Trouble Logging into Windows with Smartcards – Need Help!

0
12
Asked By TechLover99 On

Over the weekend, I've run into a major issue with logging into Windows using smartcards (Yubikeys). I keep seeing a message saying, "Revocation status of the smartcard certificate used for authentication could not be determined." I'm pretty sure there's something wrong with our Certificate Authority (CA), but unfortunately, I can't access it to make any fixes. Just to give you an idea of the current situation:

1. LDAP authentication still seems to be working, so I think non-smartcard accounts might be able to log in if I had access to one.
2. Most users, including myself, can still log into our local workstations when off-network. I can gain local admin rights on my machine if that's necessary.
3. Our Root Certificate and MSCS Intermediate CA certificates are still valid.
4. We have a Group Policy that mandates smartcard logins.
5. I don't have any network-accessible admin accounts that can log in with just a password since they're all service accounts.
6. Local admin passwords are stored in LAPS, but I can't access the DC VMs to retrieve them.
7. I do have an endpoint management tool that allows basic operations like reboots, but a reboot of our CA didn't help the situation.
8. I'm hesitant to turn off a VM because I might not be able to restart it without access to the VM host.
9. If I manage to set up a local admin account for safe mode, it seems like GPO will just remove it afterward.

Given all this, does anyone have suggestions for what I can do next?

4 Answers

Answered By CleverHacker51 On

Sounds like the issue could be related to the Certificate Revocation List (CRL). You might want to check where the CRL is trying to fetch from and make sure that your machine is online and can access that location. If the CRL has expired, you'll need to figure out how to publish a new one, although I’m not entirely sure how to approach that in AD CS.

InfoSeeker22 -

That's a good point. I can't access the CA to see where it's checking for the CRL, but I do know it's only using the LDAP location right now.

Answered By NetworkNinja88 On

You mentioned you’re only publishing your CRL via LDAP, which might be your first mistake here. Plus, it sounds like you don’t have any breakglass accounts available. You're somewhat trapped in a catch-22 situation. If you have the directory services restore mode (DSRM) password for your domain controller, you could start a DC in DSRM mode to change group policies. This would allow you to delete or rename the policies enforcing smartcard logins, letting you back in. Also, consider switching to HTTP for CRL publishing – that’s Microsoft's recommendation.

TechLover99 -

Thanks for the advice! I do have a CRL in place, but currently, it's only being accessed through LDAP. I'm trying to find a way to log into one of the domain controller VMs.

Answered By CuriousITGuy On

Just checking, did any of your root or other CA keys expire recently? That could definitely complicate things.

TechLover99 -

No, as I mentioned before, both our intermediate and Root certificates are in good standing with a long time before expiration.

Answered By CertChecker77 On

If you want to do some troubleshooting, you can open pkiview.msc to see what it reports – it could give you some leads on what's wrong with the certificates.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.