Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

4. Verify operating system distribution

We're calling for all solutions! If you'd like to share your agency's playbook on how to verify the distribution of a trusted root CA certificate to an operating system trust store, create an issue on GitHub or email us at fpkirootupdate@gsa.gov.

To verify that the Federal Common Policy CA (FCPCA) G2 certificate has been distributed to your agency’s workstations and devices, use one of these options:

Microsoft Solutions

macOS Solutions

iOS Solutions

Linux/Unix Solutions



Microsoft Solutions

Use BigFix

  1. Download the BigFix Enterprise Suite (.bes) analysis file: FPKIRootG2Detection.bes.

  2. Use Certutil or another tool to verify the .bes file’s SHA-256 hash (required):

           certutil -hashfile [DOWNLOAD_LOCATION]\FPKIRootDetection.bes SHA256
    
  3. The file’s hash must match this one:

           03bca16f7d21be344d954105b5ccb3caf578588cf6b8bd6f1cd03dfe298361bb
    
  4. Log into BigFix:  Start > IBM BigFix > IBM BigFix Console.
  5. Import the FPKIRootG2Detection.bes file:  File > Import > Open.

    The Create Analysis window appears.

  6. Assign the file:  for Create in site, select site name, and for Create in domain, select domain name. Click Okay.
  7. On the left side panel, click Analyses to see a list of imported analysis files.
  8. Click Federal Common Policy CA G2 Distribution Detection (i.e., FPKIRootG2Detection.bes) and click the Results tab to see the distribution analysis. If the analysis was not activated by default, right-click the file and then click Activate Globally.
  9. For each workstation or device listed, “Has FCPCA G2 Been Distributed?” should say True. If False, you’ll need to investigate the cause of the failure. If you can’t find a cause, please contact us at fpkirootupdate@gsa.gov.

    Sample Output.

Use LANDesk 2016

  1. Open LANDesk 2016:  Start > LANDesk Management > Desktop Manager.
  2. Create a custom registry data item:  Tools > Reporting/Monitoring > Manage software list.
  3. Expand Custom Data, and click Registry items.
  4. Click Add to add a new registry item.
  5. Add the data shown below for Windows 32-bit or 64-bit versions, based on GPO or Certutil distribution of FCPCA G2.

    Microsoft Windows 32-bit Versions

    • GPO Distribution
        Root Key: HKLM
        Key: SOFTWARE\Policies\Microsoft\SystemCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028
        Value: BLOB
        Attribute Name: Custom Data – FCPCAG2Win32 GPO – Certificate
      
    • Certutil Distribution
        Root Key: HKLM
        Key: SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028
        Value: BLOB
        Attribute Name: Custom Data – FCPCAG2Win32 certutil – Certificate
      

    Microsoft Windows 64-bit Versions

    • GPO Distribution
        Root Key: HKLM
        Key: SOFTWARE\WOW6432Node\Policies\Microsoft\SystemCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028
        Value: BLOB
        Attribute Name: Custom Data – FCPCAG2Win64 GPO - Certificate
      
    • Certutil Distribution
        Root Key: HKLM
        Key: SOFTWARE\WOW6432Node\Microsoft\EnterpriseCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028
        Value: BLOB
        Attribute Name: Custom Data – FCPCAG2Win64 certutil - Certificate
      
  6. Create a query for the registry item:  on the left side panel, expand Network View, and click Queries.
  7. Right-click My Queries, select New Query, and enter a query name (e.g., FCPCA G2 Verification: Win32 Machines).
  8. Under Machine Component, expand Computer, click Custom Data, and select the registry item.
  9. For Boolean, select Exists.
  10. For Displayed Scanned Values, click Insert and add the BLOB value from above.
  11. Double-click the new query name to verify FCPCA G2 distribution. The results will be similar to these:

    Sample Output.

Use Microsoft Certificate Manager

  1. Open Microsoft Certificate Manager:  Start; then type certlm.msc and press Enter.
  2. Go to Trusted Root Certification Authorities > Certificates. To see whether FCPCA G2 was successfully distributed, look for Federal Common Policy CA G2 shown with Intended Purposes of ALL and a Friendly Name of None, as shown here:

    Trusted Root CA Certificates List.

Optional:

  1. Open Microsoft Certificate Manager:  Start; then type certlm.msc and press Enter.
  2. Select Trusted Root Certification Authorities from the left side panel, then select View > Options.
  3. In the View Options box, select the Physical certificate stores checkbox.
  4. On the left side panel, click the > icon next to Trusted Root Certification Authorities to see the subdirectories.
  5. Verify the distribution of FCPCA G2:
    • For Certutil-distributed copies of FCPCA G2, click Enterprise > Certificates. FCPCA G2 should appear in the certificates list.
    • For GPO-distributed copies of FCPCA G2, click Group Policy > Certificates. FCPCA G2 should appear in the certificates list.

Use Microsoft Registry Editor

  1. Verify that FCPCA G2 has been distributed to a specific workstation or device:  open the Microsoft Registry Editor:  Start; type regedit.exe and press Enter.
  2. The following registry keys will appear for GPO- or Certutil-distributed copies of FCPCA G2:

GPO-distributed FCPCA G2:

- HKLM:\SOFTWARE\Policies\Microsoft\SystemCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028\
- HKLM:\SOFTWARE\WOW6432Node\Policies\Microsoft\SystemCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028\ 

Certutil-distributed FCPCA G2:

- HKLM:\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028\
- HKLM:\SOFTWARE\WOW6432Node\Microsoft\EnterpriseCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028\



macOS Solutions

Use Keychain Access

  1. Click the Spotlight icon and search for Keychain Access.

  2. Double-click the Keychain Access icon.

  3. Ensure that an entry for FCPCA G2 exists in the login or System Keychain Certificates repository.

verify_common_macOS.



iOS Solutions

Use Settings

  1. Select Settings > About > Certificate Trust Settings.

  2. Verify that Federal Common Policy CA G2 has full trust enabled.

iOS full trust



Linux and Unix Solutions

Debian-based kernels

Use the Command Line

  1. Launch the command line.

  2. Run the following command to verify the Federal Common Policy CA G2 has an entry in the system’s trust list:

         trust list | grep "Federal Common Policy CA G2"
    


Red Hat Enterprise Linux, CentOS, and other non-Debian-based kernels

Use the Command Line

  1. Launch the command line.

  2. Run the following command to verify the Federal Common Policy CA G2 has an entry in the system’s trust list:

         trust list | grep "Federal Common Policy CA G2"
    


Next, distribute the FCPCA G2 certificate to application trust stores.

IDManagement.gov

An official website of the General Services Administration

Looking for U.S. government information and services?
Visit USA.gov Edit this page