Quantcast
Channel: Public Key Infrastructure PowerShell module
Viewing all 729 articles
Browse latest View live

New Post: Is there a way to pull the Validity period for a particular certificate template?

$
0
0
I'm trying to audit the validity period on all of my certificate templates, but using the Get-ValidityPeriod doesn't allow me to specific a particular certificate template. I also tried pulling down the properties of the certificate Get-CertificateTemplate command, but that doesn't provide much details either. Is there a way to do this? Ideally I'd like to be able to pull down all the properties of a give template (validity period, renewal period, key length, etc).

thanks.

New Post: Problem running 3.0 version of the PSPKI module

$
0
0
There's seems to be a bug in the 3.0 version of the module. When I run the this command as a scheduled task using the system account, it returns null. However, if I uninstall 3.0 and reinstall 2.8, it works fine. Here's the command:

Get-CertificationAuthority "$caname" | Get-IssuedRequest -Filter "NotAfter -ge $(Get-Date)", "NotAfter -le $((Get-Date).AddMonths(1))"

I also tried running the task as a user and a domain admin with 3.0 installed. It only worked as a domain admin - which is not how I'd really prefer to run it.

Also - the 3.0 installer gives one the choice of installing the module for all users, however the install path remains the same even if you change it. I replicated this behavior several times on a new Windows Server 2012 R2 system.

New Post: Is there a way to pull the Validity period for a particular certificate template?

$
0
0
but that doesn't provide much details either
what do you mean? Get-CertificateTemplate contains all information about certificate template that is visible in the Certificate Templates MMC.

just to clarify: by default, Get-CertificateTemplate shows only basic information (it is formatted). In order to view all settings, you should pipe the result to a Format-List cmdlet:
Get-CertificateTemplate -Name WebServer | Format-List

New Post: Problem running 3.0 version of the PSPKI module

$
0
0
There is no difference between 2.8 and 3.0 in regards to task scheduler. But I'll check what is going on.

Created Unassigned: Changes to Module Requirements?? [74]

$
0
0
Hi All,

I have been happyily importing and approving Certificates via powershell script until this week, when I get the following error:

Import-Module : The specified module 'PSPKI' was not loaded because no valid module file was found in any module directory.
At \\HHH.int\DATA\IT\UK\SD\AccessControl\SecurityDocuments\Falcon\Issue MAC Certificate.ps1:1 char:14
+ Import-Module <<<< PSPKI
+ CategoryInfo : ResourceUnavailable: (PSPKI:String) [Import-Module], FileNotFoundException
+ FullyQualifiedErrorId : Modules_ModuleNotFound,Microsoft.PowerShell.Commands.ImportModuleCommand

Only change I can think off is that im running Powershell v1.0 and the PSPKI module now says its intended for Powershell v3.0, when did the module requirements change? from what i remember I have been using the PSPKI module for over a year without issue.

Patches and Updates to new versions are tightly controlled in my company so I dont have the option of updating to v3.0. the best they can do is v2.0 is there a older module that will work on 1 or 2

Thanks in advance

Commented Unassigned: Changes to Module Requirements?? [74]

$
0
0
Hi All,

I have been happyily importing and approving Certificates via powershell script until this week, when I get the following error:

Import-Module : The specified module 'PSPKI' was not loaded because no valid module file was found in any module directory.
At \\HHH.int\DATA\IT\UK\SD\AccessControl\SecurityDocuments\Falcon\Issue MAC Certificate.ps1:1 char:14
+ Import-Module <<<< PSPKI
+ CategoryInfo : ResourceUnavailable: (PSPKI:String) [Import-Module], FileNotFoundException
+ FullyQualifiedErrorId : Modules_ModuleNotFound,Microsoft.PowerShell.Commands.ImportModuleCommand

Only change I can think off is that im running Powershell v1.0 and the PSPKI module now says its intended for Powershell v3.0, when did the module requirements change? from what i remember I have been using the PSPKI module for over a year without issue.

Patches and Updates to new versions are tightly controlled in my company so I dont have the option of updating to v3.0. the best they can do is v2.0 is there a older module that will work on 1 or 2

Thanks in advance
Comments: This error means that the module is not installed in any module directory. Module requirements changed in PSPKI v3.0 and do not affect previous versions. Check if the module is installed and try again. It is not related to module requirements.

Created Unassigned: Get-CA Problem when ADCS is Stopped [75]

$
0
0
Hi Vadims,
I have two enterprise CAs in my test AD - if they are both in the running state the Get-CA command provides the following information (as expected):

__get-certificationauthority__
Chipeater Class 3 Primary CA PPC3P01.ppcnfoun... True Running Enterprise Subordinate CA
Chipeater Class 3 Secondary CA PPC3S01.ppcnfoun... True Running Enterprise Subordinate CA

However, if I stop ADCS on one of the CAs and run the Get-CA command again I get an error (rather than the CA being listed as stopped):

__get-certificationauthority__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"
At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PSPKI\Server\Get-CertificationAuthority.ps1:14 char:20
+ "__ComputerSet" {[PKI.CertificateServices.CertificateAuthority]::GetCA("Server ...

I only just realised this when I started using the EnterprisePKI PowerShell script you provided - which "blows up" on me if one of the Enterprise CAs is stopped (the error which I've included a snippet of below seems to be related to the Get-CA problem).

__.\EnterprisePKI.ps1__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"

Can you advise whether it is expected that a CA with ADCS stopped would cause this kind of behaviour?

Regards, Chipeater

Commented Unassigned: Get-CA Problem when ADCS is Stopped [75]

$
0
0
Hi Vadims,
I have two enterprise CAs in my test AD - if they are both in the running state the Get-CA command provides the following information (as expected):

__get-certificationauthority__
Chipeater Class 3 Primary CA PPC3P01.ppcnfoun... True Running Enterprise Subordinate CA
Chipeater Class 3 Secondary CA PPC3S01.ppcnfoun... True Running Enterprise Subordinate CA

However, if I stop ADCS on one of the CAs and run the Get-CA command again I get an error (rather than the CA being listed as stopped):

__get-certificationauthority__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"
At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PSPKI\Server\Get-CertificationAuthority.ps1:14 char:20
+ "__ComputerSet" {[PKI.CertificateServices.CertificateAuthority]::GetCA("Server ...

I only just realised this when I started using the EnterprisePKI PowerShell script you provided - which "blows up" on me if one of the Enterprise CAs is stopped (the error which I've included a snippet of below seems to be related to the Get-CA problem).

__.\EnterprisePKI.ps1__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"

Can you advise whether it is expected that a CA with ADCS stopped would cause this kind of behaviour?

Regards, Chipeater
Comments: Oops - forgot to mention I'm using PSPKI 3.0

Commented Unassigned: Get-CA Problem when ADCS is Stopped [75]

$
0
0
Hi Vadims,
I have two enterprise CAs in my test AD - if they are both in the running state the Get-CA command provides the following information (as expected):

__get-certificationauthority__
Chipeater Class 3 Primary CA PPC3P01.ppcnfoun... True Running Enterprise Subordinate CA
Chipeater Class 3 Secondary CA PPC3S01.ppcnfoun... True Running Enterprise Subordinate CA

However, if I stop ADCS on one of the CAs and run the Get-CA command again I get an error (rather than the CA being listed as stopped):

__get-certificationauthority__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"
At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PSPKI\Server\Get-CertificationAuthority.ps1:14 char:20
+ "__ComputerSet" {[PKI.CertificateServices.CertificateAuthority]::GetCA("Server ...

I only just realised this when I started using the EnterprisePKI PowerShell script you provided - which "blows up" on me if one of the Enterprise CAs is stopped (the error which I've included a snippet of below seems to be related to the Get-CA problem).

__.\EnterprisePKI.ps1__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"

Can you advise whether it is expected that a CA with ADCS stopped would cause this kind of behaviour?

Regards, Chipeater
Comments: looks like a bug, when CA is stopped, the object with common properties should appear and display that the service is stopped. Can you, please, provide me exception stack trace? And what ADCS versions you run? p.s. please, use "insert code" in wiki formatting to wrap stack trace (for better readability).

Commented Unassigned: Get-CA Problem when ADCS is Stopped [75]

$
0
0
Hi Vadims,
I have two enterprise CAs in my test AD - if they are both in the running state the Get-CA command provides the following information (as expected):

__get-certificationauthority__
Chipeater Class 3 Primary CA PPC3P01.ppcnfoun... True Running Enterprise Subordinate CA
Chipeater Class 3 Secondary CA PPC3S01.ppcnfoun... True Running Enterprise Subordinate CA

However, if I stop ADCS on one of the CAs and run the Get-CA command again I get an error (rather than the CA being listed as stopped):

__get-certificationauthority__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"
At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PSPKI\Server\Get-CertificationAuthority.ps1:14 char:20
+ "__ComputerSet" {[PKI.CertificateServices.CertificateAuthority]::GetCA("Server ...

I only just realised this when I started using the EnterprisePKI PowerShell script you provided - which "blows up" on me if one of the Enterprise CAs is stopped (the error which I've included a snippet of below seems to be related to the Get-CA problem).

__.\EnterprisePKI.ps1__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"

Can you advise whether it is expected that a CA with ADCS stopped would cause this kind of behaviour?

Regards, Chipeater
Comments: Hi Vadims, I'm not sure what is meant by a stack trace - is it just the error information that was displayed on screen? If so, here is the error when ADCS is stopped on one of the CAs: ``` PS C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSPKI> get-certificationauthority | format-list Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba (WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)" At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PSPKI\Server\Get-CertificationAuthority.ps1:14 char:20 + "__ComputerSet" {[PKI.CertificateServices.CertificateAuthority]::GetCA("Server ... + ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ + CategoryInfo : NotSpecified: (:) [], MethodInvocationException + FullyQualifiedErrorId : COMException ``` Regarding the ADCS versions, I did a Get-CA format list (with ADCS running on both CAs) so you can see all the relevant information: ``` Name : Chipeater Class 3 Primary CA DisplayName : Chipeater Class 3 Primary CA ComputerName : C3P01.Chipeater.uk ConfigString : C3P01.Chipeater.uk\Chipeater Class 3 Primary CA DistinguishedName : CN=Chipeater Class 3 Primary CA,CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=Chipeater Type : Enterprise Subordinate CA OperatingSystem : Microsoft Windows Server 2012 R2 Standard IsAccessible : True RegistryOnline : True ServiceStatus : Running SetupStatus : ServerInstall, SecurityUpgraded, ServerIsUptoDate Certificate : [Subject] CN=Chipeater Class 3 Primary CA [Issuer] CN=Chipeater Root CA [Serial Number] 61106757000000000003 [Not Before] 25/09/2014 14:21:00 [Not After] 25/09/2024 14:21:00 [Thumbprint] 14E5C592775BC6E2460B0E8C39DC9670A682DEA9 BaseCRL : System.Security.Cryptography.X509Certificates.X509CRL2 DeltaCRL : EnrollmentServiceURI : Name : Chipeater Class 3 Secondary CA DisplayName : Chipeater Class 3 Secondary CA ComputerName : C3S01.Chipeater.uk ConfigString : C3S01.Chipeater.uk\Chipeater Class 3 Secondary CA DistinguishedName : CN=Chipeater Class 3 Secondary CA,CN=Enrollment Services,CN=Public Key Services,CN=Services,CN=Configuration,DC=Chipeater Type : Enterprise Subordinate CA OperatingSystem : Microsoft Windows Server 2012 R2 Standard IsAccessible : True RegistryOnline : True ServiceStatus : Running SetupStatus : ServerInstall, SecurityUpgraded, ServerIsUptoDate Certificate : [Subject] CN=Chipeater Class 3 Secondary CA [Issuer] CN=Chipeater Root CA [Serial Number] 6116CB92000000000004 [Not Before] 25/09/2014 14:27:59 [Not After] 25/09/2024 14:27:59 [Thumbprint] 6BCCBF47EF6F15C0FBAF9C17FDC63428847DA99F BaseCRL : System.Security.Cryptography.X509Certificates.X509CRL2 DeltaCRL : EnrollmentServiceURI : ``` Note: I have done a very lazy anonymisation effort on the output so some of the names are messed up badly and don't make sense. I have installed PSPKI (and am running the Get-CA command) from a Win2012 R2 member server (not one of the ADCS servers). Regards, Chipeater

Commented Unassigned: Get-CA Problem when ADCS is Stopped [75]

$
0
0
Hi Vadims,
I have two enterprise CAs in my test AD - if they are both in the running state the Get-CA command provides the following information (as expected):

__get-certificationauthority__
Chipeater Class 3 Primary CA PPC3P01.ppcnfoun... True Running Enterprise Subordinate CA
Chipeater Class 3 Secondary CA PPC3S01.ppcnfoun... True Running Enterprise Subordinate CA

However, if I stop ADCS on one of the CAs and run the Get-CA command again I get an error (rather than the CA being listed as stopped):

__get-certificationauthority__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"
At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PSPKI\Server\Get-CertificationAuthority.ps1:14 char:20
+ "__ComputerSet" {[PKI.CertificateServices.CertificateAuthority]::GetCA("Server ...

I only just realised this when I started using the EnterprisePKI PowerShell script you provided - which "blows up" on me if one of the Enterprise CAs is stopped (the error which I've included a snippet of below seems to be related to the Get-CA problem).

__.\EnterprisePKI.ps1__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"

Can you advise whether it is expected that a CA with ADCS stopped would cause this kind of behaviour?

Regards, Chipeater
Comments: I don't need a console output. I need a call stack of the exception: ``` PowerShell $error[0].exception.InnerException.StackTrace ``` call this command immediately the error appears.

Commented Unassigned: Get-CA Problem when ADCS is Stopped [75]

$
0
0
Hi Vadims,
I have two enterprise CAs in my test AD - if they are both in the running state the Get-CA command provides the following information (as expected):

__get-certificationauthority__
Chipeater Class 3 Primary CA PPC3P01.ppcnfoun... True Running Enterprise Subordinate CA
Chipeater Class 3 Secondary CA PPC3S01.ppcnfoun... True Running Enterprise Subordinate CA

However, if I stop ADCS on one of the CAs and run the Get-CA command again I get an error (rather than the CA being listed as stopped):

__get-certificationauthority__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"
At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PSPKI\Server\Get-CertificationAuthority.ps1:14 char:20
+ "__ComputerSet" {[PKI.CertificateServices.CertificateAuthority]::GetCA("Server ...

I only just realised this when I started using the EnterprisePKI PowerShell script you provided - which "blows up" on me if one of the Enterprise CAs is stopped (the error which I've included a snippet of below seems to be related to the Get-CA problem).

__.\EnterprisePKI.ps1__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"

Can you advise whether it is expected that a CA with ADCS stopped would cause this kind of behaviour?

Regards, Chipeater
Comments: Hi Vadims, Here is the output: ``` PS > $error[0].exception.innerexception.stacktrace at CERTADMINLib.CCertAdminClass.GetCAProperty(String strConfig, Int32 PropId, Int32 PropIndex, Int32 PropType, Int32 Flags) at PKI.CertificateServices.CertificateAuthority.BuildKeyMap() at PKI.CertificateServices.CertificateAuthority.initialize() at PKI.CertificateServices.CertificateAuthority.initializeFromConfigString(String computerName, String name) at PKI.CertificateServices.CertificateAuthority..ctor(String computerName, String name) at PKI.CertificateServices.CertificateAuthority.GetCA(String findType, String findValue) at CallSite.Target(Closure , CallSite , RuntimeType , String , String ) ``` I get the exact same stacktrace ouput when I run this command with both CA's ADCS running or with ADCS stopped on one CA (which results in the Get-CA error). I don't know if this sounds right? Cheers, Chipeater

Commented Unassigned: Get-CA Problem when ADCS is Stopped [75]

$
0
0
Hi Vadims,
I have two enterprise CAs in my test AD - if they are both in the running state the Get-CA command provides the following information (as expected):

__get-certificationauthority__
Chipeater Class 3 Primary CA PPC3P01.ppcnfoun... True Running Enterprise Subordinate CA
Chipeater Class 3 Secondary CA PPC3S01.ppcnfoun... True Running Enterprise Subordinate CA

However, if I stop ADCS on one of the CAs and run the Get-CA command again I get an error (rather than the CA being listed as stopped):

__get-certificationauthority__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"
At C:\Windows\system32\WindowsPowerShell\v1.0\Modules\PSPKI\Server\Get-CertificationAuthority.ps1:14 char:20
+ "__ComputerSet" {[PKI.CertificateServices.CertificateAuthority]::GetCA("Server ...

I only just realised this when I started using the EnterprisePKI PowerShell script you provided - which "blows up" on me if one of the Enterprise CAs is stopped (the error which I've included a snippet of below seems to be related to the Get-CA problem).

__.\EnterprisePKI.ps1__
Exception calling "GetCA" with "2" argument(s): "CCertAdmin::GetCAProperty: The RPC server is unavailable. 0x800706ba
(WIN32: 1722 RPC_S_SERVER_UNAVAILABLE)"

Can you advise whether it is expected that a CA with ADCS stopped would cause this kind of behaviour?

Regards, Chipeater
Comments: yes, it is exactly what I need.

Created Unassigned: WARNING: Non-request or non-CRL table row removal is not supported. [76]

$
0
0
Hi,

I'm running the following command from the PSPKI 3.0 module on a Windows Server 2012 R2 Certficate Authority box

Get-CertificationAuthority "xxxxxxxx" | Get-FailedRequest | Remove-DatabaseRow

I receive the following error

WARNING: Non-request or non-CRL table row removal is not supported.

Commented Unassigned: WARNING: Non-request or non-CRL table row removal is not supported. [76]

$
0
0
Hi,

I'm running the following command from the PSPKI 3.0 module on a Windows Server 2012 R2 Certficate Authority box

Get-CertificationAuthority "xxxxxxxx" | Get-FailedRequest | Remove-DatabaseRow

I receive the following error

WARNING: Non-request or non-CRL table row removal is not supported.
Comments: Thanks for report. The issue is with Remove-DatabaseRow. If you wish, you can fix it yourself. Change 45th line: ``` PowerShell if ($Req.Table -ne "Request" -or $Req.Table -ne "CRL") { ``` with ``` PowerShell if ($Req.Table -ne "Request" -and $Req.Table -ne "CRL") { ``` There is just a wrong operator. I'll fix this in the next official release.

Edited Unassigned: WARNING: Non-request or non-CRL table row removal is not supported. [76]

$
0
0
Hi,

I'm running the following command from the PSPKI 3.0 module on a Windows Server 2012 R2 Certficate Authority box

Get-CertificationAuthority "xxxxxxxx" | Get-FailedRequest | Remove-DatabaseRow

I receive the following error

WARNING: Non-request or non-CRL table row removal is not supported.

Commented Unassigned: WARNING: Non-request or non-CRL table row removal is not supported. [76]

$
0
0
Hi,

I'm running the following command from the PSPKI 3.0 module on a Windows Server 2012 R2 Certficate Authority box

Get-CertificationAuthority "xxxxxxxx" | Get-FailedRequest | Remove-DatabaseRow

I receive the following error

WARNING: Non-request or non-CRL table row removal is not supported.
Comments: Hi Camelot, Great. Works fine. Thanks for the fast help. Kind regards Mikca1

Created Unassigned: New-SelfSignedCertificateEx unused parameter 'StoreName' [77]

$
0
0
New-SelfSignedCertificateEx has an unused parameter 'StoreName'. This parameter is not implemented and should be completely removed.

Created Unassigned: X509CRLDistributionPointsExtension do not support segmented CRLs [78]

$
0
0
X509CRLDistributionPointsExtension class do not support segmented CRLs and fails if more than one DistributionPoint is defined in the extension.

Created Unassigned: NotImplementedException - PSPKI.psm1 [79]

$
0
0
I didn't use the installer, because I want to Import the module by hand.

By I get this error NotImplementedException, could it be, that the order of the modules is wrong?
The function Write-ErrorMessage was importet after it was called from PSPKI.psm1?


```
VERBOSE: Loading module from path 'C:\PowerShellRepro\Modules\PSPKI\PSPKI.psd1'.
VERBOSE: Loading 'Assembly' from path 'C:\PowerShellRepro\Modules\PSPKI\Library\PKI.Core.dll'.
VERBOSE: Loading 'Assembly' from path 'C:\PowerShellRepro\Modules\PSPKI\Library\Interop.CERTADMINLib.dll'.
VERBOSE: Loading 'Assembly' from path 'C:\PowerShellRepro\Modules\PSPKI\Library\Interop.CERTCLILib.dll'.
VERBOSE: Loading 'Assembly' from path 'C:\PowerShellRepro\Modules\PSPKI\Library\Interop.CERTENROLLLib.dll'.
VERBOSE: Loading 'TypesToProcess' from path 'C:\PowerShellRepro\Modules\PSPKI\Types\PSPKI.Types.ps1xml'.
VERBOSE: Loading 'FormatsToProcess' from path 'C:\PowerShellRepro\Modules\PSPKI\Types\PSPKI.Format.ps1xml'.
VERBOSE: Loading module from path 'C:\PowerShellRepro\Modules\PSPKI\PSPKI.psm1'.
Write-ErrorMessage : Exception of type 'Microsoft.PowerShell.Commands.WriteErrorException' was thrown.
At C:\PowerShellRepro\Modules\PSPKI\PSPKI.psm1:122 char:9
+ catch {Write-ErrorMessage -Source "CAPIUnavailable"}
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : NotImplemented: (:) [Write-Error], WriteErrorException
+ FullyQualifiedErrorId : NotImplementedException,Write-ErrorMessage

VERBOSE: Exporting function '__RestartCA'.
VERBOSE: Exporting function 'Test-XCEPCompat'.
VERBOSE: Exporting function 'Ping-Wmi'.
VERBOSE: Exporting function 'Ping-ICertAdmin'.
VERBOSE: Exporting function 'Write-ErrorMessage'.
VERBOSE: Importing function 'Ping-ICertAdmin'.
VERBOSE: Importing function 'Ping-Wmi'.
VERBOSE: Importing function 'Test-XCEPCompat'.
VERBOSE: Importing function 'Write-ErrorMessage'.
VERBOSE: Importing function '__RestartCA'.
```
Viewing all 729 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>