Hello Vinay,
Thank you for posting question on Microsoft Windows Forum.
Based on your query of directly forcing the Authority Key Identifier (AKI) to match the Subject Key Identifier (SKI) in the root certificate during initial ADCS installation via CAPolicy.inf which is, unfortunately, not directly supported in the way you are attempting. The followings are the plausible explanations to that.
1.Root CA AKI:
- For a self-signed root certificate, the Authority Key Identifier (AKI) should conceptually point to itself. In practice, for a root CA, the AKI is often either omitted or, if present, it typically matches its own Subject Key Identifier (SKI). ADCS by default handles this for a root CA.
2.ADCS Behavior for Root CAs:
- When you install a standalone or enterprise root CA, ADCS generates a self-signed certificate. By design, for a self-signed certificate, the AKI typically isn't present or, if it is, it is the same as the SKI of that same certificate. This is the expected and RFC-compliant behavior for a root CA.
3.CAPolicy.inf Cannot Copy the SKI into the AKI:
- CAPolicy.inf is processed at CA install/renewal time to apply static extensions to the root certificate. It does not support dynamic placeholders or references—so lines such as 2.5.29.35 = true or 2.5.29.35 = 2.5.29.14 are ignored (or overwritten) by ADCS’s built-in certificate generation logic. In short, you cannot tell ADCS “take whatever SKI you generated, and reuse it as the AKI” via CAPolicy.inf
- For more information https://techcommunity.microsoft.com/blog/askds/windows-server-2008-r2-capolicy-inf-syntax/397200
Hope the above information is helpful!