Enterprise PKI (pkiview.msc) Not Displaying CDP/AIA Locations – Stuck at Blank Screen

Shub 5 Reputation points
2025-06-27T14:26:34.43+00:00

We are facing an issue with pkiview.msc (Enterprise PKI console) on our Intermediate CA (Subordinate Enterprise CA joined to domain). When launching the console, it opens but does not display the CDP (CRL Distribution Point) or AIA (Authority Information Access) locations—it appears blank or stuck at loading.

  • Root CA: Standalone CA (Workgroup machine)
  • Intermediate CA: Subordinate Enterprise CA (Domain joined)

Issue :

  • pkiview.msc opens but does not display any CDP/AIA information.
  • The console remains blank or stuck without loading the PKI view.

Troubleshooting Done:

Verified CA object exists in Active Directory.

Verified CDP and AIA entries are properly populated in the CA configuration.

Checked the following folders using ADSI Edit:

CN=CDP, CN=Public Key Services, CN=Services, CN=Configuration, DC=...

  `CN=AIA, CN=Public Key Services, CN=Services, CN=Configuration, DC=...`
  
  Ran `certutil -dcinfo verify` → Output: **successful**
  
  Ran `certutil -config - -ping` → Output: **successful**
  

We have verified network connectivity and permissions. All relevant CRL and AIA locations are configured in the Intermediate CA certificate and registry.

How can we resolve this issue and get pkiview.msc to properly display the CA hierarchy, CRL and AIA location information?

User's image

Windows for business | Windows Server | Directory services | Certificates and public key infrastructure (PKI)
0 comments No comments
{count} vote

1 answer

Sort by: Most helpful
  1. Chen Tran 1,645 Reputation points Independent Advisor
    2025-07-02T07:43:49.7833333+00:00

    Hello,

    Thank you for posting question on Microsoft Windows Forum.

    Based on your issue description, the fact is that certutil -dcinfo verify and certutil -config - -ping are successful indicates that the CA object is present in Active Directory and basic communication is working. However, pkiview.msc relies on more than just basic connectivity; it needs to be able to retrieve the actual certificates and CRLs from the published CDP and AIA locations. You can try the following potential suggested troubleshooting steps for this issue.

    1.Verify DCOM Permissions:

    • The PKI console uses DCOM to connect to the CA. The account running the console must have DCOM access to the CA server. Check DCOM permissions for the Certificate Services DCOM application:
    1. Open dcomcnfg

    Navigate to Component Services > Computers > My Computer > DCOM Config

    Find CertSrv Request application

    1. In Properties > Security:
      • Ensure Local Launch and Local Activation permissions include:
      • NT AUTHORITY\NETWORK SERVICE
      • BUILTIN\Administrators
        Intermediate CA computer account
        

    2.Reset the MMC Console Settings:

    • Close all MMC instances
    • The MMC console might have corrupted settings. Reset the MMC by deleting the following file (if exists):
    • %AppData%\Microsoft\MMC\pkiview.msc
    • After deleting, try reopening pkiview.msc.

    3.Verify Intermediate CA Certificate in AIA:

    • If it is an LDAP location, it should be in CN=AIA, CN=Public Key Services, CN=Services, CN=Configuration, DC=.... If it's an HTTP location (IIS), ensure the .crt file is present in the specified web directory with correct NTFS and IIS permissions (read access for "Everyone" or "Authenticated Users," and anonymous access not blocked).

    4.Verify Intermediate CA CRLs in CDP:

    • For LDAP, verify the CRLs exist in CN=CDP, CN=Public Key Services, CN=Services, CN=Configuration, DC=.... For HTTP, verify the .crl files are in the web directory with proper permissions.

    5.Permissions and Network Access:

    • Firewall: Ensure no firewalls (Windows Firewall on the CA, domain firewall, network firewalls) are blocking HTTP (port 80) or LDAP (port 389/3268) access to the CDP and AIA locations.
    • IIS (if applicable): If you're using IIS for HTTP-based CDP/AIA, ensure the anonymous authentication is enabled on the virtual directory hosting the CRLs and certificates, and that the physical path has appropriate NTFS permissions for the IIS application pool identity (or "Everyone" for testing).
    • Proxy Settings: If your Intermediate CA is behind a proxy server, ensure that the proxy settings allow access to the CDP/AIA URLs. pkiview.msc runs in the context of the user or system, so proxy settings might interfere.

    7.Check Event Logs:

    • Open Event Viewer and navigate to:
    • Applications and Services Logs > Microsoft > Windows > CertificateServicesClient User's image
    • System logs
    • Look for any errors or warnings that might indicate the cause.

    8.Debug PKI View:

    • Run following command for logging
    • mmc /trace C:\pkiview.log
    • Then open pkiview.msc and inspect the log

    Hope the above information is helpful!

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.