Verifying the Certificate Mapping for Smart Card Logon

Determine the mapping type

On the logon screen, look at the account hint shown below "Smart card logon":

Hint formatMapping type
Contains @ — e.g. 1145593979@mil UPN mapping
Contains = — e.g. CN=John Doe,DC=corp,DC=com Explicit mapping
Logon screen showing mapping type hint
The account hint indicates the mapping type
UPN mapping
Step 1 — Find the UPN in the certificate
  1. Open the certificate properties and go to the Details tab.
  2. Look for Subject Alternative Name.
  3. At the bottom, find Principal Name (e.g. 1145593979@mil). There may also be an RFC822 Name.
Certificate Subject Alternative Name with UPN
Finding the UPN in the Subject Alternative Name extension
Step 2 — Verify the user account UPN in Active Directory
  1. Open Active Directory Users and Computers.
  2. Open the user's properties and verify the User logon name (UPN) matches the Principal Name from the certificate.
AD Users and Computers user logon name
UPN in Active Directory Users and Computers
Step 3 — Correct the UPN if needed

If the suffix (e.g. @mil) cannot be changed via the standard UI, use ADSI Edit to directly edit the userPrincipalName attribute.

ADSI Edit editing userPrincipalName
Editing userPrincipalName directly in ADSI Edit
Explicit mapping

Explicit mapping stores the certificate identity in the altSecurityIdentities attribute of the user object.

Step 1 — Enable Advanced Features

In Active Directory Users and Computers, go to View → Advanced Features.

ADUC View Advanced Features
Enabling Advanced Features in ADUC
Step 2 — Open Name Mappings
  1. Select the user account.
  2. Right-click → Name Mappings.
  3. Select the smart card certificate and validate.
Name Mappings dialog
Name Mappings dialog — adding a certificate
Certificate selected for mapping
Certificate selected for explicit mapping
Mapping confirmed in ADUC
Mapping confirmed
Available mapping formats
FormatDescription
X509:<I>issuer<S>subjectIssuer + Subject (most common)
X509:<S>subjectSubject only
X509:<I>issuer<SR>serialnumberIssuer + Serial (bytes reversed)
X509:<SKI>skiSubject Key Identifier
X509:<SHA1-PUKEY>hashSHA-1 hash of the public key
X509:<RFC822>emailRFC 822 email address from SAN
altSecurityIdentities attribute in ADSI Edit
altSecurityIdentities value in ADSI Edit
Logon succeeds after explicit mapping
Logon succeeds after correct explicit mapping