I migrated a Windows 2008 R2 DC and Enterprise Root CA to a new Windows 2016 DC and CA. Everything seemed stable except I had a few RODCs and writeable DCs that were showing "Failed Requests" in the CA for their auto enrollment of the KerberosAuthentication Certificate.
The error is:
Event ID: 13
Certificate enrollment for Local system failed to enroll for a KerberosAuthentication certificate with request ID 1052 from CAServer.domain.com\domain-CAServer-CA (The RPC server is unavailable. 0x800706ba (WIN32: 1722)).
Along with:
Event ID: 6
Automatic certificate enrollment for local system failed (0x800706ba) The RPC server is unavailable.
All other auto enrollments work from these DCs, and most of the DCs do not exhibit this behavior, enrolling just fine for all certs including the KerberosAuthentication Certificate.
What is causing these particular clients to fail auto-enrolling just this KerberosAuthentication Certificate?
After researching this out and trying multiple CA certutil commands among other things I'll skip straight to the actual answer that worked for me:
Most of the time something like "RPC server is unavailable" can be attributed to network connectivity issues or firewall rules.
However, in my case the DCs having issues weren't running the Windows Firewall. BUT it turns out that was the very issue. Someone had decided instead of turning off the firewall (not best practice btw, but I digress) in the Network and Sharing Center, they instead Disabled the Windows Firewall service itself.
This is actually a bad idea as discussed here: How can I back up my recommendation to NOT disable the Windows Firewall service?
Answer:
Windows Firewall
service and set it to Automatic startup.Control Panel, System and Security, Windows Firewall
for the Domain network, etc. as required.certutil -pulse
on the problematic DCUser contributions licensed under CC BY-SA 3.0