Enable certificate revocation checking
You can enable automatic checks for revoked certificates, so that an Online Certificate Status Protocol (OCSP) server blocks users from making non-secure connections. Automatic revocation checking is helpful in cases where the Certificate Authority (CA) improperly issued a certificate or if a private key is compromised.
Before you begin
- You must be logged in with a user profile that includes Security admin permissions. Otherwise, certificate functions do not appear.
A DNS server is configured on both controllers, which enables use of a fully qualified domain name for the OCSP server. This task is available from the Hardware page.
If you want to specify your own OCSP server, you must know the URL of that server.
About this task
During this task, you can configure an OCSP server or use the server specified in the certificate file. The OCSP server determines if the CA has revoked any certificates before their scheduled expiration date, and then blocks the user from accessing a site if the certificate is revoked.
What happens next?
If the storage array attempts to connect to a server with a revoked certificate, the connection is denied and an event is logged.