Previous Topic: Generate a New Certificate Signing Request

Next Topic: Add a CRL to the CDS


How to Verify that Certificates are Valid Using CRLs

A Certificate Revocation List (CRL) is issued by a Certificate Authority to its subscribers. The list contains serial numbers of certificates that are invalid or have been revoked. When a request to access a server is received, the server allows or denies access based on the CRL.

Federation Manager can leverage CRLs for its certificate functions. For Federation Manager to use a CRL, the certificate data store must point to a current CRL. If Federation Manager tries using a revoked partner certificate, you see an error message. For legacy federation, the error message is in the SAML assertion. The message indicates that authentication failed.

Federation Manager supports the following CRL features:

Federation Manager does not validate an SSL server certificate against a CRL. The web server where Federation Manager is installed manages the SSL server certificate.

You are not required to have a CRL for each root CA in the system. If there is no CRL for the root CA, Federation Manager assumes that all certificates signed by that CA are trusted certificates.

The following figure shows the procedures for managing CRLs.

crl_procedures

The CRL configuration steps are as follows:

  1. Add a CRL to the CDS.
  2. Update a CRL.