FAQ

Using OCSP and CRLs

FAQ ID:    FAQ1854
Version:    1.0
Status:    Published
Published date:    01/25/2012
 

Answer

The attached document is a 1-pager about the importance of using OCSP, and contains a summary about how to configure it. It provides a "use case" point of view. 

 

Summary:

 

Customer Pain Point

The recent issues with Certificate Authorities (e.g. Comodo and DigiNotar) have shattered the trust in public key infrastructures.

Hacked root CAs introduces the risk for undetected man-in-the-middle attacks.

Major concerns are Advanced Persistent Threats (APTs) and issues like loss of intellectual property or malware infection.

 

Requirements

Centralized certificate management is the most secure way to address these risks. Real-time certificate validation is a key requirement and OCSP is the technology to fulfill this requirement.

 

Business Value

Employees are protected from being lured to open fraudulent web pages. This prevents possible data leakage or malware issues.

 

 

Attachment

UC-OCSP-CRL-v1.1.pdf
298K • < 1 minute @ 56k, < 1 minute @ broadband



Rate this Page

Please take a moment to complete this form to help us better serve you.

Did this document help answer your question?
 
 
If you are finished providing feedback, please click the RATE CONTENT button. Otherwise, please add more detail in the following text box and then click RATE CONTENT.
 
 

Your response will be used to improve our document content.

Ask a Question