My document (A BIRTH CERTIFICATE) IS NOT LEGIBLE IN WORD, WENT CONVERTED ???

MY FIRST TIME USING ADOBE TO CONVERT A BIRTH CERTIFICATE  PDF FILE, TO WORD DOESN'T CONVERT THE DOCUMENT SO YOU CAN READ IT. ?????

Hello Alice,
I'm sorry to hear you're having trouble with your conversion.  How is the quality of the original document?  Does it contain hand-written text?  If so, that's likely the reason that quality of the conversion is so poor.  Unfortunately, there aren't really any OCR engines on the market right now that handle hand-written text very well.
If you'd like to share the file with us so we can take a closer look, please fill our our File Conversion Issue form.  Make sure you reference this forum thread in your submission so we can circle back here.
-David

Similar Messages

  • Certificate Authority not working when signing documents (Active Directory)

    We recently went to an Active Directory structure at my job, and we do a lot of signatures. Part of the Active Directory setup was an auto-certificate authority setup. I went to sign a document  recently and the signature will not apply. I went into trust tab and clicked to trust the certificate, and then backed out, but it still will not sign. When I click to sign the document nothing happens. There are red Xs next to everything in the trust tab.
    Any ideas? I am wondering if there is something I can do in Adobe to let it know that certificate is trusted?
    Any help would be appreciated.

    When Acrobat builds the signature object (which is created when you sign), it tries to populate the object with as much data as possible in order to facilitate long term validation. This means that it is trying to add all of the certificates in the signature chain to the PDF along with all of the corresponding revocation information (which is either an OCSP response of a CRL). This way, after the signer's digital ID expires all of the validation collateral will still be available, otherwise you would get an Unknown signature after the signer's cert expired.
    In order for Acrobat to get the revocation information trust has to be established. When you create the signature Acrobat tries to gather all of the certificates in the signing chain. After it has finished building the chain it walks the chain from the bottom up (the bottom being the signer's certificate) and checks to see if the cert is a designated trust anchor. Once it finds trust anchor it will try to procure revocation info for each cert below the trust anchor, but not the trust anchor itself. After it has gathered up all of the rev info it writes it into the PDF file along with the certificates. So, when it comes to signature creation, it's good to add the certificate that is at the root (top) of the signing chain to the Manage Trusted Identities list and trust it for signing and certifying. That way when you do sign all of the rev info will be written into the file.
    The next thing to realize is Acrobat can only retrieve the revocation info if it knows where to get it from. Each certificate in the signing chain except for the root cert should have an extension that tells Acrobat where it can download the information. For an OCSP response the URI is in the Authority Information Access (AIA) extension and for a CRL the URI is in the CRL Distribution Point (CRLdP) extension. If there is an entry in either of these two extensions that are not valid (that is either they don't exist or, the exist but don't really provide the expected data) then Acrobat will try to download the data, but the download will fail. Thus, you end up with a signature in an Unknown state because revocation checking must succeed if the is an AIA or CRLdP extension. Wheat you need to check is, does the certificate have one or both of these two extensions and if so, does it lead to a successful download.
    Steve

  • The server's security certificate is not yet valid!

    I am getting this message with Google Chrome to access https sites (facebook.com for instance.
    This message is only received with my primary user, other users function properly.
    The system clock is set automatically and is showing the correct date.
    Advancing the system time setting manually about 2.5 month or so the browser returns an "expired" message.
    I am in web development and cannot simply replace my default user.
    Is there anywhere I can look to see what is causing this error?

    Hi krudesill,
    Welcome to Apple Support Communities.
    Are you seeing the same security certificate issue in Safari? The article linked below provides some information and a troubleshooting suggestion that may resolve the issue.
    OS X Mavericks: If your certificate isn’t being accepted
    http://support.apple.com/kb/PH14003
    If a certificate is not accepted, it may have expired or it may be invalid for the use to which it is being applied. For example, some certificates may be used for establishing a secure connection to a server but not for signing a document.
    The most common reason a certificate isn’t accepted is that the certificate authority’s root certificate isn’t trusted by your computer. Before your computer will trust a certificate authority, you must add the certificate authority to a keychain and set the certificate trust settings.
    Some apps (such as Safari) display the root certificate from the certificate authority as part of the message from the certificate authority. In this case, drag the root certificate icon to the desktop.
    Drag the certificate file onto the Keychain Access icon, or double-click the certificate file.
    Choose a keychain from the pop-up menu, then click OK.If you’re asked, type the name and password for an administrator user on this computer.
    Select the certificate, then choose File > Get Info.
    Click the Trust Settings disclosure triangle to display the trust policies for the certificate.
    To override the trust policies, select new trust settings from the pop-up menus.
    I hope this helps.
    -Jason

  • I have a really really big problem to my iphone icloud please help me i could send you my birth certificate for confirmation that im the real user please help me

         i have a really really big problem to my iphone icloud please help me i could send you my birth certificate for confirmation that im the real user please help me apple.corp and please tell me if this is not possible to be done it almost a month that i cant use my iphone.
         thank you for those who read this
    <Email Edited by Host>

    Remove your email address.  This is a public website, and you are addressing thousands of strangers.
    After doing that, tell us what your issue actually is.  This is a user-to-user technical forum.  You are not addressing Apple here.

  • Document splitting: Items for clearing not found

    Dear All,
    I have created bank gl without tick of open item management now i have activate OIM &  Transcation exisit for the same
    I have done it as given below:
    1) I have made GL balance Zero by posting an additional entry by F-02 (document type SA)
    2) Block the GL for posting
    3) though help of programe RFSEPA02 i have done the same.
    Now the GL is OIM
    Now i have to reverse the additonal entry pass to make GL balance zero
    At the time of reverse through FB08 system gives an error massage
    *" Document splitting: Items for clearing not found"*
    Please any one help to resolve the issue
    Thanks
    Vijay

    Dear Gladys xing
    Thanks for your reply,
    I have also done the same thing by passing one more entry to create the same balance.
    When i am trying to clear open item for the both the extra entry system gives an same error
    "Re: Document splitting: Items for clearing not found"
    is this possible to clear that open item through F-03
    Thanks
    Vijay

  • I am trying to use a interactive form and it says "If this message is not eventually replaced by the proper contents of the document, your PDF  viewer may not be able to display this type of document."  This is a IRS form and has worked before.

    I am trying to use a interactive form and it says "see below"  This is a IRS form and has worked before.
    is there a tech support phone number?
    Please wait...
    If this message is not eventually replaced by the proper contents of the document, your PDF
    viewer may not be able to display this type of document.
    You can upgrade to the latest version of Adobe Reader for Windows®, Mac, or Linux® by
    visiting http://www.adobe.com/go/reader_download.
    For more assistance with Adobe Reader visit http://www.adobe.com/go/acrreader.
    Windows is either a registered trademark or a trademark of Microsoft Corporation in the United States and/or other countries. Mac is a trademark
    of Apple Inc., registered in the United States and other countries. Linux is the registered trademark of Linus Torvalds in the U.S. and other countries

    That means you are looking at the form online with a browser that uses its own (incompatible) PDF viewer, not the Adobe Reader plugin.
    Either
    download the form to your local disk and fill it from there
    use a browser that employs the Adobe Reader plugin
    configure your browser to use the Adobe Reader plugin: http://helpx.adobe.com/acrobat/kb/pdf-browser-plugin-configuration.html

  • SChannel error- The SSL server credential's certificate does not have a private key information property attached to it.

    We have a public SSL certificate that allows for Active Directory sync with LDAPS on port 636 with our email smart host. This was working fine and suddenly stopped working and we are now getting SChannel errors Event ID 36869. There were no changes made
    to the Exchange server, the firewall or the DC which holds the certificate. I have run a new certreq from the DC and then re-keyed the public SSL certificate and re-installed 3 times but the error does not go away and AD Sync with the vendor
    fails. When I run LDP.exe the connection on port 636 fails with "cannot open connection" and the system event log throws the S Channel event 36869 "The SSL server credential's certificate does
    not have a private key information property attached to it"  There is no software firewall set on the DC. When I run Certutil -VerifyStore MY  it shows the current certificates as well as the revoked and expired certificates
    correctly. Certificate 0 is the public cert and is listed with Server and Client authentication, the FQDN of the server is correct and "Certificate is Valid" is listed. The private cert is Certificate 1 and has server and client authentication, the
    FQDN is correct, Private key is not exportable and it ends with Certificate is Valid. I do not see a point in re-keying the cert again until I figure out what the root of the problem is. I have read in some forums that the private cert should not be set to
    expire after the public cert but that does not make a lot of sense when in a situation like this the private cert is of course newer than the public. In fact it is too early to renew the public cert. I have been troubleshooting this for a few days and at this
    point I would have to drop my AD sync with the vendor to LDAP in order to add new users. I do not want to do that for obvious reasons and I do not want to have our spam filtering and email archive service running without Directory sync. Any help would be greatly
    appreciated.

    Hi,
    Have you tried this?
    How to assign a private key to a new certificate after you use the Certificates snap-in to delete the original certificate in Internet Information Services
    http://support.microsoft.com/kb/889651
    Best Regards,
    Amy

  • I am suddenly unable to open my pictures in Adobe Photoshop. It gives the following message: The document "Tina-19.jpg" could not be opened. Photoshop cannot open files in the  "Adobe Photoshop JPEG file" format. What does this mean? I have opened my phot

    I am suddenly unable to open my pictures in Adobe Photoshop. It gives the following message: The document “Tina-19.jpg” could not be opened. Photoshop cannot open files in the  “Adobe Photoshop JPEG file” format.
      What does this mean? I have opened my photos in Adobe Photoshop for years and suddenly I get this message and can't open any of my pictures

    JoeLib wrote:
    You type way faster than me Gene.
    Well, not necessarily in this case.
    According to the time stamp, Gene posted his answer a bit over three hours before you did, Joe.
    Gene's post:       Dec 29, 2014 5:54 PM
    Joe's post:          Dec 29, 2014 8:57 PM

  • "The certificate is not trusted because no issuer chain was provided" error in all browsers for all websites.

    As it says, Chrome, Firefox, and Internet Explorer all give the certificate error message for any and every website attempted - including the Firefox add-ons page. The specific error is the "no issuer chain was provided".
    1) This problem is not on my computer - it is on my mother's computer in another city. Therefore, I cannot attempt every little possibility without flying over there - I'm looking for things I can tell her to do over the phone. The problem started today. I've already given her the list of anti-malware programs to go install and run from here:
    https://support.mozilla.org/en-US/questions/982393
    Note that, of course, she will have to accept the security certificate override to get to these things - I hope this isn't bad.
    2) The problem started after she tried to use Skype, it hung for a very long time and would never log on. So she tried to reinstall it - and she said she clicked through a number of agreement screens and believes she may have installed malicious 3rd party software. This is ridiculous, is Skype now putting malware on people's computers through these bogus 3rd party add-ons at installation? I suppose it is possible Skype was hanging because of some other problem - but she did manage to reinstall Skype and got it to work (but now her internet certificates won't).
    3) She has BitDefender. I am aware that it says here:
    https://support.mozilla.org/en-US/kb/connection-untrusted-error-message
    that she should turn off SSL scanning. She turned it off, it did not solve the problem. She turned it off and restarted, it did not solve the problem. She has had it on for the past 6 months and it has never caused a problem.
    4) In addition, BitDefender reported today that it stopped a malicious program called MySearchDial.exe from attempting something it shouldn't. We went through this removal guide:
    http://malwaretips.com/blogs/start-mysearchdial-removal/
    however, the software MySearchDial was never actually installed into the windows install list, and we did not find any addons/plugins in any of the browser lists (note that Firefox add-ons cannot be accessed with a certificate error, it gives the error message but DOES NOT give you the option to add an exception so you can't access the add-ons). The only thing we found was (a) MySearchDial was default in the IE search engine list, despite there being no add-on, and (b) MySearchDial.exe was in the temp folder (now deleted). I note that I had BitDefender scan the temp folder *before* I deleted MySearchDial.exe, and it claimed no threats were found. What? It was BitDefender that warned me of it in the first place!
    5) Time and date are correct.
    6) Checked the Win 7 install log, only Skype, Skype Click-to-Call, and (for some reason) Mircosoft Visual Studio 2010 and Visual C++ were installed or altered today. I got paranoid about Click-to-call and asked her to uninstall it, but it didn't solve the problem.
    7) The OS is Win7 64bit Home.
    Anything beyond endless Malware removal programs (via list linked above) that we should try?

    The only way to know what is going on is to retrieve the certificate and check who is the issuer.<br />
    It is always possible that the server doesn't send the full certificate chain (intermediate certificates), so it might help to post a link to this website
    Check the date and time in the clock on your computer: (double) click the clock icon on the Windows Taskbar.
    Check out why the site is untrusted and click "Technical Details to expand this section.<br>If the certificate is not trusted because no issuer chain was provided (sec_error_unknown_issuer) then see if you can install this intermediate certificate from another source.
    You can retrieve the certificate and check details like who issued certificates and expiration dates of certificates.
    *Click the link at the bottom of the error page: "I Understand the Risks"
    Let Firefox retrieve the certificate: "Add Exception" -> "Get Certificate".
    *Click the "View..." button and inspect the certificate and check who is the issuer of the certificate.
    You can see more Details like intermediate certificates that are used in the Details pane.
    If "I Understand the Risks" is missing then this page may be opened in an (i)frame and in that case try the right-click context menu and use "This Frame: Open Frame in New Tab".
    *Note that some firewalls monitor (secure) connections and that programs like Sendori or FiddlerRoot can intercept connections and send their own certificate instead of the website's certificate.
    *Note that it is not recommended to add a permanent exception in cases like this, so only use it to inspect the certificate.

  • Excise Invoice Tab Page/ Document Info  Tab Page is not appearing in MIGO

    Dear Friend
    For a particular job work PO , with account assignment category F & item category L, non valuaated material, when we are doing migo, excise invoice tab page/ Document Info tab page is not appearing in document header. From The said tab page we can select the challan.
    In J1ID, I have maintained Vendor PAN number and also material chpter id combination.
    Thanks
    Chandra

    Hi
    I maintained material chapter Id combination & vendor Excise Details. We do not maintain any plant -vendor combination. This is a non valuated material with material type unbw. Do I need to maintain cenvat determination tab for this material?
    Thanks
    Chandra

  • Certificate can not be verified by JWS

    Hello,
    we developed a java web start application and bought an SSL certificate to secure the communication between the application and the servlet (_no_ self-signed certificate).
    Our intended java version is 1.5. The application jar is not signed.
    When we try to start the java web start application we receive an warning dialog that the certificate is not trusted.
    To shed some light on it we tried to download the application manually and start it as a normal java application.
    Java 1.4.2_01 failed with error message
    "javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: No trusted certificate found"
    Details on java version:
    java version "1.4.2_01" / Java(TM) 2 Runtime Environment, Standard Edition (build 1.4.2_01-b06) / Java HotSpot(TM) Client VM (build 1.4.2_01-b06, mixed mode)
    Java 1.5.0_13 runs ok.
    Details on java version:
    java version "1.5.0_13" / Java(TM) 2 Runtime Environment, Standard Edition (build 1.5.0_13-b05) / Java HotSpot(TM) Client VM (build 1.5.0_13-b05, mixed mode, sharing)
    This indicates that the java runtine knows about the certificate when the application is run as a standard java application.
    Our problem is that we want to distribute the application as a java web start application, which, like I mentioned earlier, shows a warning dialog when starting up. The interesting thing is that this warning is shown while "bootstrapping" the application, that means the warning dialog is shown before the application jar has been downloaded to the client (just the jnlp file has been downloaded by the browser (which, by the way, has no problems at all with the certificate)).
    To sum everything up: running 1.5.0_13 as java application runs ok, running 1.5.0_13 as java web start application shows warning dialog while bootstrapping.
    Does JWS use a different set of certificates than the "normal" runtime ?
    The 1.5.0_13 installation is unchanged (no deployment properties, no manually added certificates, etc.)
    Please advise.
    Regards,
    Henning

    This sometimes depends on the exact details* of the JNLP file(s) involved, and details* of the Jar's. Perhaps if you could link to the JNLP files (or post the content, with codebase changed if needed), I cold look further into it.
    * For example, the fact you mention some jar's are signed whereas others are not, indicates that some must be in separate JNLP files (it cannot work otherwise).

  • There is a problem with the server's security certificate. The security certificate is not from a trusted certifying authority. SAP Business One is unable to connect to the server

    Hello,
    I have an issue with connecting client SB1H on Windows, the scenario is as follows:
    1.- Server:
         Suse Linux Enterprise Server 11.3 kernel version: 3.0.76-0.11 IBM
         NDB and Server are review 69 SP06
    2.- Client:
         Windows 8 Pro Virtual Machine on Microsoft Hyper-V
         SB1H PL 11 version 32bits    
         SAP HANA Studio version 1.0.60
    When I run SB1H the following message appears:
    There is a problem with the server's security certificate. The security certificate is not from a trusted certifying authority. SAP Business One is unable to connect to the server.
    Any idea what could be the solution?

    Hi,
    Please check SAP notes:
       1993392 - Server components setup wizard: New default values for certificates and single sign-on option
    1929288 - Do not configure SSL for XApp during installation or upgrade if XApp is installed on a different machine than the SAP HANA server
    Thanks & Regards,
    Nagarajan

  • Renewed my subca now I get A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider

    Hello
    My subca certificate was about to expire so I renewed it with the same key and since then my wireless will not connect. I get the following error from NPS:
    Network Policy Server denied access to a user.
    Contact the Network Policy Server administrator for more information.
    User:
    Security ID:
    AD\4411CB8CD34A2AA$
    Account Name:
    host/4411CB8CD34A2AA.ad.***.org
    Account Domain:
    AD
    Fully Qualified Account Name:
    AD\4411CB8CD34A2AA$
    Client Machine:
    Security ID:
    NULL SID
    Account Name:
    Fully Qualified Account Name:
    OS-Version:
    Called Station Identifier:
    f4-1f-c2-e6-0e-40:***-private
    Calling Station Identifier:
    e0-06-e6-c2-96-b7
    NAS:
    NAS IPv4 Address:
    10.0.2.85
    NAS IPv6 Address:
    NAS Identifier:
    DOM-WLC1
    NAS Port-Type:
    Wireless - IEEE 802.11
    NAS Port:
    13
    RADIUS Client:
    Client Friendly Name:
    NPS Proxy 1
    Client IP Address:
    10.0.2.12
    Authentication Details:
    Connection Request Policy Name:
    Wireless Clients
    Network Policy Name:
    Wireless Clients
    Authentication Provider:
    Windows
    Authentication Server:
    DOM-DC1.ad.****.org
    Authentication Type:
    EAP
    EAP Type:
    Microsoft: Smart Card or other certificate
    Account Session Identifier:
    Logging Results:
    Accounting information was written to the local log file.
    Reason Code:
    295
    Reason:
    A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider.
    How do i make the policy provider trust this new certificate that was created? When i renewed the certificate everything looks good on the subca and root ca. The new certificate is not in the nps servers so i tried manually importing it and that still did
    not work. I noticed when i open the wireless network policy properties under constraints and open the Microsoft: Smart Card or other certificate eap type the new certificate is not in there. Any suggestions? Thank you!

    can you copy client certificate to NPS server and run the following command against this certificate:
    certutil -verify -urlfetch path\clientcert.cer
    and show us the output.
    Vadims Podāns, aka PowerShell CryptoGuy
    My weblog: en-us.sysadmins.lv
    PowerShell PKI Module: pspki.codeplex.com
    PowerShell Cmdlet Help Editor pscmdlethelpeditor.codeplex.com
    Check out new: SSL Certificate Verifier
    Check out new:
    PowerShell File Checksum Integrity Verifier tool.

  • W2012R2 - A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider.

    Hi all.
    I have stanalone offline RootCA, and enterprise domain SubCA on DC on Windows 2012 server. I have Windows 2003 Terminal Server, users logon to TS via smart cards - and this work fine.
    Now I added Windows server 2012 as "Terminal Server".
    Now I added Windows server 2012 R2 as "Terminal Server".
    I configured both servers identically.
    Users can logon via smart card to Windows Server 2012.
    Users CAN NOT logon via smart card to Windows Server 2012 R2.
     When user trying to logon via smart card, they have information:
    "An untrusted cartification authority was detected while processing the domain controller certificate used for authentication. Additional information..."
    I run a certutil.exe -scinfo on both Windows 2012/2012R2 servers.
    I found differences in the (~) same place in the output log.
    On Windows 2012:
    Exclude leaf cert:
       b4 44 8f fb fb b4 5f 03 39 76 dc cc e8 da 02 e0 d0 cc b6 32
     Full chain:
       c8 3d 07 12 ea 4d 0e 5a 8c 50 fc 56 2e 51 f1 68 6a 26 90 77
    Verified Issuance Policies: None
    Verified Application Policies:
         1.3.6.1.5.5.7.3.2 Client Authentication
         1.3.6.1.4.1.311.20.2.2 Smart Card Logon
     On Windows 2012 R2:
     Exclude leaf cert:
       78 7e 6c 60 3f 20 c6 f6 e8 74 c8 36 e3 d3 88 ac 12 60 41 32
     Full chain:
       b8 a9 fa 6c db 07 cd 32 86 17 8c 88 02 ba d0 4b 8c ac 2d 58
       Issuer: CN=XXX CA, OU=Certification Services, O=XX, C=XX
       NotBefore: 2013-11-22 12:42
       NotAfter: 2014-11-22 12:42
       Subject: CN=XX Test, OU=XX, OU=UXX, DC=XX, DC=com
       Serial: 7a0084f
       SubjectAltName: Other Name:Principal Name=XX@XX
       Template: Smartcard Logon Behalf 2048
       1d 2a bb dc 2a 9c 70 0d b5 35 47 44 ee 61 60 ab 71 97 66 ff
     A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider. 0x800b0112 (-2146762478)
    I run a certutil -verify xx.cer on both Servers 2012/2012R2 and on both servers have the ~exact same thing.
    Windows 2012:
    Exclude leaf cert:
       f6 0e 96 da c7 08 9a 78 12 97 a6 b6 22 df 57 9d e7 03 41 df
     Full chain:
       f0 fb 19 66 e8 6c 4f ea b4 d5 ea 6d 5e 38 54 07 b0 9f 52 96
    Verified Issuance Policies: None
    Verified Application Policies:
         1.3.6.1.4.1.311.20.2.2 Smart Card Logon
         1.3.6.1.5.5.7.3.2 Client Authentication
    Leaf certificate revocation check passed
    Windows 2012 R2:
    Exclude leaf cert:
       84 18 5b 9d 06 61 60 73 c6 37 80 f4 25 33 c4 d3 5e ef 4a 93
     Full chain:
       63 8e 9e 37 78 c9 93 bb 4d da f4 e3 4b 7e 2b 14 49 28 0f 5d
    Verified Issuance Policies: None
    Verified Application Policies:
         1.3.6.1.4.1.311.20.2.2 Smart Card Logon
         1.3.6.1.5.5.7.3.2 Client Authentication
    Leaf certificate revocation check passed
    Whether Windows 2012R2 is not trying to build a certificate path, treating smart card logon certificate as (Sub)CA certificate?
    Previous and probably wrong idea:
    The only thing that comes to my mind is my SubCA.
    I have two CA Certyficates:
    Certyficate #0 (expired)
    Certyficate #1 <- valid.
    I guess that all Windows before Windows 2012 R2 build certyficafion chain from valid (second #1) certyficate. Windows 2012 R2 take first and we have:
    "A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider.
    [ value]  800B0112 "
    This is a bug or feature?
    How I can fix this without removal Certificate #0 from my SubCA?
    Best regards
    Jacek Marek
    MCSA Windows Server 2012

    Hi,
    Glad to hear that the issue is solved!
    Thank you very much for your sharing!
    Please feel free to let us know if you encounter any issues in the future.
    Best Regards,
    Amy

  • A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider.

    Hi all.
    I have stanalone offline RootCA, and enterprise domain SubCA on DC on Windows 2012 server. I have Windows 2003 Terminal Server, users logon to TS via smart cards - and this work fine.
    Now I added Windows server 2012 as "Terminal Server".
    Now I added Windows server 2012 R2 as "Terminal Server".
    I configured both servers identically.
    Users can logon via smart card to Windows Server 2012.
    Users CAN NOT logon via smart card to Windows Server 2012 R2.
    When user trying to logon via smart card, they have information:
    "An untrusted cartification authority was detected while processing the domain controller certificate used for authentication. Additional information..."
    The only thing that comes to my mind is my SubCA.
    I have two CA Certyficates:
    Certyficate #0 (expired)
    Certyficate #1 <- valid.
    I guess that all Windows before Windows 2012 R2 build certyficafion chain from valid (second #1) certyficate. Windows 2012 R2 take first and we have:
    "A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider.
       [ value]  800B0112 "
    This is a bug or feature?
    How I can fix this without removal Certificate #0 from my SubCA?
    Best regards
    Jacek Marek
    MCSA Windows Server 2012

    Hi,
    I run a certutil.exe -scinfo on both Windows 2012/2012R2 servers.
    I found differences in the (~) same place in the output log.
    On Windows 2012:
    Exclude leaf cert:
      b4 44 8f fb fb b4 5f 03 39 76 dc cc e8 da 02 e0 d0 cc b6 32
    Full chain:
      c8 3d 07 12 ea 4d 0e 5a 8c 50 fc 56 2e 51 f1 68 6a 26 90 77
    Verified Issuance Policies: None
    Verified Application Policies:
        1.3.6.1.5.5.7.3.2 Client Authentication
        1.3.6.1.4.1.311.20.2.2 Smart Card Logon
    On Windows 2012 R2:
     Exclude leaf cert:
      78 7e 6c 60 3f 20 c6 f6 e8 74 c8 36 e3 d3 88 ac 12 60 41 32
    Full chain:
      b8 a9 fa 6c db 07 cd 32 86 17 8c 88 02 ba d0 4b 8c ac 2d 58
      Issuer: CN=XXX CA, OU=Certification Services, O=XX, C=XX
      NotBefore: 2013-11-22 12:42
      NotAfter: 2014-11-22 12:42
      Subject: CN=XX Test, OU=XX, OU=UXX, DC=XX, DC=com
      Serial: 7a0084f
      SubjectAltName: Other Name:Principal Name=XX@XX
      Template: Smartcard Logon Behalf 2048
      1d 2a bb dc 2a 9c 70 0d b5 35 47 44 ee 61 60 ab 71 97 66 ff
    A certification chain processed correctly, but one of the CA certificates is not trusted by the policy provider. 0x800b0112 (-2146762478)
    I run a certutil -verify xx.cer on both Servers 2012/2012R2 and on both servers have the ~exact same thing.
    Windows 2012:
    Exclude leaf cert:
      f6 0e 96 da c7 08 9a 78 12 97 a6 b6 22 df 57 9d e7 03 41 df
    Full chain:
      f0 fb 19 66 e8 6c 4f ea b4 d5 ea 6d 5e 38 54 07 b0 9f 52 96
    Verified Issuance Policies: None
    Verified Application Policies:
        1.3.6.1.4.1.311.20.2.2 Smart Card Logon
        1.3.6.1.5.5.7.3.2 Client Authentication
    Leaf certificate revocation check passed
    Windows 2012 R2:
    Exclude leaf cert:
      84 18 5b 9d 06 61 60 73 c6 37 80 f4 25 33 c4 d3 5e ef 4a 93
    Full chain:
      63 8e 9e 37 78 c9 93 bb 4d da f4 e3 4b 7e 2b 14 49 28 0f 5d
    Verified Issuance Policies: None
    Verified Application Policies:
        1.3.6.1.4.1.311.20.2.2 Smart Card Logon
        1.3.6.1.5.5.7.3.2 Client Authentication
    Leaf certificate revocation check passed
    Any idea, or I must open case with Microsoft support?
    Best regards
    Jacek Marek
    MCSA Windows Server 2012

Maybe you are looking for