This certificate template uses CSPs that do not support the minimum key length you chose. Requests will use any CSP available on the subject's computer. Would you like to specify which CSPs should be used?
This certificate cannot be used to verify the authenticity of downloaded software because it does not have the appropriate ...
This certificate has been validated on your computer. The remote computer was not used to verify this certificate. To ensure ...
This Certificate is currently configured for SSL use in %1 virtual directories in this site. Are you sure you want to remove ...
This certificate is not valid because one of the certification authorities in the certification path does not appear to be ...
This certificate template uses CSPs that do not support the minimum key length you chose. Requests will use any CSP available ...
This certificate trust list cannot be verified. The certificate that countersigned this CTL is not available for verification. ...
This certificate trust list is not valid. The countersignature cannot be verified and the CTL may have been tampered with. ...
This certificate validates to a root certificate that appears to be trusted by the remote computer. To ensure this certificate ...
This certificate will be used in the Per Device or Per User licensing mode. Therefore, it will instead be installed on the ...