Managing revoked certificates
The CA creates a Certificate Revocation List (CRL) and publishes it at specified intervals and location. The URL of the location is available in the CRL distribution point attribute of the certificate. In Sterling B2B Integrator, any automatically exchanged certificate must contain information about CRL distribution point.
- Certificate's private key is compromised.
- Certificate is superseded.
- Certificate is put on hold.
- Certificate's privilege is withdrawn.
- Reads the CRL URL value from the CERTIFICATE_MAPPING table.
- Accesses the CRL URL and gets the CRL.
- Checks if any certificates that are currently being used are revoked.
During the automatic certificate exchange, the certificate that is exchanged is checked for revocation. If the certificate that is received is revoked, then it is not accepted. If the certificate that is sent is revoked, then it is not queued for sending.
If it is determined that a certificate that is used is revoked, you must procure a new certificate from the CA and send it to the partners to replace the revoked certificate. The new certificate might or might not have the same CLID information. If the CLID information is different from the existing one, you must send the new CLID information to the trading partner, before you send the new certificate. When you are sending the new certificate to the partner, set the value of the OFTPVirtualFilename parameter to ODETTE_CERTIFICATE_REPLACE in the related BP. This setting indicates that the new certificate is a replacement certificate.