The Certificate Services Setup code constructs a Public-Key Cryptography Standard #10 (PKCS #10) request that contains an array of X.509 extensions that should be included in the issued certificate. If the policy statement is included in a properly formatted Capolicy.inf file located in %SystemRoot%, the policy statement information is included in the request sent to the server.
When the PKCS #10 request is submitted to the certification authority (CA), the CA's policy module must take action to put the policy statement information that is included with the request into the appropriate extension in the certificate.
By design, extensions included in requests are added to the certificate server database, but are not included in the certificate. Certificate Services relies upon its configuration information in the registry to determine exactly which extensions to transfer from a request to the certificate. To check the current settings, perform the following steps:
- On the CA that will process requests that have policy statements, start the Cmd.exe program.
- Type the following command line, and then press ENTER:
certutil -v -getreg Policy\EnableRequestExtensionList
- The returned information should resemble the following:
EnableRequestExtensionList REG_MULTI_SZ =
0: 2.5.29.37 -- Enhanced Key Usage
1: 2.5.29.15 -- Key Usage
2: 2.5.29.17 -- Subject Alternative Name
3: 1.3.6.1.4.1.311.21.1 -- CA Version
4: 2.5.29.32 -- Certificate Policies
If the Certificate Policies object identifier (OID) is missing, the policy module does not transfer the policy statement information from the PKCS #10 request to the issued certificate.