Why is the OID Missing in the SAN for My Certificates?

0
1
Asked By TechWhiz1234 On

Hey everyone! I'm having an issue with our CA. We use online templates linked to Active Directory, which includes the UPN. Despite having all the latest Microsoft patches applied, the OID I'm looking for is not showing up in the issued certificates' SAN as expected. After applying a patch to the DC post-September 10, it seems like our authentications take a hit due to missing strong mapping. Specifically, I'm trying to confirm if anyone has insight into why the OID 1.3.6.1.4.1.311.25.2 isn't appearing in our environment.

3 Answers

Answered By SystemGuru91 On

I understand your frustration. That article offers some workarounds, but if the OID is just missing, that’s concerning. It sounds like the alternative setups like adjusting the altsecurityidentifier can be really complex and daunting.

Answered By TroubleshooterX On

You should also take a look at the registry settings mentioned in the same article; sometimes that can fix the missing attributes issue.

Answered By BackupPlan99 On

You might want to check out this Microsoft support article: https://support.microsoft.com/en-us/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16. It covers some changes in certificate-based authentication that could affect you.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.