Certificate Revocation Guide
Overview
Certificate revocation is a critical security mechanism that allows administrators to invalidate certificates before their natural expiration date. This is essential when certificates are compromised, devices are lost or stolen, users leave the organization, or security policies change.
IronWiFi provides comprehensive certificate revocation capabilities through Certificate Revocation Lists (CRL) and Online Certificate Status Protocol (OCSP), ensuring that revoked certificates are immediately rejected during authentication attempts.
Why Certificate Revocation Matters
Security Incidents
- Lost or stolen devices must be immediately denied access
- Compromised private keys require instant invalidation
- Suspected security breaches need rapid response
- Unauthorized certificate usage must be prevented
Organizational Changes
- Employee terminations require access removal
- Role changes may necessitate new certificates
- Contractor access needs time-limited validity
- Department transfers require updated credentials
Compliance Requirements
- GDPR requires data access control
- HIPAA mandates immediate access revocation
- PCI-DSS requires certificate lifecycle management
- SOC 2 demands audit trails
Operational Needs
- Certificate replacement for upgrades
- Policy changes requiring new certificates
- Device refresh cycles
- Certificate format updates
Revocation Technologies
Certificate Revocation List (CRL)
How CRL Works
CRL Structure
Advantages
- Simple implementation
- Works offline (once downloaded)
- No additional infrastructure required
- Widely supported by all platforms
- Low computational overhead
Disadvantages
- Delayed revocation (update interval)
- Large file size with many certificates
- Bandwidth consumption for downloads
- Cache expiration delays
- Not real-time
Best Use Cases
- Stable environments with infrequent changes
- Offline or air-gapped networks
- Legacy systems requiring CRL
- Low-criticality applications
- Bandwidth-constrained environments
Online Certificate Status Protocol (OCSP)
How OCSP Works
OCSP Request/Response
Advantages
- Real-time revocation checking
- Immediate certificate invalidation
- Smaller message size than CRL
- Reduced bandwidth (single certificate check)
- Fresh status information
Disadvantages
- Requires network connectivity
- Additional infrastructure (OCSP responder)
- Latency for each authentication
- Single point of failure
- Privacy concerns (certificate queries tracked)
Best Use Cases
- High-security environments
- Rapid access revocation requirements
- Large certificate deployments
- Frequently changing access policies
- Compliance-driven organizations
OCSP Stapling
How OCSP Stapling Works
Advantages
- Eliminates client OCSP queries
- Improved performance (cached response)
- Enhanced privacy (no tracking)
- Reduced OCSP responder load
- Scalability
Limitations
- Only for server certificates (RADIUS)
- Not for client certificate checking
- Requires TLS 1.2+ support
- Implementation complexity
Comparison Matrix
IronWiFi Revocation Configuration
Enabling CRL
IronWiFi Console Setup
Certificate Configuration
Enabling OCSP
IronWiFi Console Setup
Certificate Configuration
RADIUS Server Configuration
CRL Configuration on RADIUS
OCSP Configuration on RADIUS
Revocation Procedures
Manual Certificate Revocation
Single Certificate Revocation
Bulk Revocation
Automated Revocation
User Lifecycle Integration
Integration-Based Revocation
Security Event-Driven Revocation
Revocation Verification
Testing Revocation
Monitoring Revocation Status
Certificate Hold and Reinstatement
Temporary Suspension
Certificate Hold Mechanism
Placing Certificate on Hold
Removing Certificate from Hold
Permanent Revocation
Irreversible Revocations
Troubleshooting
Common Issues
CRL Download Failures
OCSP Responder Timeouts
Revoked Certificates Still Authenticating
Certificate Wrongly Revoked
Debugging Tools
OpenSSL Commands
RADIUS Debugging
Network Diagnostics
Best Practices
Revocation Policy
Define Revocation Procedures
Approval Workflows
Monitoring and Alerting
Real-Time Alerts
Regular Auditing
Certificate Lifecycle Management
Proactive Management
Certificate Hygiene
Security Hardening
CRL Security
OCSP Security
Access Controls
Compliance and Reporting
Regulatory Requirements
GDPR Compliance
HIPAA Compliance
PCI-DSS Compliance
Reporting
Standard Reports
Custom Reports
Emergency Procedures
Mass Revocation
CA Compromise Scenario
Disaster Recovery
Revocation System Failure
Advanced Topics
Delta CRLs
Concept and Benefits
Certificate Pinning
Enhanced Security
Support and Resources
IronWiFi Support
Contact Information
- Email: support@ironwifi.com
- Portal: console.ironwifi.com/support
- Documentation: www.ironwifi.com/help-center
- Emergency: Available for Enterprise accounts
Response Times
- Critical (revocation system down): Under 2 hours
- High (mass revocation needed): Under 4 hours
- Normal (revocation questions): Within 24 hours
- General guidance: Within 48 hours
Related Documentation
- PKI Infrastructure - Certificate authority management
- EAP-TLS Configuration - Client certificate setup
- Passpoint OSU Portal - Automated certificate provisioning
- Security & Compliance - Security best practices
External Resources
Standards and RFCs
- RFC 5280: X.509 Certificate and CRL Profile
- RFC 6960: Online Certificate Status Protocol (OCSP)
- RFC 6961: Multiple Certificate Status Request (OCSP Stapling)
- RFC 3647: Certificate Policy and Certification Practices Framework
Tools
- OpenSSL: Certificate and CRL manipulation
- XCA: Certificate authority management
- Wireshark: Network traffic analysis (OCSP/CRL)
Need Help with Certificate Revocation?
Contact IronWiFi support for assistance with revocation policies, emergency procedures, or implementation guidance.
Related Topics
Was this page helpful?