4. Verify operating system distribution
We're calling for all solutions! If you'd like to share your agency's playbook on how to verify the distribution of a trusted root CA certificate to an operating system trust store, create an issue on GitHub or email us at fpkirootupdate@gsa.gov.
To verify that the Federal Common Policy CA (FCPCA) G2 certificate has been distributed to your agency’s workstations and devices, use one of these options:
Microsoft Solutions
- Automated Solutions (Recommended)
- Manual Solutions
macOS Solutions
iOS Solutions
Linux/Unix Solutions
Microsoft Solutions
Use BigFix
-
Download the BigFix Enterprise Suite (.bes) analysis file: FPKIRootG2Detection.bes.
-
Use Certutil or another tool to verify the .bes file’s SHA-256 hash (required):
certutil -hashfile [DOWNLOAD_LOCATION]\FPKIRootDetection.bes SHA256
-
The file’s hash must match this one:
03bca16f7d21be344d954105b5ccb3caf578588cf6b8bd6f1cd03dfe298361bb
- Log into BigFix: Start > IBM BigFix > IBM BigFix Console.
-
Import the FPKIRootG2Detection.bes file: File > Import > Open.
The Create Analysis window appears.
- Assign the file: for Create in site, select site name, and for Create in domain, select domain name. Click Okay.
- On the left side panel, click Analyses to see a list of imported analysis files.
- Click Federal Common Policy CA G2 Distribution Detection (i.e., FPKIRootG2Detection.bes) and click the Results tab to see the distribution analysis. If the analysis was not activated by default, right-click the file and then click Activate Globally.
- For each workstation or device listed, “Has FCPCA G2 Been Distributed?” should say True. If False, you’ll need to investigate the cause of the failure. If you can’t find a cause, please contact us at fpkirootupdate@gsa.gov.
Use LANDesk 2016
- Open LANDesk 2016: Start > LANDesk Management > Desktop Manager.
- Create a custom registry data item: Tools > Reporting/Monitoring > Manage software list.
- Expand Custom Data, and click Registry items.
- Click Add to add a new registry item.
-
Add the data shown below for Windows 32-bit or 64-bit versions, based on GPO or Certutil distribution of FCPCA G2.
Microsoft Windows 32-bit Versions
- GPO Distribution
Root Key: HKLM Key: SOFTWARE\Policies\Microsoft\SystemCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028 Value: BLOB Attribute Name: Custom Data – FCPCAG2Win32 GPO – Certificate
- Certutil Distribution
Root Key: HKLM Key: SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028 Value: BLOB Attribute Name: Custom Data – FCPCAG2Win32 certutil – Certificate
Microsoft Windows 64-bit Versions
- GPO Distribution
Root Key: HKLM Key: SOFTWARE\WOW6432Node\Policies\Microsoft\SystemCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028 Value: BLOB Attribute Name: Custom Data – FCPCAG2Win64 GPO - Certificate
- Certutil Distribution
Root Key: HKLM Key: SOFTWARE\WOW6432Node\Microsoft\EnterpriseCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028 Value: BLOB Attribute Name: Custom Data – FCPCAG2Win64 certutil - Certificate
- GPO Distribution
- Create a query for the registry item: on the left side panel, expand Network View, and click Queries.
- Right-click My Queries, select New Query, and enter a query name (e.g., FCPCA G2 Verification: Win32 Machines).
- Under Machine Component, expand Computer, click Custom Data, and select the registry item.
- For Boolean, select Exists.
- For Displayed Scanned Values, click Insert and add the BLOB value from above.
- Double-click the new query name to verify FCPCA G2 distribution. The results will be similar to these:
Use Microsoft Certificate Manager
- Open Microsoft Certificate Manager: Start; then type certlm.msc and press Enter.
- Go to Trusted Root Certification Authorities > Certificates. To see whether FCPCA G2 was successfully distributed, look for Federal Common Policy CA G2 shown with Intended Purposes of ALL and a Friendly Name of None, as shown here:
Optional:
- Open Microsoft Certificate Manager: Start; then type certlm.msc and press Enter.
- Select Trusted Root Certification Authorities from the left side panel, then select View > Options.
- In the View Options box, select the Physical certificate stores checkbox.
- On the left side panel, click the > icon next to Trusted Root Certification Authorities to see the subdirectories.
- Verify the distribution of FCPCA G2:
- For Certutil-distributed copies of FCPCA G2, click Enterprise > Certificates. FCPCA G2 should appear in the certificates list.
- For GPO-distributed copies of FCPCA G2, click Group Policy > Certificates. FCPCA G2 should appear in the certificates list.
- For Certutil-distributed copies of FCPCA G2, click Enterprise > Certificates. FCPCA G2 should appear in the certificates list.
Use Microsoft Registry Editor
- Verify that FCPCA G2 has been distributed to a specific workstation or device: open the Microsoft Registry Editor: Start; type regedit.exe and press Enter.
- The following registry keys will appear for GPO- or Certutil-distributed copies of FCPCA G2:
GPO-distributed FCPCA G2:
- HKLM:\SOFTWARE\Policies\Microsoft\SystemCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028\
- HKLM:\SOFTWARE\WOW6432Node\Policies\Microsoft\SystemCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028\
Certutil-distributed FCPCA G2:
- HKLM:\SOFTWARE\Microsoft\EnterpriseCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028\
- HKLM:\SOFTWARE\WOW6432Node\Microsoft\EnterpriseCertificates\Root\Certificates\99b4251e2eee05d8292e8397a90165293d116028\
macOS Solutions
Use Keychain Access
-
Click the Spotlight icon and search for Keychain Access.
-
Double-click the Keychain Access icon.
-
Ensure that an entry for FCPCA G2 exists in the login or System Keychain Certificates repository.
iOS Solutions
Use Settings
-
Select Settings > About > Certificate Trust Settings.
-
Verify that Federal Common Policy CA G2 has full trust enabled.
Linux and Unix Solutions
Debian-based kernels
Use the Command Line
-
Launch the command line.
-
Run the following command to verify the Federal Common Policy CA G2 has an entry in the system’s trust list:
trust list | grep "Federal Common Policy CA G2"
Red Hat Enterprise Linux, CentOS, and other non-Debian-based kernels
Use the Command Line
-
Launch the command line.
-
Run the following command to verify the Federal Common Policy CA G2 has an entry in the system’s trust list:
trust list | grep "Federal Common Policy CA G2"
Next, distribute the FCPCA G2 certificate to application trust stores.