Using OCSP and CRLs


<< Back to Knowledge Search

Solution

Overview

The attached document is a 1-pager about the importance of using OCSP, and contains a summary about how to configure it. It provides a "use case" point of view. 

 

Summary:

 

Customer Pain Point

The recent issues with Certificate Authorities (e.g. Comodo and DigiNotar) have shattered the trust in public key infrastructures.

Hacked root CAs introduces the risk for undetected man-in-the-middle attacks.

Major concerns are Advanced Persistent Threats (APTs) and issues like loss of intellectual property or malware infection.

 

Requirements

Centralized certificate management is the most secure way to address these risks. Real-time certificate validation is a key requirement and OCSP is the technology to fulfill this requirement.

 

Business Value

Employees are protected from being lured to open fraudulent web pages. This prevents possible data leakage or malware issues.

 

 

Cause
Resolution
Workaround
Additional Information
Bug Number
InQuira Doc IdFAQ1854
Attachment Download File

Article Feedback

Hide Properties
First Published      10/01/2014
Last Modified      10/01/2014
Last Published      10/01/2014
Article Audience
Product      ProxySG
Topic      Installation / Configuration, SSL / HTTPS
Article Number      000014451
Summary     
Was this helpful?
Comments:
 
Previous MonthNext Month
SunMonTueWedThuFriSat