Adding Active Directory users to a group by Display Name with PowerShell

21 08 2011

There are a number of ways to do this, including simply pasting the users’ display names into the Add Member box in Active Directory Users & Computers and clicking through the errors by hand. If you’re like me, and don’t like having to deal with things like this manually, then PowerShell is the way to go. Read the rest of this entry »





FIX: “The security database on the server does not have a computer account for this workstation trust relationship”

2 03 2011

I’ve seen a lot of solutions, or suggestions rather, with regard to the error in the title of this post.  In my experience, the problem can almost always be resolved without extra domain add/removes and reboots, which is the most prevalent solution I have seen around.  Usually, this issue is due to a mismatch between attributes of the computer account in Active Directory and those values on the system itself.  Here are the steps I take to fix this issue when it crops up: Read the rest of this entry »





CertEnroll::Cx509Enrollment::p_InstallResponse: ASN1 bad tag value met. 0x8009310b

4 12 2009

I have been trying all day to install a certificate on a Server 2008 (x86) VM for use with TS Gateway. I got a few different errors and thought something was up with my VeriSign request…

Here’s the one that ended up getting me the rest of the way:

CertEnroll::Cx509Enrollment::p_InstallResponse: ASN1 bad tag value met. 0x8009310b

And the article I found that helped me out:

http://blogs.msdn.com/vijaysk/archive/2008/11/25/certenroll-cx509enrollment-p-installresponse-asn1-bad-tag-value-met-0x8009310b.aspx

Specifically the command listed in the post:

certutil –repairstore my “00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f”

Where the part in quotes is the thumbprint of the affected certificate. Thanks a bunch to Vijayshinva Karnure!