Galaxiom, you are quite knowledgeable
It took quite a bit of research to put it all together. There is plenty about selfcert but nowhere puts the whole process together. The trick with the Certification Authority is even knowing what to search for. There is also a lot of confusion about certificate security out there.
kind of suggests that a application can and should be signed with a pfx.
In Windows itself the signing is not so much done by a pfx per se but by the private key imported into the Windows Secure Store from the pfx (or the one generated by selfcert.exe).
Other applications could extract the key directly from the pfx. They will ask you for the private key password during that process.
I created a SelfCert, exported it and have been manually installing it to computers in the Trusted Root Authority for a couple of years. It has worked well up to this point. The Selfcert will expire on 4/22/2011. I have found a program that will allow altering a cert expire date but have not tried it.
It is quite easy to alter the expiry date on a cer certificate.
No need for special software. Just use a Hex Editor. I use XVI32.
http://www.chmaas.handshake.de/delphi/freeware/xvi32/xvi32.htm
Between the Issued To and Issued By strings there are two number strings. The first is the issue date and the second the expiry.
They are Universal Time in the format:
yymmddhhnnssZ
However I found that Windows is not so easily fooled. The edited certificate will not import to the Trusted Root Authority store. Left to choose the store automatically it will install to the Other People store.
I have need of a way to push out the new cert when the time comes. The network dept. does not seem interested in the certificate server idea.
More work for you, none for them, which is no doubt their motivation for that decision.
However they can easily push out the self-signed certificate through group policy. Just feed in the self-signed certificate to both Trusted Root Authority and the Software Restriction policies as I explained previously. This will set it at the machine level on each client PC.
Unfortunately it seems the only other alternative is to install the certificate manually. I didn't persue trying to manually install one for the whole machine because I decided to go for the group policy install. I had a quick look but it appears that it has to be installed for each user.
I did come across a thread suggesting that certutil.exe could be used but I concluded that they were barking up the wrong tree as this is a command line manager for the CA on the server. None of the posters reported they has succeeded in using it anyway.
The Certification Authority can reissue can reissue an expired certificate. The life of the certificate can also be controlled. It defaults to one year but if it is to be changed it must be set in the ini file BEFORE the installation of the Authority. (These are the kinds of things one discovers later.)
