Skype for business mac there was a problem verifying the certificate from the server
![skype for business mac there was a problem verifying the certificate from the server skype for business mac there was a problem verifying the certificate from the server](https://image.slidesharecdn.com/coreconceptofskypeforbusiness-190201081435/85/core-concept-of-skype-for-business-2015-10-320.jpg)
- Skype for business mac there was a problem verifying the certificate from the server how to#
- Skype for business mac there was a problem verifying the certificate from the server serial number#
- Skype for business mac there was a problem verifying the certificate from the server windows 7#
- Skype for business mac there was a problem verifying the certificate from the server download#
- Skype for business mac there was a problem verifying the certificate from the server windows#
Skype for business mac there was a problem verifying the certificate from the server windows#
![skype for business mac there was a problem verifying the certificate from the server skype for business mac there was a problem verifying the certificate from the server](https://blog.matrixpost.net/wp-content/uploads/2020/02/troubleshooting_sfb_external_login018.png)
Skype for business mac there was a problem verifying the certificate from the server how to#
Skype for business mac there was a problem verifying the certificate from the server serial number#
To determine the serial number, simply open up the certificate’s properties and navigate to the Details tab, then select the Serial number field as such:Ĭopy the serial number and slot it into the end of the command added quotes:Ĭertutil -delstore -enterprise root “5f 92 5c 79 5a 90 49 bc 4e e7 f7 96 fb c7 de 62” The command above will remove the certificate located in the Trusted Root Certification Authorities Computer Store of the workstation you execute this command.
![skype for business mac there was a problem verifying the certificate from the server skype for business mac there was a problem verifying the certificate from the server](https://fasrplace651.weebly.com/uploads/1/2/5/3/125347032/565844736.jpg)
In any case, the proper syntax is the following: The first step was to determine the right syntax and it took quite a bit of time because I did not find the following TechNet article too straight forward: Since it looks like Microsoft suggests to use logon scripts to clean up these root certificates, I simply went ahead and looked into using the certutil.exe command to remove certificates and then created a simplified batch file to remove the entries. Ponent can't create object: 'CAPICOM.Store' All rights reserved.Ĭ:\Temp\RemoveCA\remove.vbs(13, 1) Microsoft VBScript runtime error: ActiveX com Microsoft (R) Windows Script Host Version 5.8Ĭopyright (C) Microsoft Corporation.
Skype for business mac there was a problem verifying the certificate from the server windows 7#
... and when I finally launched it on a Windows 7 64-bit desktop, it would error out with:Ĭ:\Temp\RemoveCA>c:\windows\system32\regsvr32 capicom.dll /s The problem I immediately noticed was that there were a few typos in the script (namely the removeca.vbs filename):
Skype for business mac there was a problem verifying the certificate from the server download#
The first step was to download the following SDK:ĭownload: Pl atform SDK Redistributable: CAPICOM The article’s instructions appear to be pretty straight forward as it demonstrates the user of a batch file and script to automate the process: How to remove a trusted Certificate Authority from computers in the domain I was unsure as to whether there was an easy way to remove these root certificates in the Trusted Root Certification Authorities certificate store so I went ahead and reached out to our Microsoft partner support and the response I received was to review the following KB article: You have previously deployed multiple Active Directory Enterprise Root Certificate Authorities in the domain and because you’ve had to redeploy the CA a few times using the same name, you notice that your domain joined workstations and servers now have multiple root certificates stored in the Trusted Root Certification Authorities certificate store: