Hello Daisy, very nice to meet you and thank you for your response.
At the time of my maintenance, I had both the Root and Subordinate servers online. Even though the Root CA was online, I was intending to follow the case where the Root CA was offline. Had the CA Certificate Request dialog appeared, I would click "Cancel" which would then write the CSR to the root of the C drive (default).
Per your guidance, I confirmed that the Domain Admins group was granted Read/Write/Enroll permissions on the Subordinate Certification Authority template (I was using my domain admin account). The part that was weird - and what I keep going back to - is the fact that the Subordinate CA certificate had been renewed three times since the creation of this CA environment. We have what I would call a disciplined change process, and I cannot find anything that would suggest changes had been made to the configuration of templates or any component of AD Certificate Services. So I don't understand how any of this would fail given that nothing* has changed.
* Other than the installation of the 2023-02 security roll-up.
Despite all this, I do have good news to report. Your second suggestion to resolve this issue - making a registry change - ultimately led to a successful renewal of the Subordinate CA certificate. I'll outline the steps I followed below.
- Before doing anything, I created a full backup of the existing CA environment on the Subordinate CA. Everything that could be backed up was backed up.
- I then set the registry value for "SetupStatus" to "1". The original value was set to "9".
(HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration{server}) - After making this change, I tried to renew the Subordinate CA certificate using the Certification Authority MMC. It failed as described in my original post - the service stops, I choose not to create new keys, click OK, and the CA Certificate Request dialog doesn't appear and the service restarts.
- Thinking that a restart is needed, I give the server a reboot and try again using the GUI. Nope, same problem.
- I then think to see if I'm getting the same error, and I discover I'm not. The new error reads: CertUtil: -renewcCert command FAILED: 0x80090016 (-2146893802 NTE_BAD_KEYSET) CertUtil: Keyset does not exist
Of course, this looks very bad and I think that I've completely borked my CA environment. After checking the certificates, they're all still shown as valid and I don't see any scary error messages. (Whew!)
At this point, I figure I might as well restore things back to their original error state. (Thank you for the reminder to create a backup!) Everything restores as expected and just to confirm I'm back at the original error message, I run the renewal process again.
But this time, it works.
I get the CA Certificate Request dialog box, I save the CSR locally, I run through the signing process on the Root CA and import the signed certificate into the Subordinate CA. I've also confirmed that the "SetupStatus" registry key is still set to "1"
I honestly don't know why it worked, or how the restore back to the original error state fixed things. You'd think that restoring back to a "bad" state would result in the same error, right?
Thank you for your help with this, I really, REALLY appreciate it. Hopefully this helps someone else.
-Todd