Specially the template below "subject name" tab. What does that change in the normal certificate request other than that there is an additional step to put information in the subject tab while enrolling for a certificate. What is the role of Subject Names (SN) / Subject Alternative Names (SAN) in Microsoft Public Key Infrastructure (PKI)?
The current issue which I cannot resolve is an issue related to a name mismatch and certificate warning. In my case, I am connecting via VPN + private IP address + RDP to the server, but when I connect, the "requested remote computer" name is the private IP address of the server (ex. 10.20.30.20).
This would be first name and first initial of last name. Some users have first name underscore last name. Needless to say, I'd like to make them conform to the standard. Before making the change in Active Directory to adhere to the new standard, is there anything I need to be aware of that will help me as I make the change?
Ideally I'd like to send a link via staff email that staff could click on to reveal their computer name. (Specifically first part of the 'Long computer name' found in the second tab of My Computer
On the Subject tab in the Certificate Properties, enter a suitable Common name for the Subject, if required In the Alternative names section, select Type: DNS and add the FQDNs for the desired SANs. Options for key usage and so on should be preconfigured on the other tabs.
You can see all the GPOs with their GUIDs here Import-Module GroupPolicy Get-GPO -All | ogv Enter any of the text you're looking for (such as GUID) in the filter box to narrow down the results. Instead of -ALL use the GUID to just get the details on the one GUID that you're interested in, or pipe through select and where instead of ogv to narrow down the results in powershell.