Validation of certificates
When a certification authority wants to revoke a certificate prior to the expiry of the indicated validity period, it records the serial number of the certificate on a validation server in a Certificate Revocation List.
Validation servers can be used in three ways:
On one hand the complete Certificate Revocation List (CRL) in standardized data format can be downloaded in regular intervals (e. g. once a week). When using this procedure possibly one only becomes aware of a revocation after days.
On the other hand one can send the serial number of a certificate during validation to the server that responds whether the certificate is still valid: Online Certificate Status Protocol (OCSP).
Even better the servers includes into his response the current corresponding OCSP response signed and timestamped by the certification authority: OCSP Stapling.
Addresses for CRL download are included as additional details in the issued certificates and the OCSP address in the certificate of the certification authority. This allows for fully automatic use of the validation mechanisms. CRLs can also be used semiautomatically or manually.
To keep up-to-date, the links in the table below point directly to the validation servers of the certification authorities involved in the operation of the CA.
When you import a CRL this way, your WWW program probably starts to reload the newest version of the CRL from the same address in regular intervals.
When clicking on Import the certificate is downloaded in binary format for automatically importing into your WWW program. When clicking on Text the certificate is downloaded in PEM format for saving.
PDF certificates
|
PDF CA (root CA) |
---|---|
Now |
„TCS“ certificates
|
intermediate CA |
root CA |
alternative root CA |
---|---|---|---|
Now |
User RSA certificates: GEANT S/MIME RSA 1 HARICA S/MIME RSA |
HARICA Client RSA Root CA 2021 |
|
Server RSA certificates: GEANT TLS RSA 1 HARICA OV TLS RSA |
HARICA TLS RSA Root CA 2021 |
Hellenic Academic and Research Institutions RootCA 2015 |
|
User ECC certificates: GEANT S/MIME ECC 1 HARICA S/MIME ECC |
HARICA Client ECC Root CA 2021 |
||
Server ECC certificates: GEANT TLS ECC 1 HARICA OV TLS ECC |
HARICA TLS ECC Root CA 2021 |
Hellenic Academic and Research Institutions ECC RootCA 2015 |
|
|
intermediate CA |
root CA |
alternative root CA |
2025 |
User RSA certificates: GEANT Personal CA 4 |
USERTrust RSA Certification Authority |
AAA Certificate Services |
User eScience RSA certificates: GEANT eScience Personal CA 4 |
|||
Code Signing RSA certificates: GEANT Code Signing CA 4 |
|||
Server RSA certificates: GEANT OV RSA CA 4 |
|||
Server eScience RSA certificates: GEANT eScience SSL CA 4 |
|||
Server RSA certificates via ACME: Sectigo RSA Organization Validation Secure Server CA |
|||
User ECC certificates: GEANT Personal ECC CA 4 |
USERTrust ECC Certification Authority |
||
User eScience ECC certificates: GEANT eScience Personal ECC CA 4 |
|||
Server ECC certificates: GEANT OV ECC CA 4 |
|||
Server eScience ECC certificates: GEANT eScience SSL ECC CA 4 |
|||
Server ECC certificates via ACME: Sectigo ECC Organization Validation Secure Server CA |
„Global“ certificates
|
CA Uni MS |
DFN-PCA |
root CA |
---|---|---|---|
2022 |
T-TeleSec GlobalRoot Class 2 |