Use this dialog box to specify Online Certificate Status Protocol (OCSP) settings that verify the SSL/TLS server certificate chain. OCSP is an Internet protocol used to obtain the revocation status of an X.509 digital certificate. It is an alternative to Certificate Revocation Lists (CRLs), and is often implemented in a Public Key Infrastructure (PKI).

An OCSP server, also called a responder, may return a signed response signifying that the certificate specified in the request is good, revoked, or unknown. If it cannot process the request, it may return an error code.

Enable OCSP

Select this option to enable and configure Online Certificate Status Protocol options. In addition to the options you select here, the OCSP responder's signing certificate must be in the list of trusted certificates (imported using the Administer Terminal Emulator Applet Trusted Certificate List on the Certificates tab in the Security Setup section of the Administrative WebStation), or signed by an already trusted certificate. If the OCSP responder's signing certificate is not the same as that of the Certificate Authority (CA) that signed the server certificate, the revocation status of the OCSP responder's signing certificate will be checked unless the ocsp-no-check extension is present.

Use Authority Information Access extension in the certificates

The Authority Information Access (AIA) extension indicates how to access Certificate Authority information and services for the issuer of the certificate in which the extension appears. When this option is enabled, the OCSP server URL specified in the Authority Information Access extension of a certificate is used to check the certificate revocation status using the Online Certificate Status Protocol.

Verify that the certificate and response are signed by the same private key

If enabled, the OCSP signing certificate must be signed by the same private key that signed the SSL/TLS server certificate.

Use OCSP responders

Specify the URLs (one per line) of the OCSP responders you want to use. HTTP URLs are supported.

Example:     http://ocsp.example.com

Verify that the OCSP response is signed by a designated OCSP responder

If you select this option, you can use the methods included below to verify the revocation status of the OCSP responder's signing certificate. The extended KeyUsage must have the unique OCSP bit set in the OCSP signing certificate.

Use CRL Distribution Points extension

   A CRL distribution point is a location where you can download the latest CRL. The CRL distribution points extension identifies how CRL information is obtained. If selected, the CRL distribution points extension is used to verify the certificate status of the OCSP responder.

Use Authority Information Access extension

   When enabled, the Authority Information Access extension in the OCSP responder's signing certificate is used to verify the certificate status of the OCSP responder.

Use CRLs

   To use Certificate Revocation Lists as part of the verification, also specify the CRL URLs (one per line) to be used. LDAP, File, and HTTP protocols are supported.

Examples:

ldap://myCAServer.example.com/CA/certificaterevocationlist
file://localhost/c:/crls/TrustAnchorCRL.crl
http://server1.example.com/CertEnroll/server1.example.com.crl

Use OCSP responders

   Specify the URLs (one per line) of the OCSP responders you want to use. HTTP protocols are supported.

Example:     http://ocsp.example.com

Related Topics