STIGhubSTIGhub
STIGsSearchCompareAbout

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • VPAT
  • DISA STIG Library
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Active Directory Forest Security Technical Implementation Guide

V-269098

CAT I (High)

Windows Server hosting Active Directory Certificate Services (AD CS) must enforce Certificate Authority (CA) certificate management approval for certificate requests.

Rule ID

SV-269098r1106505_rule

STIG

Active Directory Forest Security Technical Implementation Guide

Version

V3R2

CCIs

CCI-000366

Discussion

When users are requesting new certificates through AD CS, there must be management approval and awareness for these requests. Without this, a user or bad actor could request certificates they should not have or should not have access to.

Check Content

Certificate templates with the following extended key usages AND that allow a requestor to supply the subject name in the request require manual approval. In the AD CS web server properties, select "VulnerableCertTemplate" properties. Verify that "Subject Name" and "Supply in the request" are selected.

If "Subject Name" AND "Supply in the request" are selected and if manual approval is not required, this is a finding. 

If the "Supply in Request" is NOT selected, and the Enroll Permissions for the template have been limited to a select group of users/administrators, this is not a finding.

Fix Text

In the AD CS web server properties, select "VulnerableCertTemplate" properties and then select "Subject Name" and "Supply in the request".

Certificate templates with the following extended key usages must require manual approval in all cases:
  i. Smart Card Logon (1.3.6.1.4.1.311.20.2.2).
 ii. Any Purpose EKU (2.5.29.37.0).
iii. No EKU set. i.e., this is a (subordinate) CA certificate.

Certificate templates with the following extended key usages AND that allow a requestor to supply the subject name in the request must require manual approval:
  i. Client Authentication (1.3.6.1.5.5.7.3.2).
 ii. PKINIT Client Authentication (1.3.6.1.5.2.3.4).
iii. Supply in request" setting:  VulnerableCertTemplate Properties.