Ask a Question

Advanced Search

Solution ID : SO22030

Last Modified : 05/18/2018

Error: ASN1 bad tag value met. 0X80009310b (ASN:267) during certificate installation with Microsoft IIS 7.0


When Completing the Certificate Request in Internet Information Services (IIS) 7.0 Manager using a PKCS#7 file,  the server may give the following error message:

There was an error while performing this operation.

CertEnroll::CX509Enrollment::p_InstallResponse:ASN1 bad tag value met. 0x8009310b (ASN: 267)



Microsoft IIS 7.0 currently reports an error indicating it does not accept PKCS#7 formatted certificates.  Although the ASN1 error occurs during installation, the certificate might still install successfully.

This is a known Microsoft IIS 7.0 issue.  Please see the following Microsoft Knowledge Base Article regarding this issue:


To verify that the SSL certificate is successfully installed, try to bind the certificate to the web site.

To bind the certifcate to the appropriate web site, perform the following steps:

  1. Click Start > Administrative Tools > Internet Information Services (IIS) Manager
  2. Browse to your Server Name > Sites > Your SSL-based site
  3. From the Actions pane, choose Bindings
  4. In the Site Bindings window, choose Add
  5. From the Add Site Bindings window, provide the binding type as HTTPS
  6. Select the SSL certificate that will be used for this site
  7. Click OK
  8. Test the if the site is secure by using HTTPS

If in step 6 above, you cannot find the new certificate in the list, try restoring the private key:

Import certificate in to the Computer certificate store

  1. Create a Certificate snap-in in a MMC console, per KB solution  SO22028
  2. In the left-hand pane, expand the Certificates folder, expand and select the Personal folder
  3. Right-click the Certificates folder inside the Personal folder, select All Tasks, select Import
  4. The Certificate Import Wizard opens. Click Next
  5. Click Browse and then navigate to the file that contains the SSL certificate. Click Open > Next
  6. Ensure "Place all certificates in the following store" is selected, ensure that "Personal" is listed for the certificate store, click Next > Finish

Restore Private Key

  1. With the MMC console still open, select the Certificates folder inside the Personal folder in the left-hand pane.
  2. Double-click the newly imported SSL certificate in the right-hand pane, then select the Details tab.
  3. Scroll down and select the Thumbprint field, then select and copy the entire thumbprint (in the bottom box) to the clipboard.
  4. Open a command prompt, then enter the following command:

    certutil -repairstore my "<thumbprint>"


    certutil -repairstore my "00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f"

    If successful, the response will be "CertUtil: -repairstore command completed successfully"

Assign SSL certificate in IIS

  1. Open the IIS Manager application.
  2. From the Connections pane on the left, expand the local server, expand the Sites folder and select the web site to be secured with SSL.
  3. From the Actions pane on the right, select the Bindings option (under Edit Site).
  4. In the Site Bindings window, select an existing https binding and click Edit. If there are no existing https bindings, click Add.
  5. Ensure the type is set to 'https', then select the new SSL certificate from the drop down menu. Click the View button to confirm details of the certificate, if necessary. Click OK > Close 

If the above steps do not resolve the issue, an alternative method of installation using the .x509 version of the certificate can be attempted.

  • Acquire the SSL certificate in X.509 (PKCS#10) format and install
  • Obtain the Intermediate CA and install this via Microsoft Management Console

Symantec SSL certificates for Microsoft servers are delivered in PKCS#7 format. This means the certificate file includes the corresponding Intermediate CA(s).  To acquire the certificate in X.509 (PKCS#10) format, perform the following steps:

  1. Download the certificate from your MPKI for SSL account and select the x.509 format. Please see solutuion  SO6621
  2. Install the the X.509 (PKCS#10) certificate file
  3. Download and install the proper Intermediate CA for your certificate type, please see solution  SO22016