I just migrated our domain certificate authority from Windows 2012 to Windows 2022. This was done by standing up an entirely new CA. Everything was fine until I recently did some cleanup in Active Directory to remove remnants of the old CA (as well as some other old CAs that were never cleaned up apparently). Note, the old CA servers have been offline for months without issue.
Now, suddenly, when accessing systems still using certs from the old CA (which should still be valid until their expiration) we are getting invalid cert errors citing messages such as:
- The host certificate chain is not complete, or
- The issuer of this certificate could not be found.
Further, when I view the certificate chain, the general tab states the cert was issued by our old CA, but the Certification Path tab now only lists the endpoint cert. The the issuing CA is no longer listed there. That explains the error, but I don't understand why this is happening.
How does a cert chain suddenly disappear on a cert? I thought that information was static. Further, I just don't understand why AD would even be involved in this. The CA root/issuing certs still exist on the workstations.
Any thoughts on why this is occurring and how to fix it, outside of generating new certs from the new CA? That will be a large task.
------EDIT------
I just realized what might be the problem. It looks like the issuing CA crl file is missing on the http CDP. The root crl is there.. I thought I brought this over. Clients must have been using the ldap CDP until I performed that cleanup. Unfortunately the old CA no longer exists unless I can find it in a backup somewhere. Will update if I find this missing crl!