domain. We sign and encrypt email to and
from both inter and intra-domain users. We recieve our certificates from
third party CA. These certificates have a finite time of validity and
eventually need to be renewed.
We have renewed a particular users certs in the accepted fashion; cleaned
old certs by publishing blank to GAL within outlook, created new security
settings with new certs and republished to GAL. The newly published cert has
been confirmed in AD using AD Users/Computers snap-in, as well as ADSIEdit
snap-in.
At this time only one interdomain user is able to encrypt a message to the
newly cert-ed user. 3 other interdomain users (myself included) send
encrypted messages to the user, but the user cannot open them (the ubiquitos
Cannot open this item. Your Digital ID...etc)
We have a CRL program (Tumbleweed) shimmed between Outlook and Microsoft
CAPI. as well as a Smart Card middleware program (ActivClient) handling
certs. Tumbleweed logs CRL checking for any certificate activity. When I send
an encrypted message to the user in question, the event log for Tumbleweed
fires a success audit for the certificate used to encrypt the message. The
problem is it's clearly the wrong certificate (the cert that was cleaned from
AD and deleted from my contacts list). This explains why the user cannot open
encrypted messages from me. The user can open encrypted mail from only one
intra-domain user so far; and that users Tumbleweed log shows the correct
cert being used.
I'm aware of 3 places Outlook obtains encryption certs from: AD attribute
userS/MIMECertificate...the clients contact list...and OAB. I believe I've
cleaned all these of the old cert yet my Outlook client continues to use it,
and the Outlook client of at least one user is using the new one.
Since it seems client-centric, what must be done on an Outlook client to
definitively ensure that only one (the newest) cert is used for each AD user
object?