SiteMinder can check the status of a certificate using Online Certificate Status Protocol (OCSP). During certificate checking, the Policy Server looks for the existence of an Issuer DN in a configuration file (smocsp.conf). If the Issuer DN is found, a certificate status check is made using a certified OCSP 1.0 Responder also specified in the smocsp.conf file. If the Issuer DN is not found in the configuration file, the certificate is considered to have passed OCSP checking.
To use OCSP checking, you will require:
To configure OCSP certificate status checking
The smocsp.conf file must be an ASCII file containing one or more OCSPResponder records, each with the following format:
[ OCSPResponder IssuerDN C=US,O=U.S. Government,OU=DoD,OU=PKI,CN=DOD CLASS 3 CA-9 CACertDir localhost:389 CACertEP cn=DOD CLASS 3 CA-9,ou=PKI,ou=DoD,o=U.S. Government,c=US ResponderCertDir localhost:389 ResponderCertEP cn=OCSP,ou=PKI,ou=DoD,o=U.S. Government,c=US ResponderCertAttr cacertificate ResponderLocation aristotle.jfcom.mil:80 ]
where:
[ OCSPResponder IssuerDN <IssuerDN> [AltIssuerDN <IssuerDN>] CACertDir <Name of User Dir containing CA cert> CACertEP <Entry point in CACertDir containing CA cert> ResponderCertDir <Name of User Dir containing Responder cert> ResponderCertEP <Entry point in ResponderCertDir containing Responder cert> ResponderCertAttr <Directory attribute of Responder cert> ResponderLocation <Server-name of Responder:port #> AIAExtension<YES|NO> ]
| Copyright © 2011 CA. All rights reserved. | Email CA Technologies about this topic |