Validation of certificates
When a certification authority wants to revoke a certificate prior to the expiry of the indicated validity period, it records the serial number of the certificate on a validation server in a Certificate Revocation List.
Validation servers can be used in three ways:
On one hand the complete Certificate Revocation List (CRL) in standardized data format can be downloaded in regular intervals (e. g. once a week). When using this procedure possibly one only becomes aware of a revocation after days.
On the other hand one can send the serial number of a certificate during validation to the server that responds whether the certificate is still valid: Online Certificate Status Protocol (OCSP).
Even better the servers includes into his response the current corresponding OCSP response signed and timestamped by the certification authority: OCSP Stapling.
Addresses for CRL download are included as additional details in the issued certificates and the OCSP address in the certificate of the certification authority. This allows for fully automatic use of the validation mechanisms. CRLs can also be used semiautomatically or manually.
To keep up-to-date, the links in the table below point directly to the validation servers of the certification authorities involved in the operation of the CA.
When you import a CRL this way, your WWW program probably starts to reload the newest version of the CRL from the same address in regular intervals.
When clicking on Import the certificate is downloaded in binary format for automatically importing into your WWW program. When clicking on Text the certificate is downloaded in PEM format for saving.
PDF certificates
|
X.509 PDF CA (root CA) |
---|---|
Now |
„TCS“ certificates
|
X.509 GÉANT TCS |
X.509 root CA |
X.509 alternative root CA |
---|---|---|---|
Now |
User RSA
certificates: |
USERTrust RSA
Certification Authority |
AAA
Certificate Services |
User eScience RSA
certificates: |
|||
Code Signing RSA
certificates: |
|||
Server RSA
certificates: |
|||
Server eScience RSA
certificates: |
|||
Server RSA
certificates via ACME: |
|||
User ECC
certificates: |
USERTrust ECC
Certification Authority |
||
User eScience ECC
certificates: |
|||
Server ECC
certificates: |
|||
Server eScience ECC
certificates: |
|||
Server ECC
certificates via ACME: |
„Global“ certificates
|
X.509 CA Uni MS |
X.509 DFN-PCA |
X.509 root CA |
---|---|---|---|
2022 |
T-TeleSec GlobalRoot
Class 2 |