Windows Certutil Sha256

  1. Sha256sum Windows Certutil
  2. Certutil Hashfile Sha256
  3. Certutil Command Windows 10
  4. Certutil Sha256
  5. Windows 7 Certutil Sha256
  6. Windows Certutil Md5
  1. Since SHA1 became insecure and everyone around the web is forcing the change to higher security standards such as SHA256, SHA384 or SHA512 Windows Administrators should also update their internal Microsoft Active Directory Certificate Services  to force higher cryptographic provider.
  2. The following command-line syntax is to be used to calculate the SHA256 checksum of a file using Certutil.exe from a Command Prompt window. Certutil.exe -hashfile filename SHA256. If you want to implement Certutil.exe in your right-click menu, here is a VBScript that exactly does it. Copy the following VBScript code to Notepad.
  3. Press the Windows key. Type PowerShell. Select Windows Powershell. Press Enter key. Paste the command. Get-FileHash C:UsersDonaldDownloadsFile-to-be-checked-by-sha256.exe Format-List. Replace File-to-be-checked-by-sha256.exe by the name of your file to be checked. Replace the path to your path where the file is. Press Enter key.

Mar 31, 2018  This tutorial demonstrates how to verify Hash utilize Certutil in Windows 10. Feel free to comment, like, and subscribe. Command: CertUtil -hashfile 'file name' SHA256 (change the algorithm if it. May 14, 2017  Hello! I need to use this command-line program to get the MD5 hash over a given file in a Microsoft Windows Server 2003 R2, but when I try it this command: certutil -hashfile file.txt md5 I get this error: Expected no more than 1 args, received 2 CertUtil: Too many arguments If I repeat the. Hi, It seems that the certutil on Windows server 2003. Sep 30, 2010  UPDATE (2/8): Based on some recent questions, additional information has been posted about SHA2 and Windows. Introduction We’ve recently received a couple of requests from customers around the functionality of SHA-256 when running on Windows XP and 2003. This has been more important recently, as NIST has recommended the migration off of SHA-1 by end. Mar 09, 2017  Enter certutil, a command-line tool built into Windows. Certutil has many functions, mostly related to viewing and managing certificates, but the –hashfile subcommand can be used on any file to get a hash in MD5, SHA256, or several other formats.

UPDATE (2/8): Based on some recent questions, additional information has been posted about SHA2 and Windows.

We’ve recently received a couple of requests from customers around the functionality of SHA-256 when running on Windows XP and 2003. This has been more important recently, as NIST has recommended the migration off of SHA-1 by end of the year. More details about the NIST recommendation can be found in SP 800-78-2 and SP 800-57. Hopefully this blog post can help clear up the confusion surrounding scenarios that work and the ones that don’t.

Prior to Windows XP Service Pack 3, there was no SHA2 functionality within Windows XP. With the release of Service Pack 3 some limited functionality was added to the crypto module rsaenh.dll. This includes the following SHA2 hashes: SHA-256, SHA-384, SHA-512. SHA-224 was not included.

Windows Server 2003 Service Pack 2 does not ship with support for SHA2. This limitation can become an important concern when processing smart card logons and for mutual TLS authentications to web servers. As unlike other technologies, smart card logon and mutual TLS both use strict revocation checking; so should either the certificate itself or the revocation information (CRL/OCSP) use SHA2, the logon would fail.

KB 938397

Though support SHA2 is not included in Windows Server 2003 Service Pack 2, it is available for download. KB 938397 will bring Windows Server 2003 to the same level of functionality as Windows XP with Service Pack 3. KB 938397 is not available via Windows Update; it needs to be requested via the “View and request hotfix downloads” link on the support page. Note, KB 938397 is also offered for Windows Server 2003 Service Pack 1.

KB 968730

With the release of Windows Server 2008 it was found that Windows XP Service Pack 3 and Windows Server 2003 Service Pack 2 with KB 938397 were unable to request certificates from a Windows Server 2008 (and 2008 R2) certificate authority (CA) who’s certificate was signed with a SHA2 hash. KB 968730 was release to address this issue. Incidentally, KB 968730 completely supersedes KB 938397; so if a Windows Server 2003 Service Pack 2 system would need to both enroll from a SHA2 certificate authority and process SHA2 certificates, only KB 968730 would need to be installed. As before, KB 968730 is not available via Windows Update; it needs to be requested via the “View and request hotfix downloads” link on the support page. Note, KB 968730 is not offered for Windows Server 2003 Service Pack 1.

Starting with Windows Vista and Server 2008, the Cryptography Next Generation (CNG) Suite B algorithms (including SHA2) are included in the operating system. It is worth noting that even though the algorithms are available, it is up to the individual applications to implement support.

Besides logon, another very popular use for smart cards is S/MIME. But before diving into Outlook and S/MIME, the following warning should be given: Regardless of the functionality Windows and Outlook provide; in order for mail to be delivered between two users, there are any number of spam filters, relays, mailboxes, etc between sender and recipient. Each of these can be made by a wide range of vendors; running on a wide range of platforms. So before deploying SHA2, testing should be done against one’s own email infrastructure, in addition to the email infrastructure of external organizations from whom S/MIME signed mail needs to be exchanged with.

All those warnings aside, the basic functionality for Outlook is a follows. Outlook 2003, 2007, and 2010 running on Windows XP Service Pack 3 can sign and validate certificates when that certificate itself is SHA2 signed. Outlook 2003, 2007, and 2010 running on Windows XP Service Pack 3 cannot validate email messages when the message itself is SHA2 signed (regardless of the certificate used). Outlook 2003, 2007, and 2010 running on Windows XP Service Pack 3 cannot sign a message with SHA2; only SHA-1 and MD5 are available.

In order to validate SHA2 messages, Windows Vista with Outlook 2003 (or newer) is needed. In order to both sign and validate SHA2 messages, Windows Vista or 7 with Outlook 2007 or 2010 is needed.

For organizations looking to deploy SHA2 or organizations that interact with 3rd parties that will soon begin using SHA2, the following is recommended.

  • If Windows XP is used in the environment, Service Pack 3 should be deployed. In addition to SHA2 functionality, Service Pack 3 is currently the only Windows XP service pack that is supported.
  • If Windows XP systems would need to enroll in certificates from a SHA2 certificate authority, KB 968730 should be deployed.
  • If Windows Server 2003 is used in the environment, Service Pack (1 or 2) and KB 938397 should be deployed.
  • If Windows Server 2003 would need to enroll in certificates from a SHA2 certificate authority, Service Pack 2 and KB 968730 should be deployed. If planning on deploying KB 968730, installing KB 938397 is not necessary.
  • If S/MIME using SHA2 signing for the message body is needed, workstations should be upgraded to at least Windows Vista running Office 2003.

XP SP3

XP SP3 with KB968730

2003 R2 SP2

2003 R2 SP2 with KB968730

Windows Vista, 7, 2008, 2008 R2

Basic Functionality

Browsing a website using SHA2 certificate

Works

Works

Unable to validate certificate

Works

Works

Open a certificate and viewing properties

Works

Works

Unable to validate certificate

Works

Works

Interactive logon and mutual TLS (client system)

Client with SHA2 certificate; server with SHA1 certificate

Works

Works

Works

Works

Works

Client with SHA2 certificate; server with SHA2 certificate

Works

Works

Unable to login

Works

Works

Interactive logon and mutual TLS (domain controller / IIS server)

Client with SHA2 certificate; server with SHA1 certificate

N/A

N/A

Unable to login

Works

Works

Certificate Enrollment

V3 certificate template enrollment from any type of root

Unable to select template

Unable to select template

Unable to select template

Unable to select template

Works

V2 certificate template enrollment from SHA2 root

Request fails

Works

Request fails

Works

Works

S/MIME (Outlook 2003)

Validate and sign to a SHA2 certificate

Works

Works

N/A

N/A

Works

Validate message body signed with SHA2

Unable to validate certificate

Unable to validate certificate

N/A

N/A

Works

Sign message body with SHA2

Not an available option

Not an available option

N/A

N/A

Not an available option

S/MIME (Outlook 2007 and 2010)

Validate and sign to a SHA2 certificate using SHA-1 for the message signature

Works

Works

N/A

N/A

Works

Validate message body signed with SHA2

Unable to validate certificate

Unable to validate certificate

N/A

N/A

Works

Sign message body with SHA2

Not an available option

Not an available option

N/A

N/A

Works

-Adam Stasiniewicz

UPDATE (2/8): Based on some recent questions, additional information has been posted about SHA2 and Windows.

-->

Certutil.exe is a command-line program that is installed as part of Certificate Services. You can use Certutil.exe to dump and display certification authority (CA) configuration information, configure Certificate Services, backup and restore CA components, and verify certificates, key pairs, and certificate chains.

When certutil is run on a certification authority without additional parameters, it displays the current certification authority configuration. When cerutil is run on a non-certification authority, the command defaults to running the certutil -dump verb.

Warning

Earlier versions of certutil may not provide all of the options that are described in this document. You can see all the options that a specific version of certutil provides by running the commands shown in the Syntax notations section.

Menu

The major sections in this document are:

Verbs

The following table describes the verbs that can be used with the certutil command.

VerbsDescription
-dumpDump configuration information or files
-asnParse ASN.1 file
-decodehexDecode hexadecimal-encoded file
-decodeDecode a Base64-encoded file
-encodeEncode a file to Base64
-denyDeny a pending certificate request
-resubmitResubmit a pending certificate request
-setattributesSet attributes for a pending certificate request
-setextensionSet an extension for a pending certificate request
-revokeRevoke a certificate
-isvalidDisplay the disposition of the current certificate
-getconfigGet the default configuration string
-pingAttempt to contact the Active Directory Certificate Services Request interface
-pingadminAttempt to contact the Active Directory Certificate Services Admin interface
-CAInfoDisplay information about the certification authority
-ca.certRetrieve the certificate for the certification authority
-ca.chainRetrieve the certificate chain for the certification authority
-GetCRLGet a certificate revocation list (CRL)
-CRLPublish new certificate revocation lists (CRLs) [or only delta CRLs]
-shutdownShutdown Active Directory Certificate Services
-installCertInstall a certification authority certificate
-renewCertRenew a certification authority certificate
-schemaDump the schema for the certificate
-viewDump the certificate view
-dbDump the raw database
-deleterowDelete a row from the server database
-backupBackup Active Directory Certificate Services
-backupDBBackup the Active Directory Certificate Services database
-backupKeyBackup the Active Directory Certificate Services certificate and private key
-restoreRestore Active Directory Certificate Services
-restoreDBRestore the Active Directory Certificate Services database
-restoreKeyRestore the Active Directory Certificate Services certificate and private key
-importPFXImport certificate and private key
-dynamicfilelistDisplay a dynamic file list
-databaselocationsDisplay database locations
-hashfileGenerate and display a cryptographic hash over a file
-storeDump the certificate store
-addstoreAdd a certificate to the store
-delstoreDelete a certificate from the store
-verifystoreVerify a certificate in the store
-repairstoreRepair a key association or update certificate properties or the key security descriptor
-viewstoreDump the certificates store
-viewdelstoreDelete a certificate from the store
-dsPublishPublish a certificate or certificate revocation list (CRL) to Active Directory
-ADTemplateDisplay AD templates
-TemplateDisplay certificate templates
-TemplateCAsDisplay the certification authorities (CAs) for a certificate template
-CATemplatesDisplay templates for CA
-SetCASitesManage Site Names for CAs
-enrollmentServerURLDisplay, add or delete enrollment server URLs associated with a CA
-ADCADisplay AD CAs
-CADisplay Enrollment Policy CAs
-PolicyDisplay Enrollment Policy
-PolicyCacheDisplay or delete Enrollment Policy Cache entries
-CredStoreDisplay, add or delete Credential Store entries
-InstallDefaultTemplatesInstall default certificate templates
-URLCacheDisplay or delete URL cache entries
-pulsePulse auto enrollment events
-MachineInfoDisplay information about the Active Directory machine object
-DCInfoDisplay information about the domain controller
-EntInfoDisplay information about an enterprise CA
-TCAInfoDisplay information about the CA
-SCInfoDisplay information about the smart card
-SCRootsManage smart card root certificates
-verifykeysVerify a public or private key set
-verifyVerify a certificate, certificate revocation list (CRL), or certificate chain
-verifyCTLVerify AuthRoot or Disallowed Certificates CTL
-signRe-sign a certificate revocation list (CRL) or certificate
-vrootCreate or delete web virtual roots and file shares
-vocsprootCreate or delete web virtual roots for an OCSP web proxy
-addEnrollmentServerAdd an Enrollment Server application
-deleteEnrollmentServerDelete an Enrollment Server application
-addPolicyServerAdd a Policy Server application
-deletePolicyServerDelete a Policy Server application
-oidDisplay the object identifier or set a display name
-errorDisplay the message text associated with an error code
-getregDisplay a registry value
-setregSet a registry value
-delregDelete a registry value
-ImportKMSImport user keys and certificates into the server database for key archival
-ImportCertImport a certificate file into the database
-GetKeyRetrieve an archived private key recovery blob
-RecoverKeyRecover an archived private key
-MergePFXMerge PFX files
-ConvertEPFConvert a PFX file into an EPF file
-?Displays the list of verbs
-<verb> -?Displays help for the verb specified.
-? -vDisplays a full list of verbs and

Return to Menu

Syntax notations

  • For basic command line syntax, run certutil -?
  • For the syntax on using certutil with a specific verb, run certutil<verb>-?
  • To send all of the certutil syntax into a text file, run the following commands:
    • certutil -v -? > certutilhelp.txt
    • notepad certutilhelp.txt

The following table describes the notation used to indicate command-line syntax.

NotationDescription
Text without brackets or bracesItems you must type as shown
<Text inside angle brackets>Placeholder for which you must supply a value
[Text inside square brackets]Optional items
{Text inside braces}Set of required items; choose one
Vertical bar ()
Ellipsis (…)Items that can be repeated

Return to Menu

-dump

CertUtil [Options] [-dump]

CertUtil [Options] [-dump] File

Dump configuration information or files

[-f] [-silent] [-split] [-p Password] [-t Timeout]

Return to Menu

-asn

CertUtil [Options] -asn File [type]

Parse ASN.1 file

type: numeric CRYPT_STRING_* decoding type

Return to Menu

-decodehex

CertUtil [Options] -decodehex InFile OutFile [type]

type: numeric CRYPT_STRING_* encoding type

[-f]

Return to Menu

-decode

CertUtil [Options] -decode InFile OutFile

Decode Base64-encoded file

[-f]

Return to Menu

-encode

CertUtil [Options] -encode InFile OutFile

Encode file to Base64

[-f] [-UnicodeText]

Return to Menu

-deny

CertUtil [Options] -deny RequestId

Deny pending request

[-config MachineCAName]

Return to Menu

-resubmit

CertUtil [Options] -resubmit RequestId

Resubmit pending request

[-config MachineCAName]

Return to Menu

-setattributes

CertUtil [Options] -setattributes RequestId AttributeString

Set attributes for pending request

RequestId -- numeric Request Id of pending request

AttributeString -- Request Attribute name and value pairs

  • Names and values are colon separated.
  • Multiple name, value pairs are newline separated.
  • Example: 'CertificateTemplate:UsernEMail:User@Domain.com'
  • Each 'n' sequence is converted to a newline separator.

[-config MachineCAName]

Return to Menu

-setextension

CertUtil [Options] -setextension RequestId ExtensionName Flags {Long | Date | String | @InFile}

Set extension for pending request

RequestId -- numeric Request Id of a pending request

ExtensionName -- ObjectId string of the extension

Flags -- 0 is recommended. 1 makes the extension critical, 2 disables it, 3 does both.

If the last parameter is numeric, it is taken as a Long.

If it can be parsed as a date, it is taken as a Date.

If it starts with '@', the rest of the token is the filename containing binary data or an ascii-text hex dump.

Anything else is taken as a String.

[-config MachineCAName]

Return to Menu

-revoke

CertUtil [Options] -revoke SerialNumber [Reason]

Revoke Certificate

SerialNumber: Comma separated list of certificate serial numbers to revoke

Reason: numeric or symbolic revocation reason

  • 0: CRL_REASON_UNSPECIFIED: Unspecified (default)
  • 1: CRL_REASON_KEY_COMPROMISE: Key Compromise
  • 2: CRL_REASON_CA_COMPROMISE: CA Compromise
  • 3: CRL_REASON_AFFILIATION_CHANGED: Affiliation Changed
  • 4: CRL_REASON_SUPERSEDED: Superseded
  • 5: CRL_REASON_CESSATION_OF_OPERATION: Cessation of Operation
  • 6: CRL_REASON_CERTIFICATE_HOLD: Certificate Hold
  • 8: CRL_REASON_REMOVE_FROM_CRL: Remove From CRL
  • -1: Unrevoke: Unrevoke

[-config MachineCAName]

Return to Menu

-isvalid

CertUtil [Options] -isvalid SerialNumber | CertHash

Display current certificate disposition

[-config MachineCAName]

Return to Menu

-getconfig

CertUtil [Options] -getconfig

Get default configuration string

[-config MachineCAName]

Return to Menu

-ping

CertUtil [Options] -ping [MaxSecondsToWait | CAMachineList]

Ping Active Directory Certificate Services Request interface

CAMachineList -- Comma-separated CA machine name list

  1. For a single machine, use a terminating comma
  2. Displays the site cost for each CA machine

[-config MachineCAName]

Return to Menu

-CAInfo

CertUtil [Options] -CAInfo [InfoName [Index | ErrorCode]]

Display CA Information

InfoName -- indicates the CA property to display (see below). Use '*' for all properties.

Index -- optional zero-based property index

ErrorCode -- numeric error code

[-f] [-split] [-config MachineCAName]

InfoName argument syntax:

  • file: File version
  • product: Product version
  • exitcount: Exit module count
  • exit [Index]: Exit module description
  • policy: Policy module description
  • name: CA name
  • sanitizedname: Sanitized CA name
  • dsname: Sanitized CA short name (DS name)
  • sharedfolder: Shared folder
  • error1 ErrorCode: Error message text
  • error2 ErrorCode: Error message text and error code
  • type: CA type
  • info: CA info
  • parent: Parent CA
  • certcount: CA cert count
  • xchgcount: CA exchange cert count
  • kracount: KRA cert count
  • kraused: KRA cert used count
  • propidmax: Maximum CA PropId
  • certstate [Index]: CA cert
  • certversion [Index]: CA cert version
  • certstatuscode [Index]: CA cert verify status
  • crlstate [Index]: CRL
  • krastate [Index]: KRA cert
  • crossstate+ [Index]: Forward cross cert
  • crossstate- [Index]: Backward cross cert
  • cert [Index]: CA cert
  • certchain [Index]: CA cert chain
  • certcrlchain [Index]: CA cert chain with CRLs
  • xchg [Index]: CA exchange cert
  • xchgchain [Index]: CA exchange cert chain
  • xchgcrlchain [Index]: CA exchange cert chain with CRLs
  • kra [Index]: KRA cert
  • cross+ [Index]: Forward cross cert
  • cross- [Index]: Backward cross cert
  • CRL [Index]: Base CRL
  • deltacrl [Index]: Delta CRL
  • crlstatus [Index]: CRL Publish Status
  • deltacrlstatus [Index]: Delta CRL Publish Status
  • dns: DNS Name
  • role: Role Separation
  • ads: Advanced Server
  • templates: Templates
  • csp [Index]: OCSP URLs
  • aia [Index]: AIA URLs
  • cdp [Index]: CDP URLs
  • localename: CA locale name
  • subjecttemplateoids: Subject Template OIDs

Return to Menu

-ca.cert

CertUtil [Options] -ca.cert OutCACertFile [Index]

Retrieve the CA's certificate

OutCACertFile: output file

Index: CA certificate renewal index (defaults to most recent)

[-f] [-split] [-config MachineCAName]

Return to Menu

-ca.chain

CertUtil [Options] -ca.chain OutCACertChainFile [Index]

Retrieve the CA's certificate chain

OutCACertChainFile: output file

Index: CA certificate renewal index (defaults to most recent)

[-f] [-split] [-config MachineCAName]

Return to Menu

-GetCRL

CertUtil [Options] -GetCRL OutFile [Index] [delta]

Get CRL

Index: CRL index or key index (defaults to CRL for newest key)

delta: delta CRL (default is base CRL)

[-f] [-split] [-config MachineCAName]

Return to Menu

-CRL

CertUtil [Options] -CRL [dd:hh | republish] [delta]

Publish new CRLs [or delta CRLs only]

dd:hh -- new CRL validity period in days and hours

republish -- republish most recent CRLs

delta -- delta CRLs only (default is base and delta CRLs)

[-split] [-config MachineCAName]

Return to Menu

-shutdown

CertUtil [Options] -shutdown

Shutdown Active Directory Certificate Services

[-config MachineCAName]

Return to Menu

-installCert

CertUtil [Options] -installCert [CACertFile]

Install Certification Authority certificate

[-f] [-silent] [-config MachineCAName]

Return to Menu

-renewCert

CertUtil [Options] -renewCert [ReuseKeys] [MachineParentCAName]

Renew Certification Authority certificate

Use -f to ignore an outstanding renewal request, and generate a new request.

[-f] [-silent] [-config MachineCAName]

Return to Menu

-schema

CertUtil [Options] -schema [Ext | Attrib | CRL]

Dump Certificate Schema

Defaults to Request and Certificate table

Ext: Extension table

Attrib: Attribute table

CRL: CRL table

[-split] [-config MachineCAName]

Return to Menu

-view

CertUtil [Options] -view [Queue | Log | LogFail | Revoked | Ext | Attrib | CRL] [csv]

Dump Certificate View

Queue: Request queue

Log: Issued or revoked certificates, plus failed requests

LogFail: Failed requests

Revoked: Revoked certificates

Ext: Extension table

Attrib: Attribute table

CRL: CRL table

csv: Output as Comma Separated Values

To display the StatusCode column for all entries: -out StatusCode

To display all columns for the last entry: -restrict 'RequestId$'

To display RequestId and Disposition for three requests: -restrict 'RequestId>=37,RequestId<40' -out 'RequestId,Disposition'

To display Row Ids and CRL Numbers for all Base CRLs: -restrict 'CRLMinBase=0' -out 'CRLRowId,CRLNumber' CRL

To display Base CRL Number 3: -v -restrict 'CRLMinBase=0,CRLNumber=3' -out 'CRLRawCRL' CRL

To display the entire CRL table: CRL

Use 'Date[+|-dd:hh]' for date restrictions

Use 'now+dd:hh' for a date relative to the current time

[-silent] [-split] [-config MachineCAName] [-restrict RestrictionList] [-out ColumnList]

Return to Menu

-db

CertUtil [Options] -db

Dump Raw Database

[-config MachineCAName] [-restrict RestrictionList] [-out ColumnList]

Return to Menu

-deleterow

CertUtil [Options] -deleterow RowId | Date [Request | Cert | Ext | Attrib | CRL]

Delete server database row

Request: Failed and pending requests (submission date)

Cert: Expired and revoked certificates (expiration date)

Ext: Extension table

Attrib: Attribute table

CRL: CRL table (expiration date)

To delete failed and pending requests submitted by January 22, 2001: 1/22/2001 Request

To delete all certificates that expired by January 22, 2001: 1/22/2001 Cert

To delete the certificate row, attributes and extensions for RequestId 37: 37

To delete CRLs that expired by January 22, 2001: 1/22/2001 CRL

[-f] [-config MachineCAName]

Return to Menu

-backup

CertUtil [Options] -backup BackupDirectory [Incremental] [KeepLog]

Backup Active Directory Certificate Services

BackupDirectory: directory to store backed up data

Incremental: perform incremental backup only (default is full backup)

KeepLog: preserve database log files (default is to truncate log files)

[-f] [-config MachineCAName] [-p Password]

Return to Menu

-backupDB

CertUtil [Options] -backupDB BackupDirectory [Incremental] [KeepLog]

Backup Active Directory Certificate Services database

BackupDirectory: directory to store backed up database files

Incremental: perform incremental backup only (default is full backup)

KeepLog: preserve database log files (default is to truncate log files)

[-f] [-config MachineCAName]

Return to Menu

-backupKey

CertUtil [Options] -backupKey BackupDirectory

Backup Active Directory Certificate Services certificate and private key

BackupDirectory: directory to store backed up PFX file

[-f] [-config MachineCAName] [-p Password] [-t Timeout]

Return to Menu

-restore

CertUtil [Options] -restore BackupDirectory

Restore Active Directory Certificate Services

BackupDirectory: directory containing data to be restored

[-f] [-config MachineCAName] [-p Password]

Return to Menu

-restoreDB

CertUtil [Options] -restoreDB BackupDirectory

Restore Active Directory Certificate Services database

BackupDirectory: directory containing database files to be restored

[-f] [-config MachineCAName]

Return to Menu

-restoreKey

CertUtil [Options] -restoreKey BackupDirectory | PFXFile

Restore Active Directory Certificate Services certificate and private key

BackupDirectory: directory containing PFX file to be restored

PFXFile: PFX file to be restored

[-f] [-config MachineCAName] [-p Password]

Return to Menu

-importPFX

CertUtil [Options] -importPFX [CertificateStoreName] PFXFile [Modifiers]

Import certificate and private key

CertificateStoreName: Certificate store name. Transfer whatsapp from android to iphone free app. See -store.

PFXFile: PFX file to be imported

Modifiers: Comma separated list of one or more of the following:

  1. AT_SIGNATURE: Change the KeySpec to Signature
  2. AT_KEYEXCHANGE: Change the KeySpec to Key Exchange
  3. NoExport: Make the private key non-exportable
  4. NoCert: Do not import the certificate
  5. NoChain: Do not import the certificate chain
  6. NoRoot: Do not import the root certificate
  7. Protect: Protect keys with password
  8. NoProtect: Do not password protect keys

Defaults to personal machine store.

[-f] [-user] [-p Password] [-csp Provider]

But some cannot be downloaded because they include features that cannot be printed, for example a clear plastic window to attach a photo. Before you startYou can order the following forms to be posted to a UK address.You can download some of them. https://luckytp.netlify.app/dvla-d1-form-download.html.

Return to Menu

-dynamicfilelist

CertUtil [Options] -dynamicfilelist

Display dynamic file List

Windows Certutil Sha256

[-config MachineCAName]

Return to Menu

-databaselocations

CertUtil [Options] -databaselocations

Display database locations

[-config MachineCAName]

Return to Menu

-hashfile

CertUtil [Options] -hashfile InFile [HashAlgorithm]

Generate and display cryptographic hash over a file

Return to Menu

-store

CertUtil [Options] -store [CertificateStoreName [CertId [OutputFile]]]

Dump certificate store

CertificateStoreName: Certificate store name. Examples:

  • 'My', 'CA' (default), 'Root',
  • 'ldap:///CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?one?objectClass=certificationAuthority' (View Root Certificates)
  • 'ldap:///CN=CAName,CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority' (Modify Root Certificates)
  • 'ldap:///CN=CAName,CN=MachineName,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint' (View CRLs)
  • 'ldap:///CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority' (Enterprise CA Certificates)
  • ldap: (AD computer object certificates)
  • -user ldap: (AD user object certificates)

CertId: Certificate or CRL match token. This can be a serial number, an SHA-1 certificate, CRL, CTL or public key hash, a numeric cert index (0, 1, and so on), a numeric CRL index (.0, .1, and so on), a numeric CTL index (.0, .1, and so on), a public key, signature or extension ObjectId, a certificate subject Common Name, an e-mail address, UPN or DNS name, a key container name or CSP name, a template name or ObjectId, an EKU or Application Policies ObjectId, or a CRL issuer Common Name. Many of these may result in multiple matches.

OutputFile: file to save matching cert

Use -user to access a user store instead of a machine store.

Use -enterprise to access a machine enterprise store.

Use -service to access a machine service store.

Use -grouppolicy to access a machine group policy store.

Examples:

  • -enterprise NTAuth
  • -enterprise Root 37
  • -user My 26e0aaaf000000000004
  • CA .11

[-f] [-enterprise] [-user] [-GroupPolicy] [-silent] [-split] [-dc DCName]

Return to Menu

-addstore

CertUtil [Options] -addstore CertificateStoreName InFile

Add certificate to store

CertificateStoreName: Certificate store name. See -store.

InFile: Certificate or CRL file to add to store.

[-f] [-enterprise] [-user] [-GroupPolicy] [-dc DCName]

Return to Menu

-delstore

CertUtil [Options] -delstore CertificateStoreName CertId

Delete certificate from store

CertificateStoreName: Certificate store name. See -store.

CertId: Certificate or CRL match token. See -store.

[-enterprise] [-user] [-GroupPolicy] [-dc DCName]

Return to Menu

-verifystore

CertUtil [Options] -verifystore CertificateStoreName [CertId]

Verify certificate in store

CertificateStoreName: Certificate store name. See -store.

CertId: Certificate or CRL match token. See -store.

[-enterprise] [-user] [-GroupPolicy] [-silent] [-split] [-dc DCName] [-t Timeout]

Return to Menu

-repairstore

CertUtil [Options] -repairstore CertificateStoreName CertIdList [PropertyInfFile | SDDLSecurityDescriptor]

Repair key association or update certificate properties or key security descriptor

CertificateStoreName: Certificate store name. See -store.

CertIdList: comma separated list of Certificate or CRL match tokens. See -store CertId description.

PropertyInfFile -- INF file containing external properties:

[-f] [-enterprise] [-user] [-GroupPolicy] [-silent] [-split] [-csp Provider]

Return to Menu

-viewstore

CertUtil [Options] -viewstore [CertificateStoreName [CertId [OutputFile]]]

Dump certificate store

CertificateStoreName: Certificate store name. Examples:

  • 'My', 'CA' (default), 'Root',
  • 'ldap:///CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?one?objectClass=certificationAuthority' (View Root Certificates)
  • 'ldap:///CN=CAName,CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority' (Modify Root Certificates)
  • 'ldap:///CN=CAName,CN=MachineName,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint' (View CRLs)
  • 'ldap:///CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority' (Enterprise CA Certificates)
  • ldap: (AD machine object certificates)
  • -user ldap: (AD user object certificates)

CertId: Certificate or CRL match token. This can be a serial number, an SHA-1 certificate, CRL, CTL or public key hash, a numeric cert index (0, 1, and so on), a numeric CRL index (.0, .1, and so on), a numeric CTL index (.0, .1, and so on), a public key, signature or extension ObjectId, a certificate subject Common Name, an e-mail address, UPN or DNS name, a key container name or CSP name, a template name or ObjectId, an EKU or Application Policies ObjectId, or a CRL issuer Common Name. Many of these may result in multiple matches.

OutputFile: file to save matching cert

Use -user to access a user store instead of a machine store.

Use -enterprise to access a machine enterprise store.

Use -service to access a machine service store.

Use -grouppolicy to access a machine group policy store.

Examples:

  1. -enterprise NTAuth
  2. -enterprise Root 37
  3. -user My 26e0aaaf000000000004
  4. CA .11

[-f] [-enterprise] [-user] [-GroupPolicy] [-dc DCName]

Return to Menu

-viewdelstore

CertUtil [Options] -viewdelstore [CertificateStoreName [CertId [OutputFile]]]

Delete certificate from store

CertificateStoreName: Certificate store name. Examples:

  • 'My', 'CA' (default), 'Root',
  • 'ldap:///CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?one?objectClass=certificationAuthority' (View Root Certificates)
  • 'ldap:///CN=CAName,CN=Certification Authorities,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority' (Modify Root Certificates)
  • 'ldap:///CN=CAName,CN=MachineName,CN=CDP,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint' (View CRLs)
  • 'ldap:///CN=NTAuthCertificates,CN=Public Key Services,CN=Services,CN=Configuration,DC=cpandl,DC=com?cACertificate?base?objectClass=certificationAuthority' (Enterprise CA Certificates)
  • ldap: (AD machine object certificates)
  • -user ldap: (AD user object certificates)

CertId: Certificate or CRL match token. This can be a serial number, an SHA-1 certificate, CRL, CTL or public key hash, a numeric cert index (0, 1, and so on), a numeric CRL index (.0, .1, and so on), a numeric CTL index (.0, .1, and so on), a public key, signature or extension ObjectId, a certificate subject Common Name, an e-mail address, UPN or DNS name, a key container name or CSP name, a template name or ObjectId, an EKU or Application Policies ObjectId, or a CRL issuer Common Name. Many of these may result in multiple matches.

OutputFile: file to save matching cert

Use -user to access a user store instead of a machine store.

Use -enterprise to access a machine enterprise store.

Use -service to access a machine service store.

Use -grouppolicy to access a machine group policy store.

Examples:

  1. -enterprise NTAuth
  2. -enterprise Root 37
  3. -user My 26e0aaaf000000000004
  4. CA .11

[-f] [-enterprise] [-user] [-GroupPolicy] [-dc DCName]

Return to Menu

-dsPublish

CertUtil [Options] -dsPublish CertFile [NTAuthCA | RootCA | SubCA | CrossCA | KRA | User | Machine]

CertUtil [Options] -dsPublish CRLFile [DSCDPContainer [DSCDPCN]]

Publish certificate or CRL to Active Directory

CertFile: certificate file to publish

NTAuthCA: Publish cert to DS Enterprise store

RootCA: Publish cert to DS Trusted Root store

SubCA: Publish CA cert to DS CA object

CrossCA: Publish cross cert to DS CA object

KRA: Publish cert to DS Key Recovery Agent object

User: Publish cert to User DS object

Machine: Publish cert to Machine DS object

CRLFile: CRL file to publish

DSCDPContainer: DS CDP container CN, usually the CA machine name

DSCDPCN: DS CDP object CN, usually based on the sanitized CA short name and key index

Use -f to create DS object.

[-f] [-user] [-dc DCName]

Return to Menu

-ADTemplate

CertUtil [Options] -ADTemplate [Template]

Display AD templates

[-f] [-user] [-ut] [-mt] [-dc DCName]

-Template

CertUtil [Options] -Template [Template]

Display Enrollment Policy templates

[-f] [-user] [-silent] [-PolicyServer URLOrId] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password]

Return to Menu

-TemplateCAs

CertUtil [Options] -TemplateCAs Template

Display CAs for template

[-f] [-user] [-dc DCName]

Return to Menu

-CATemplates

CertUtil [Options] -CATemplates [Template]

Display templates for CA

[-f] [-user] [-ut] [-mt] [-config MachineCAName] [-dc DCName]

Return to Menu

-SetCASites

Sha256sum Windows Certutil

CertUtil [Options] -SetCASites [set] [SiteName]

CertUtil [Options] -SetCASites verify [SiteName]

CertUtil [Options] -SetCASites delete

Set, Verify or Delete CA site names

  • Use the -config option to target a single CA (Default is all CAs)
  • SiteName is allowed only when targeting a single CA
  • Use -f to override validation errors for the specified SiteName
  • Use -f to delete all CA site names

[-f] [-config MachineCAName] [-dc DCName]

Note

For more information on configuring CAs for Active Directory Domain Services (AD DS) site awareness, see AD DS Site Awareness for AD CS and PKI clients.

Return to Menu

-enrollmentServerURL

CertUtil [Options] -enrollmentServerURL [URL AuthenticationType [Priority] [Modifiers]]

CertUtil [Options] -enrollmentServerURL URL delete

Display, add or delete enrollment server URLs associated with a CA

AuthenticationType: Specify one of the following client authentication methods while adding a URL

  1. Kerberos: Use Kerberos SSL credentials
  2. UserName: Use named account for SSL credentials
  3. ClientCertificate: Use X.509 Certificate SSL credentials
  4. Anonymous: Use anonymous SSL credentials

delete: deletes the specified URL associated with the CA

Priority: defaults to '1' if not specified when adding a URL

Modifiers -- Comma separated list of one or more of the following:

  1. AllowRenewalsOnly: Only renewal requests can be submitted to this CA via this URL
  2. AllowKeyBasedRenewal: Allows use of a certificate that has no associated account in the AD. This applies only with ClientCertificate and AllowRenewalsOnly Mode

[-config MachineCAName] [-dc DCName]

Return to Menu

-ADCA

CertUtil [Options] -ADCA [CAName]

Display AD CAs

[-f] [-split] [-dc DCName]

Return to Menu

-CA

CertUtil [Options] -CA [CAName | TemplateName]

Display Enrollment Policy CAs

[-f] [-user] [-silent] [-split] [-PolicyServer URLOrId] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password]

Return to Menu

-Policy

Display Enrollment Policy

[-f] [-user] [-silent] [-split] [-PolicyServer URLOrId] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password]

Return to Menu

-PolicyCache

CertUtil [Options] -PolicyCache [delete]

Display or delete Enrollment Policy Cache entries

delete: delete Policy Server cache entries

-f: use -f to delete all cache entries

[-f] [-user] [-PolicyServer URLOrId]

Return to Menu

-CredStore

CertUtil [Options] -CredStore windows-certutil-sha256.html

CertUtil [Options] -CredStore URL add

CertUtil [Options] -CredStore URL delete

Display, add or delete Credential Store entries

URL: target URL. Use * to match all entries. Use https://machine* to match a URL prefix.

add: add a Credential Store entry. SSL credentials must also be specified.

delete: delete Credential Store entries

-f: use -f to overwrite an entry or to delete multiple entries.

[-f] [-user] [-silent] [-Anonymous] [-Kerberos] [-ClientCertificate ClientCertId] [-UserName UserName] [-p Password]

Return to Menu

-InstallDefaultTemplates

CertUtil [Options] -InstallDefaultTemplates

Install default certificate templates

[-dc DCName]

Return to Menu

-URLCache

CertUtil [Options] -URLCache [URL | CRL | * [delete]]

Display or delete URL cache entries

URL: cached URL

CRL: operate on all cached CRL URLs only

*: operate on all cached URLs

delete: delete relevant URLs from the current user's local cache

Use -f to force fetching a specific URL and updating the cache.

[-f] [-split]

Return to Menu

-pulse

CertUtil [Options] -pulse

Pulse autoenrollment events

[-user]

Return to Menu

-MachineInfo

CertUtil [Options] -MachineInfo DomainNameMachineName$

Display Active Directory computer object information

Return to Menu

-DCInfo

CertUtil [Options] -DCInfo [Domain] [Verify | DeleteBad | DeleteAll]

Display domain controller information

Default is to display DC certs without verification

[-f] [-user] [-urlfetch] [-dc DCName] [-t Timeout]

Tip

The ability to specify an Active Directory Domain Services (AD DS) domain [Domain] and to specify a domain controller (-dc) was added in Windows Server 2012. To successfully run the command, you must use an account that is a member of Domain Admins or Enterprise Admins. The behavior modifications of this command are as follows:
> 1. If a domain is not specified and a specific domain controller is not specified, this option returns a list of domain controllers to process from the default domain controller.
> 2. If a domain is not specified, but a domain controller is specified, a report of the certificates on the specified domain controller is generated.
> 3. If a domain is specified, but a domain controller is not specified, a list of domain controllers is generated along with reports on the certificates for each domain controller in the list.
> 4. If the domain and domain controller are specified, a list of domain controllers is generated from the targeted domain controller. A report of the certificates for each domain controller in the list is also generated.

For example, assume there is a domain named CPANDL with a domain controller named CPANDL-DC1. You could run the following command to a retrieve a list of domain controllers and their certificates that from CPANDL-DC1: certutil -dc cpandl-dc1 -dcinfo cpandl

Return to Menu

-EntInfo

CertUtil [Options] -EntInfo DomainNameMachineName$

[-f] [-user]

Return to Menu

-TCAInfo

CertUtil [Options] -TCAInfo [DomainDN | -]

Display CA information

[-f] [-enterprise] [-user] [-urlfetch] [-dc DCName] [-t Timeout]

Sha256sum windows certutil

Return to Menu

-SCInfo

CertUtil [Options] -SCInfo [ReaderName [CRYPT_DELETEKEYSET]]

Display smart card information

CRYPT_DELETEKEYSET: Delete all keys on the smart card

[-silent] [-split] [-urlfetch] [-t Timeout]

Return to Menu

-SCRoots

CertUtil [Options] -SCRoots update [+][InputRootFile] [ReaderName]

CertUtil [Options] -SCRoots save @OutputRootFile [ReaderName]

CertUtil [Options] -SCRoots view [InputRootFile | ReaderName]

CertUtil [Options] -SCRoots delete [ReaderName]

Manage smart card root certificates

[-f] [-split] [-p Password]

Return to Menu

-verifykeys

CertUtil [Options] -verifykeys [KeyContainerName CACertFile]

Verify public/private key set

KeyContainerName: key container name of the key to verify. Defaults to machine keys. Use -user for user keys.

CACertFile: signing or encryption certificate file

If no arguments are specified, each signing CA cert is verified against its private key.

This operation can only be performed against a local CA or local keys.

[-f] [-user] [-silent] [-config MachineCAName]

Return to Menu

-verify

CertUtil [Options] -verify CertFile [ApplicationPolicyList | - [IssuancePolicyList]]

CertUtil [Options] -verify CertFile [CACertFile [CrossedCACertFile]]

CertUtil [Options] -verify CRLFile CACertFile [IssuedCertFile]

CertUtil [Options] -verify CRLFile CACertFile [DeltaCRLFile]

Verify certificate, CRL or chain

CertFile: Certificate to verify

ApplicationPolicyList: optional comma separated list of required Application Policy ObjectIds

IssuancePolicyList: optional comma separated list of required Issuance Policy ObjectIds

CACertFile: optional issuing CA certificate to verify against

CrossedCACertFile: optional certificate cross-certified by CertFile

CRLFile: CRL to verify

IssuedCertFile: optional issued certificate covered by CRLFile

DeltaCRLFile: optional delta CRL

If ApplicationPolicyList is specified, chain building is restricted to chains valid for the specified Application Policies.

If IssuancePolicyList is specified, chain building is restricted to chains valid for the specified Issuance Policies.

If CACertFile is specified, fields in CACertFile are verified against CertFile or CRLFile.

If CACertFile is not specified, CertFile is used to build and verify a full chain.

If CACertFile and CrossedCACertFile are both specified, fields in CACertFile and CrossedCACertFile are verified against CertFile.

If IssuedCertFile is specified, fields in IssuedCertFile are verified against CRLFile.

If DeltaCRLFile is specified, fields in DeltaCRLFile are verified against CRLFile.

[-f] [-enterprise] [-user] [-silent] [-split] [-urlfetch] [-t Timeout]

Return to Menu

-verifyCTL

CertUtil [Options] -verifyCTL CTLObject [CertDir] [CertFile]

Verify AuthRoot or Disallowed Certificates CTL

CTLObject: Identifies the CTL to verify:

  • AuthRootWU: read AuthRoot CAB and matching certificates from the URL cache. Use -f to download from Windows Update instead.
  • DisallowedWU: read Disallowed Certificates CAB and disallowed certificate store file from the URL cache. Use -f to download from Windows Update instead.
  • AuthRoot: read registry cached AuthRoot CTL. Use with -f and a CertFile that is not already trusted to force updating the registry cached AuthRoot and Disallowed Certificate CTLs.
  • Disallowed: read registry cached Disallowed Certificates CTL. -f has the same behavior as with AuthRoot.
  • CTLFileName: file or http: path to CTL or CAB

CertDir: folder containing certificates matching CTL entries. An http: folder path must end with a path separator. If a folder is not specified with AuthRoot or Disallowed, multiple locations will be searched for matching certificates: local certificate stores, crypt32.dll resources and the local URL cache. Use -f to download from Windows Update when necessary. Otherwise defaults to the same folder or web site as the CTLObject.

CertFile: file containing certificate(s) to verify. Certificates will be matched against CTL entries, and match results displayed. Suppresses most of the default output.

[-f] [-user] [-split]

Return to Menu

-sign

CertUtil [Options] -sign InFileList|SerialNumber|CRL OutFileList [StartDate+dd:hh] [+SerialNumberList | -SerialNumberList | -ObjectIdList | @ExtensionFile]

CertUtil [Options] -sign InFileList|SerialNumber|CRL OutFileList [#HashAlgorithm] [+AlternateSignatureAlgorithm | -AlternateSignatureAlgorithm]

Re-sign CRL or certificate

InFileList: comma separated list of Certificate or CRL files to modify and re-sign

SerialNumber: Serial number of certificate to create. Validity period and other options must not be present.

CRL: Create an empty CRL. Validity period and other options must not be present.

OutFileList: comma separated list of modified Certificate or CRL output files. The number of files must match InFileList.

StartDate+dd:hh: new validity period: optional date plus; optional days and hours validity period; If both are specified, use a plus sign (+) separator. Use 'now[+dd:hh]' to start at the current time. Use 'never' to have no expiration date (for CRLs only).

SerialNumberList: comma separated serial number list to add or remove

ObjectIdList: comma separated extension ObjectId list to remove

@ExtensionFile: INF file containing extensions to update or remove:

HashAlgorithm: Name of the hash algorithm preceded by a # sign

AlternateSignatureAlgorithm: alternate Signature algorithm specifier

A minus sign causes serial numbers and extensions to be removed. A plus sign causes serial numbers to be added to a CRL. When removing items from a CRL, the list may contain both serial numbers and ObjectIds. A minus sign before AlternateSignatureAlgorithm causes the legacy signature format to be used. A plus sign before AlternateSignatureAlgorithm causes the alternature signature format to be used. If AlternateSignatureAlgorithm is not specified then the signature format in the certificate or CRL is used.

Adobe flash cs5.5. [-nullsign] [-f] [-silent] [-Cert CertId]

Return to Menu

-vroot

CertUtil [Options] -vroot [delete]

Create/delete web virtual roots and file shares

Return to Menu

-vocsproot

CertUtil [Options] -vocsproot [delete]

Create/delete web virtual roots for OCSP web proxy

Return to Menu

-addEnrollmentServer

CertUtil [Options] -addEnrollmentServer Kerberos | UserName | ClientCertificate [AllowRenewalsOnly] [AllowKeyBasedRenewal]

Add an Enrollment Server application

Add an Enrollment Server application and application pool if necessary, for the specified CA. This command does not install binaries or packages. One of the following authentication methods with which the client connects to a Certificate Enrollment Server.

  • Kerberos: Use Kerberos SSL credentials
  • UserName: Use named account for SSL credentials
  • ClientCertificate: Use X.509 Certificate SSL credentials
  • AllowRenewalsOnly: Only renewal requests can be submitted to this CA via this URL
  • AllowKeyBasedRenewal -- Allows use of a certificate that has no associated account in the AD. This applies only with ClientCertificate and AllowRenewalsOnly mode.

[-config MachineCAName]

Return to Menu

-deleteEnrollmentServer

CertUtil [Options] -deleteEnrollmentServer Kerberos | UserName | ClientCertificate

Delete an Enrollment Server application

Delete an Enrollment Server application and application pool if necessary, for the specified CA. This command does not remove binaries or packages. One of the following authentication methods with which the client connects to a Certificate Enrollment Server.

  1. Kerberos: Use Kerberos SSL credentials
  2. UserName: Use named account for SSL credentials
  3. ClientCertificate: Use X.509 Certificate SSL credentials

[-config MachineCAName]

Return to Menu

-addPolicyServer

CertUtil [Options] -addPolicyServer Kerberos | UserName | ClientCertificate [KeyBasedRenewal]

Add a Policy Server application

Add a Policy Server application and application pool if necessary. This command does not install binaries or packages. One of the following authentication methods with which the client connects to a Certificate Policy Server:

  • Kerberos: Use Kerberos SSL credentials
  • UserName: Use named account for SSL credentials
  • ClientCertificate: Use X.509 Certificate SSL credentials
  • KeyBasedRenewal: Only policies that contain KeyBasedRenewal templates are returned to the client. This flag applies only for UserName and ClientCertificate authentication.

Return to Menu

-deletePolicyServer

CertUtil [Options] -deletePolicyServer Kerberos | UserName | ClientCertificate [KeyBasedRenewal]

Delete a Policy Server application

Delete a Policy Server application and application pool if necessary. This command does not remove binaries or packages. One of the following authentication methods with which the client connects to a Certificate Policy Server:

  1. Kerberos: Use Kerberos SSL credentials
  2. UserName: Use named account for SSL credentials
  3. ClientCertificate: Use X.509 Certificate SSL credentials
  4. KeyBasedRenewal: KeyBasedRenewal policy server

Return to Menu

-oid

CertUtil [Options] -oid ObjectId [DisplayName | delete [LanguageId [Type]]]

CertUtil [Options] -oid GroupId

CertUtil [Options] -oid AlgId | AlgorithmName [GroupId]

Display ObjectId or set display name

  • ObjectId -- ObjectId to display or to add display name
  • GroupId -- decimal GroupId number for ObjectIds to enumerate
  • AlgId -- hexadecimal AlgId for ObjectId to look up
  • AlgorithmName -- Algorithm Name for ObjectId to look up
  • DisplayName -- Display Name to store in DS
  • delete -- delete display name
  • LanguageId -- Language Id (defaults to current: 1033)
  • Type -- DS object type to create: 1 for Template (default), 2 for Issuance Policy, 3 for Application Policy
  • Use -f to create DS object.

[-f]

Return to Menu

-error

CertUtil [Options] -error ErrorCode

Display error code message text

Return to Menu

-getreg

CertUtil [Options] -getreg [{ca|restore|policy|exit|template|enroll|chain|PolicyServers}[ProgId]][RegistryValueName]

Display registry value

ca: Use CA's registry key

restore: Use CA's restore registry key

policy: Use policy module's registry key

exit: Use first exit module's registry key

template: Use template registry key (use -user for user templates)

enroll: Use enrollment registry key (use -user for user context)

chain: Use chain configuration registry key

PolicyServers: Use Policy Servers registry key

ProgId: Use policy or exit module's ProgId (registry subkey name)

RegistryValueName: registry value name (use 'Name*' to prefix match)

Value: new numeric, string or date registry value or filename. If a numeric value starts with '+' or '-', the bits specified in the new value are set or cleared in the existing registry value.

If a string value starts with '+' or '-', and the existing value is a REG_MULTI_SZ value, the string is added to or removed from the existing registry value. To force creation of a REG_MULTI_SZ value, add a 'n' to the end of the string value.

If the value starts with '@', the rest of the value is the name of the file containing the hexadecimal text representation of a binary value. If it does not refer to a valid file, it is instead parsed as [Date][+|-][dd:hh] -- an optional date plus or minus optional days and hours. If both are specified, use a plus sign (+) or minus sign (-) separator. Use 'now+dd:hh' for a date relative to the current time.

Use 'chainChainCacheResyncFiletime @now' to effectively flush cached CRLs.

[-f] [-user] [-GroupPolicy] [-config MachineCAName]

Return to Menu

-setreg

CertUtil [Options] -setreg [{ca|restore|policy|exit|template|enroll|chain|PolicyServers}[ProgId]]RegistryValueName Value

Set registry value

ca: Use CA's registry key

restore: Use CA's restore registry key

policy: Use policy module's registry key

exit: Use first exit module's registry key

template: Use template registry key (use -user for user templates)

enroll: Use enrollment registry key (use -user for user context)

chain: Use chain configuration registry key

PolicyServers: Use Policy Servers registry key

ProgId: Use policy or exit module's ProgId (registry subkey name)

RegistryValueName: registry value name (use 'Name*' to prefix match)

Value: new numeric, string or date registry value or filename. If a numeric value starts with '+' or '-', the bits specified in the new value are set or cleared in the existing registry value.

If a string value starts with '+' or '-', and the existing value is a REG_MULTI_SZ value, the string is added to or removed from the existing registry value. To force creation of a REG_MULTI_SZ value, add a 'n' to the end of the string value.

If the value starts with '@', the rest of the value is the name of the file containing the hexadecimal text representation of a binary value. If it does not refer to a valid file, it is instead parsed as [Date][+|-][dd:hh] -- an optional date plus or minus optional days and hours. If both are specified, use a plus sign (+) or minus sign (-) separator. Use 'now+dd:hh' for a date relative to the current time.

Use 'chainChainCacheResyncFiletime @now' to effectively flush cached CRLs.

[-f] [-user] [-GroupPolicy] [-config MachineCAName]

Return to Menu

-delreg

CertUtil [Options] -delreg [{ca|restore|policy|exit|template|enroll|chain|PolicyServers}[ProgId]][RegistryValueName]

Delete registry value

ca: Use CA's registry key

restore: Use CA's restore registry key

policy: Use policy module's registry key

exit: Use first exit module's registry key

template: Use template registry key (use -user for user templates)

enroll: Use enrollment registry key (use -user for user context)

chain: Use chain configuration registry key

PolicyServers: Use Policy Servers registry key

ProgId: Use policy or exit module's ProgId (registry subkey name)

RegistryValueName: registry value name (use 'Name*' to prefix match)

Value: new numeric, string or date registry value or filename. If a numeric value starts with '+' or '-', the bits specified in the new value are set or cleared in the existing registry value.

If a string value starts with '+' or '-', and the existing value is a REG_MULTI_SZ value, the string is added to or removed from the existing registry value. To force creation of a REG_MULTI_SZ value, add a 'n' to the end of the string value.

If the value starts with '@', the rest of the value is the name of the file containing the hexadecimal text representation of a binary value. If it does not refer to a valid file, it is instead parsed as [Date][+|-][dd:hh] -- an optional date plus or minus optional days and hours. If both are specified, use a plus sign (+) or minus sign (-) separator. Use 'now+dd:hh' for a date relative to the current time.

Use 'chainChainCacheResyncFiletime @now' to effectively flush cached CRLs.

[-f] [-user] [-GroupPolicy] [-config MachineCAName]

Return to Menu

-ImportKMS

CertUtil [Options] -ImportKMS UserKeyAndCertFile [CertId]

Import user keys and certificates into server database for key archival

UserKeyAndCertFile -- Data file containing user private keys and certificates to be archived. This can be any of the following:

  • Exchange Key Management Server (KMS) export file
  • PFX file

CertId: KMS export file decryption certificate match token. See -store.

Use -f to import certificates not issued by the CA.

[-f] [-silent] [-split] [-config MachineCAName] [-p Password] [-symkeyalg SymmetricKeyAlgorithm[,KeyLength]]

Return to Menu

-ImportCert

CertUtil [Options] -ImportCert Certfile [ExistingRow]

Import a certificate file into the database

Use ExistingRow to import the certificate in place of a pending request for the same key.

Use -f to import certificates not issued by the CA.

The CA may also need to be configured to support foreign certificate import: certutil -setreg caKRAFlags +KRAF_ENABLEFOREIGN

[-f] [-config MachineCAName]

Return to Menu

-GetKey

CertUtil [Options] -GetKey SearchToken [RecoveryBlobOutFile]

CertUtil [Options] -GetKey SearchToken script OutputScriptFile

Certutil

CertUtil [Options] -GetKey SearchToken retrieve | recover OutputFileBaseName

Retrieve archived private key recovery blob, generate a recovery script, or recover archived keys

Paint shop pro software. Send your files to a wide selection of image formats for easy sharing.Lab RetroTake a look at your photos using the old color and contrast of the school.

script: generate a script to retrieve and recover keys (default behavior if multiple matching recovery candidates are found, or if the output file is not specified).

Certutil Hashfile Sha256

retrieve: retrieve one or more Key Recovery Blobs (default behavior if exactly one matching recovery candidate is found, and if the output file is specified)

recover: retrieve and recover private keys in one step (requires Key Recovery Agent certificates and private keys)

However, Momonga, a powerful wizard and master of the dark guild Ainz Ooal Gown, decides to spend his last few moments in the game as the servers begin to shut down. To his surprise, despite the clock having struck midnight, Momonga is still fully conscious as his character and, moreover, the non-player characters appear to have developed personalities of their own!Confronted with this abnormal situation, Momonga commands his loyal servants to help him investigate and take control of this new world, with the hopes of figuring out what has caused this development and if there may be others in the same predicament.(Source: MAL Rewrite). Download overlord anime. Alternate Title: Overlord, Overlord, オーバーロード Type: TVStatus: Finished AiringNumber of Episodes: 13 Episode(s)Date: 2015-07-07 to 2015-09-29Score: 80.43Age Rating: Violence, ProfanitySummary: The final hour of the popular virtual reality game Yggdrasil has come.

SearchToken: Used to select the keys and certificates to be recovered.

Can be any of the following:

Certutil Command Windows 10

  1. Certificate Common Name
  2. Certificate Serial Number
  3. Certificate SHA-1 hash (thumbprint)
  4. Certificate KeyId SHA-1 hash (Subject Key Identifier)
  5. Requester Name (domainuser)
  6. UPN (user@domain)

RecoveryBlobOutFile: output file containing a certificate chain and an associated private key, still encrypted to one or more Key Recovery Agent certificates.

OutputScriptFile: output file containing a batch script to retrieve and recover private keys.

OutputFileBaseName: output file base name. For retrieve, any extension is truncated and a certificate-specific string and the .rec extension are appended for each key recovery blob. Each file contains a certificate chain and an associated private key, still encrypted to one or more Key Recovery Agent certificates. For recover, any extension is truncated and the .p12 extension is appended. Contains the recovered certificate chains and associated private keys, stored as a PFX file.

[-f] [-UnicodeText] [-silent] [-config MachineCAName] [-p Password] [-ProtectTo SAMNameAndSIDList] [-csp Provider]

Return to Menu

-RecoverKey

CertUtil [Options] -RecoverKey RecoveryBlobInFile [PFXOutFile [RecipientIndex]]

Recover archived private key

Certutil Sha256

[-f] [-user] [-silent] [-split] [-p Password] [-ProtectTo SAMNameAndSIDList] [-csp Provider] [-t Timeout]

Return to Menu

-MergePFX

CertUtil [Options] -MergePFX PFXInFileList PFXOutFile [ExtendedProperties]

PFXInFileList: Comma separated PFX input file list

PFXOutFile: PFX output file

ExtendedProperties: Include extended properties

The password specified on the command line is a comma separated password list. If more than one password is specified, the last password is used for the output file. If only one password is provided or if the last password is '*', the user will be prompted for the output file password.

[-f] [-user] [-split] [-p Password] [-ProtectTo SAMNameAndSIDList] [-csp Provider]

Return to Menu

-ConvertEPF

CertUtil [Options] -ConvertEPF PFXInFileList EPFOutFile [cast | cast-] [V3CACertId][,Salt]

Convert PFX files to EPF file

PFXInFileList: Comma separated PFX input file list

EPF: EPF output file

cast: Use CAST 64 encryption

cast-: Use CAST 64 encryption (export)

V3CACertId: V3 CA Certificate match token. See -store CertId description.

Salt: EPF output file salt string

The password specified on the command line is a comma separated password list. If more than one password is specified, the last password is used for the output file. If only one password is provided or if the last password is '*', the user will be prompted for the output file password.

[-f] [-silent] [-split] [-dc DCName] [-p Password] [-csp Provider]

Return to Menu

Options

This section defines the options that you can specify with the command.

OptionsDescription
-nullsignUse hash of data as signature
-fForce overwrite
-enterpriseUse local machine Enterprise registry certificate store
-userUse HKEY_CURRENT_USER keys or certificate store
-GroupPolicyUse Group Policy certificate store
-utDisplay user templates
-mtDisplay machine templates
-UnicodeWrite redirected output in Unicode
-UnicodeTextWrite output file in Unicode
-gmtDisplay times as GMT
-secondsDisplay times with seconds and milliseconds
-silentUse silent flag to acquire crypt context
-splitSplit embedded ASN.1 elements, and save to files
-vVerbose operation
-privatekeyDisplay password and private key data
-pin PINSmart Card PIN
-urlfetchRetrieve and verify AIA Certs and CDP CRLs
-config MachineCANameCA and computer name string
-PolicyServer URLOrIdPolicy Server URL or Id. For selection U/I, use -PolicyServer. For all Policy Servers, use -PolicyServer *
-AnonymousUse anonymous SSL credentials
-KerberosUse Kerberos SSL credentials
-ClientCertificate ClientCertIdUse X.509 Certificate SSL credentials. For selection U/I, use -clientCertificate.
-UserName UserNameUse named account for SSL credentials. For selection U/I, use -UserName.
-Cert CertIdSigning certificate
-dc DCNameTarget a specific Domain Controller
-restrict RestrictionListComma separated Restriction List. Each restriction consists of a column name, a relational operator and a constant integer, string or date. One column name may be preceded by a plus or minus sign to indicate the sort order. Examples:
'RequestId = 47'
'+RequesterName >= a, RequesterName < b'
'-RequesterName > DOMAIN, Disposition = 21'
-out ColumnListComma separated Column List
-p PasswordPassword
-ProtectTo SAMNameAndSIDListComma separated SAM Name/SID List
-csp ProviderProvider
-t TimeoutURL fetch timeout in milliseconds
-symkeyalg SymmetricKeyAlgorithm[,KeyLength]Name of Symmetric Key Algorithm with optional key length, example: AES,128 or 3DES

Windows 7 Certutil Sha256

Return to Menu

Additional certutil examples

For some examples of how to use this command, see

Windows Certutil Md5

Return to Menu