Skip to content

Configuring Certificate Revocation Checking

Reflection SSL/TLS and Secure Shell connections can be configured to authenticate hosts using digital certificates. To ensure that certificates have not been revoked, you can configure Reflection to check for certificate revocation using CRLs or using an OCSP responder.

When CRL checking is enabled, Reflection always checks for CRLs in any location specified in the CRL Distribution Point (CDP) field of the certificate. In addition, Reflection can also be configured to check for CRLs located in an LDAP directory or using an OCSP responder.

Reflection's default value for certificate revocation checking is based on your current system setting. If your system is configured to do CRL checking, all Reflection sessions will check for certificate revocation using CRLs by default.

note

When Reflection is running in DOD PKI mode, certificate revocation is always enabled and cannot be disabled.

To enable CRL checking for all SSH sessions

  1. In Internet Explorer, choose Tools > Internet Options > Advanced.

  2. Under Security, select Check for server certificate revocation.

Using Reflection, you can enable certificate revocation checking using either a CRL or an OCSP responder.

To enable CRL checking for a Secure Shell session (FTP Client and SSH terminal sessions)

  1. Open the Reflection Secure Shell Settings dialog box.

  2. Click the PKI tab.

  3. Select either Use OCSP or Use CRL.

To enable CRL checking for SSL/TLS sessions (FTP Client only)

  1. Open the Security Properties dialog box.

  2. On the SSL/TLS tab, click Configure PKI. (Use SSL/TLS security must be selected.)

  3. Select either Use OCSP or Use CRL.

note

CRLs and/or OCSP responders required by a certificate are identified in the AIA and/or CDP extension of the certificate. If this information is not provided in the certificate, use the OCSP and LDAP tabs of the Reflection Certificate Manager for configuration.