Thank you, this is helpful.
To clarify the practical deployment scenario in our environment:
- We use AD CS Enterprise subordinate CAs
- We issue user certificates for S/MIME and EFS
- The template has “Archive subject’s encryption private key” enabled
- The CA has valid KRA certificates configured before issuance
- However, certificates enrolled via our current Windows enrollment path still result in empty archived key blobs or CERTSRV_E_ARCHIVED_KEY_REQUIRED
Could you please clarify:
- Which built-in Windows enrollment methods actually submit CMC requests suitable for key archival for user certificates?
- Does standard enterprise autoenrollment submit a CMC request for such templates?
- Does MMC / certmgr.msc / Request New Certificate submit CMC or PKCS#10 in this scenario?
- Is custom enrollment through CertEnroll (IX509CertificateRequestCmc) required if we want reliable private key archival for user S/MIME/EFS certificates?
We want to understand whether this is expected behavior of the built-in enrollment clients, or whether a custom CMC-based enrollment flow is required.