Validate smart card certificate usage rule compliance

This policy setting allows you to associate an object identifier from a smart card certificate to a BitLocker-protected drive. This policy setting is applied when you turn on BitLocker. The object identifier is specified in the enhanced key usage (EKU) of a certificate. BitLocker can identify which certificates may be used to authenticate a user certificate to a BitLocker-protected drive by matching the object identifier in the certificate with the object identifier that is defined by this policy setting. Default object identifier is 1. 3. 6. 1. 4. 1. 311. 67. 1. 1Note: BitLocker does not require that a certificate have an EKU attribute but if one is configured for the certificate it must be set to an object identifier (OID) that matches the OID configured for BitLocker. If you enable this policy setting the object identifier specified in the “Object identifier” box must match the object identifier in the smart card certificate. If you disable or do not configure this policy setting a default object identifier is used.

Additional Information

  1. Registry path is:

    HKEY_LOCAL_MACHINE -> Software -> Policies -> Microsoft -> FVE # CertificateOID

  2. The Administrative Template path is:

    Windows Components -> BitLocker Drive Encryption


* Making mistakes while changing registry values can affect your system adversely. We recommend you to create a System Restore point before making registry manipulation. If you're new to Registry Editor, read this beginner's guide.
** To locate the registry and administrative template path, checkout beginner's guide.
You're here :
Checkout Kapil Sparks™