Skip to main contentSkip to search
Skip to main content

Certificate Revocation Guide

Overview

Certificate revocation is a critical security mechanism that allows administrators to invalidate certificates before their natural expiration date. This is essential when certificates are compromised, devices are lost or stolen, users leave the organization, or security policies change.

IronWiFi provides comprehensive certificate revocation capabilities through Certificate Revocation Lists (CRL) and Online Certificate Status Protocol (OCSP), ensuring that revoked certificates are immediately rejected during authentication attempts.

Why Certificate Revocation Matters

Security Incidents

  • Lost or stolen devices must be immediately denied access
  • Compromised private keys require instant invalidation
  • Suspected security breaches need rapid response
  • Unauthorized certificate usage must be prevented

Organizational Changes

  • Employee terminations require access removal
  • Role changes may necessitate new certificates
  • Contractor access needs time-limited validity
  • Department transfers require updated credentials

Compliance Requirements

  • GDPR requires data access control
  • HIPAA mandates immediate access revocation
  • PCI-DSS requires certificate lifecycle management
  • SOC 2 demands audit trails

Operational Needs

  • Certificate replacement for upgrades
  • Policy changes requiring new certificates
  • Device refresh cycles
  • Certificate format updates

Revocation Technologies

Certificate Revocation List (CRL)

How CRL Works

CRL Structure

Advantages

  • Simple implementation
  • Works offline (once downloaded)
  • No additional infrastructure required
  • Widely supported by all platforms
  • Low computational overhead

Disadvantages

  • Delayed revocation (update interval)
  • Large file size with many certificates
  • Bandwidth consumption for downloads
  • Cache expiration delays
  • Not real-time

Best Use Cases

  • Stable environments with infrequent changes
  • Offline or air-gapped networks
  • Legacy systems requiring CRL
  • Low-criticality applications
  • Bandwidth-constrained environments

Online Certificate Status Protocol (OCSP)

How OCSP Works

OCSP Request/Response

Advantages

  • Real-time revocation checking
  • Immediate certificate invalidation
  • Smaller message size than CRL
  • Reduced bandwidth (single certificate check)
  • Fresh status information

Disadvantages

  • Requires network connectivity
  • Additional infrastructure (OCSP responder)
  • Latency for each authentication
  • Single point of failure
  • Privacy concerns (certificate queries tracked)

Best Use Cases

  • High-security environments
  • Rapid access revocation requirements
  • Large certificate deployments
  • Frequently changing access policies
  • Compliance-driven organizations

OCSP Stapling

How OCSP Stapling Works

Advantages

  • Eliminates client OCSP queries
  • Improved performance (cached response)
  • Enhanced privacy (no tracking)
  • Reduced OCSP responder load
  • Scalability

Limitations

  • Only for server certificates (RADIUS)
  • Not for client certificate checking
  • Requires TLS 1.2+ support
  • Implementation complexity

Comparison Matrix

IronWiFi Revocation Configuration

Enabling CRL

IronWiFi Console Setup

Certificate Configuration

Enabling OCSP

IronWiFi Console Setup

Certificate Configuration

RADIUS Server Configuration

CRL Configuration on RADIUS

OCSP Configuration on RADIUS

Revocation Procedures

Manual Certificate Revocation

Single Certificate Revocation

Bulk Revocation

Automated Revocation

User Lifecycle Integration

Integration-Based Revocation

Security Event-Driven Revocation

Revocation Verification

Testing Revocation

Monitoring Revocation Status

Certificate Hold and Reinstatement

Temporary Suspension

Certificate Hold Mechanism

Placing Certificate on Hold

Removing Certificate from Hold

Permanent Revocation

Irreversible Revocations

Troubleshooting

Common Issues

CRL Download Failures

OCSP Responder Timeouts

Revoked Certificates Still Authenticating

Certificate Wrongly Revoked

Debugging Tools

OpenSSL Commands

RADIUS Debugging

Network Diagnostics

Best Practices

Revocation Policy

Define Revocation Procedures

Approval Workflows

Monitoring and Alerting

Real-Time Alerts

Regular Auditing

Certificate Lifecycle Management

Proactive Management

Certificate Hygiene

Security Hardening

CRL Security

OCSP Security

Access Controls

Compliance and Reporting

Regulatory Requirements

GDPR Compliance

HIPAA Compliance

PCI-DSS Compliance

Reporting

Standard Reports

Custom Reports

Emergency Procedures

Mass Revocation

CA Compromise Scenario

Disaster Recovery

Revocation System Failure

Advanced Topics

Delta CRLs

Concept and Benefits

Certificate Pinning

Enhanced Security

Support and Resources

IronWiFi Support

Contact Information

Response Times

  • Critical (revocation system down): Under 2 hours
  • High (mass revocation needed): Under 4 hours
  • Normal (revocation questions): Within 24 hours
  • General guidance: Within 48 hours

External Resources

Standards and RFCs

  • RFC 5280: X.509 Certificate and CRL Profile
  • RFC 6960: Online Certificate Status Protocol (OCSP)
  • RFC 6961: Multiple Certificate Status Request (OCSP Stapling)
  • RFC 3647: Certificate Policy and Certification Practices Framework

Tools

  • OpenSSL: Certificate and CRL manipulation
  • XCA: Certificate authority management
  • Wireshark: Network traffic analysis (OCSP/CRL)

Need Help with Certificate Revocation?

Contact IronWiFi support for assistance with revocation policies, emergency procedures, or implementation guidance.

Was this page helpful?