Previous Topic: Obtain a Key/Certificate Pair for Federated TransactionsNext Topic: How to Verify that Certificates are Valid using OCSP


How to Verify that Certificates are Valid Using CRLs

A Certificate Revocation List (CRL) is issued by a Certificate Authority to its subscribers. The list contains serial numbers of certificates that are invalid or have been revoked. When a request to access a server is received, the server allows or denies access based on the CRL.

CA SiteMinder® Federation Standalone can leverage CRLs for its certificate functions. For CA SiteMinder® Federation Standalone to use a CRL, the certificate data store must point to a current CRL. If CA SiteMinder® Federation Standalone tries using a revoked partner certificate, you see an error message. For legacy federation, the error message is in the SAML assertion. The message indicates that authentication failed.

CA SiteMinder® Federation Standalone supports the following CRL features:

CA SiteMinder® Federation Standalone does not validate an SSL server certificate against a CRL. The web server where CA SiteMinder® Federation Standalone is installed manages the SSL server certificate.

You are not required to have a CRL for each root CA in the system. If there is no CRL for the root CA, CA SiteMinder® Federation Standalone assumes that all certificates signed by that CA are trusted certificates.

The following figure shows the procedures for managing CRLs.

crl_procedures

The CRL configuration steps are as follows:

  1. Add a CRL to the CDS.
  2. Update a CRL.

Add a CRL to the CDS

Ensure that only valid certificates are being used for federation-related PKI functions by using CRLs against which certificates can be checked.

Important! CA SiteMinder® Federation Standalone explicitly requests LDAP CRLs in binary transfer encoding, using the certificateRevocationList;binary LDAP attribute. This means that the CRL data must be stored in this attribute. When a Certificate Authority (CA) publishes a CRL using the LDAP protocol, it must return the CRL data in binary format, in accordance with RFC4522 and RFC4523.

For CA SiteMinder® Federation Standalone to use a CRL, specify the CRL location.

Follow these steps:

  1. Go to the Certs and Keys tab.
  2. Select the Revocation Lists (CRL).

    The list of available CRL locations is displayed.

  3. Click Add.

    The Add Certificate Revocation List is displayed.

    Note: You can click Help for a description of fields, controls, and their respective requirements.

  4. Specify an alias for the issuer of the CRL and the location (URL) of the certificate revocation list.

    The location has to be a file path for a file CRL and an LDAP search path for an LDAP CRL.

  5. Click Save.

The CRL is now added to the certificate data store.

Update a CRL

Update a CRL to verify that the certificate data in use is current.

Follow these steps:

  1. Log in to the Administrative UI.
  2. Select the Certs and Keys tab.
  3. Select CDS Settings.

    The Certificate Settings dialog displays.

  4. Complete one of the following steps

    Note: Click Help for a description of fields, controls, and their respective requirements.

  5. In the CRL Updater section, select Enabled in the CRL Updater State field.
  6. Click Save.

Manage Certificate Cache Refresh and Grace Period

You can complete two other tasks to manage certificate validity checking (CRL or OCSP):

Follow these steps:

  1. Log in to the Administrative UI.
  2. Select the Certs and Keys tab.
  3. Select CDS Settings.

    The Certificate Settings dialog displays.

  4. You can modify the following settings:

    Note: Click Help for a description of fields, controls, and their respective requirements.

  5. Click Save.