Try OpenEdge Now
skip to main content
Core Business Services - Security and Auditing
Security : Public-Key Infrastructure (PKI) : Trust relationships and supporting mechanisms : Key and certificate management : Digital certificate life-cycle management
 
Digital certificate life-cycle management
As described earlier, digital certificates have a lifetime during which they are considered valid. When this lifetime expires, the certificate can no longer be used for authentication and must be updated to restore its validity. A certificate can also become invalid from being revoked by a CA. Common reasons for which a CA might revoke a digital certificate include a change in job status or suspicion of a compromised private key.
The CA typically provides a means to revoke digital certificates (certificate revocation). This process depends on the mechanism that the CA for each certificate makes available to communicate certificate revocation. Typically, a client that utilizes a PKI can check with the CA to update its list of revoked digital certificates so that it can fail the authentication of any revoked identities. This process can be manual or automated, depending on how the PKI is able to respond to each CAs revocation process. At a minimum, manually removing a revoked identity from a server key store or a revoked root CA certificate from a client certificate store is sufficient to handle the revocation once it is known.