Partager via


Adding certificates to the local certificates store and setting local policy using a command line – System Center Updates Publisher example

Certificates are becoming more and more the rage for both SCCM and OpsMgr.  The documentation for both products provides a great amount of information about adding certificates to the local certificates store using the MMC certificates MMC snap-in.  Follow the documentation and you should be good to go.  But, depending on what is being done, the MMC approach may require lots of effort to visit all of the systems needing the certificates and importing manually.  Is there an easier way?  Adding certificates via group policy is one option but that likely will require involving other teams.  It may be simpler to just do the work yourself. 

An easy way to accomplish the certificate import in bulk without the need to manually visit each system is to use the utility certutil to handle the import.  The command line used with certutil can be delivered via script or via SCCM package to target systems.  So, how do you import a certificate to the local certificate store using certutil?  Let’s consider an example with System Center Update Publisher (SCUP).  With SCUP, the certificate used for signing updates needs to be placed in the local Trusted Publishers certificate store.  If using a certificate from a 3rd party like Verisign, the certificate from the intermediate CA may need to be added as well.  Regardless, to construct the command line we need to know two things – the name of the store where the certificate should be imported and the name of the certificate file.

Examples are plentiful of using certufil to add certificates to local certificate stores.  The one element that isn’t widely documented (at least i didn’t find it widely documented) is where to find the name of the certificate store.  But, wait – isn’t the name of the certificate store the same as what is listed in the certificates MMC snap-in?  Sometimes, but not always.  An example is the personal store.  This store is referred to as ‘my’ by the system.  If you try to use ‘personal’ with certutil, the command may complete but, check the store – no certificate is listed.  This demonstrates that there are two names for each cert store – the ‘user friendly’ name in the MMC and the name used by the system.  You need the name used by the system with certutil.  So, how do we find the system name for a particular cert store?  This is what took me some time – but it’s fairly obvious once you find it.  Just check the registry – HKLM\Software\Microsoft\SystemCertificates and you will see a full list of all stores defined on the system current – as shown below.

image

Now, remember – there are two certificate stores – the one for the local computer (shown above) and the one for the logged in user.  If you want to see the stores available for the logged in user, just go to a different registry hive - HKCU\Software\Microsoft\SystemCertificates

OK, so now that we know the system store names, what command line should we use to import the certificate.  Very simple.  Remember our example with SCUP.  Per my previous blog entry on using Verisign certificates with SCUP and the configuration required there, we need to add the certificate to the ‘Trusted Publishers’ store – known in the registry as the TrustedPublishers store.  We may also need to add the intermediate trust certificate to the ‘Intermediate Certificate Authorities’ store.  On Windows 2008 systems, it seems this certificate gets added automatically when importing into Trusted Publishers.  On Windows 2003 systems, this doesn’t seem to be the case.  Again, looking in the registry and doing a bit of investigative work, we are able to see that the ‘Intermediate Certification Authorities’ store system name is ‘CA’.  So, we have at least the first and possibly the second command line we need to run.

Certutil –addstore –f “TrustedPublisher” <pathtocertificatefile>
Certutil –addstore –f “CA” <pathtocertificatefile>

Lets break down the command line.  The –addstore option is self-explanatory.  The –f option force overwrites any certs currently in the store and in conflict.  The system name of the certificate store is next followed by the certificate file to be imported – generally in .cer format.  There are other options too, such as –user to use the local users certificate store. 

OK, with the certificates added to the local store and continuing with your SCUP example, now we have to modify local policy via command line to enable the ‘allow signed updates from an intranet Microsoft update service location’.  Like many policies, this setting is just a registry entry.  When enabled, the value AcceptTrustedPubliserCerts is added to the registry with a value of 1.  So, setting this policy is really just a matter of importing this registry value to desired systems.  Again, something easily done with a command line which can be executed by script or through an SCCM package.  The registry entry in question is located at HKLM\Software\Policies\Microsoft\Windows\WindowsUpdate as shown

image

When setting the policy through the MMC this setting is added also under the HKCU hive but, in my testing, setting the value as shown above is sufficient.  A further note of caution – setting this value will only remain in effect so long as the policy is NOT overwritten from the domain or direct edit in local policy MMC. Further, it appears from my testing that if you make this registry edit directly the change will NOT show up in the local policy UI.  Use this method for setting this or any other local policy only when the traditional methods are not workable.

Comments

  • Anonymous
    October 16, 2011
    The comment has been removed

  • Anonymous
    August 17, 2012
    Hey what is the difference of sore named "MY" compared to others, would the same command work if i want to import a server certificate to "MY" store??

  • Anonymous
    September 23, 2013
    I need to get a certificate into HKEY_CURRENT_USERSoftwareMicrosoftSystemCertificatesRootCertificates for all my users.  I've tried importing it with a .reg file and also adding it via group policy.  Group policy won't apply the entry.  I can use the .reg file but shortly after the import adds the key, it is removed automatically.  I'm not sure why.  Am I missing something?

  • Anonymous
    September 24, 2013
    I looked again at the group policy preference I was using.  There is an option "Run in logged-on user's security context (user policy option)" that I enabled and now the registry entry is persisting

  • Anonymous
    October 04, 2013
    Hi Hollisorama, what syntax in reg file that you use to import the cert?  I have task to add cert to CURRENT USER.  The app doesn't work when the cert is in LOCAL MACHINE. Thanks for your help.