Abuse Info
An attacker can identify ADCS escalation opportunities where manager approval on a template prevents direct abuse, but leverage the Certificate Manager role to approve the pending request. Alternatively, the role can be abused to add an extension to pending certificates (e.g., to insert a group-linked issuance policy in environments using Authentication Mechanism Assurance (AMA)). See Certify wiki - Escalation Techniques - ManageCertificates for details.Windows
Request a certificate that requires manager approval (example ESC1 scenario):Linux
Approve a pending request:Opsec Considerations
Approving requests generates issuance events and stores issued certificates on the CA host. Repeated approvals or unusual patterns (e.g., high-value templates) may be monitored. Added extensions or policy changes may be auditable depending on CA logging configuration.Edge Schema
Source: User, Group, ComputerDestination: EnterpriseCA
Traversable: Yes