I'm not sure what do you mean under "easier capability", but certain things definitely are possible. CA database reporting is very wide question a lot of people have different requirements, so there are no exact cmdlets to make specific reports. However, the module provides generic CA database query cmdlets which you can use for your own needs. For example:
In this query CA database will return issued certificates that were issued during last month based on WebServer certificate template and which contains "www.company.com" name in the SAN extension.
In this example CA database will return issued certificates that will expire in december 2015 (at any date between December 1 and December 31).
Generally, you may need to perform manual research on what data and how it is stored in the CA database and then construct a desired query.
Second, CA do not store KRA certificate information in clear way. You need to extract archived key (which is PKCS#7 blob) and only then you will be able to get KRA certificate that was used to encrypt the key.
- List of certificates issued based upon template x between y and z (simply providing common name and SAN)
# prepare filters$filters="CertificateTemplate -eq WebServer", "UPN -eq www.company.com", "NotBefore -gt $((Get-Date).AddMonths(-1))", "NotBefore -lt $(Get-Date)"# query CA database Get-CA ca01* | Get-IssuedRequest -Filter $filters
- All issued certificates (not revoked) about to expire in June 201x. (common name and expiry date)
# prepare filters:$filters="NotAfter -ge 12/01/2015 23:59:59""Notafter -le 12/31/2015 00:00:00"# query CA databse Get-CA ca01* | Get-IssuedRequest -Filter $filters
- All certificates revoked last year by Submitter X
Get-CA ca01* | Get-RevokedRequest -Filter "Request.RequesterName -eq Contoso\chipeater"
-
Archived certificates and their corresponding KRA certificate(s)
Second, CA do not store KRA certificate information in clear way. You need to extract archived key (which is PKCS#7 blob) and only then you will be able to get KRA certificate that was used to encrypt the key.