Certificate Auto-Revocation



Automatically revoke orphaned X.509 certificates. Keep your PKI clean and secure!



User Certificates

Monitor any changes of your AD user accounts and revoke bygone certificates.

 

Machine Identities

Revoke certificates of deleted or altered computers in your AD.



Revoke from any CA

Submit revocation requests directly to your Microsoft CAs or to any CA connected by certEP.


"Secardeo certRevoke helps to keep your certificate inventory up-to-date, increase security and minimize PKI costs."

Keep your PKI consistent & secure!


  • Make credentials of non-existing AD objects unusable.
  • Eliminate threats from unauthorized use of orphaned certificates.
  • A valid certificate will assure the existence of its subject.

Auto-Revocation with all your CAs.


  • Auto-revoke user and computer certificates by your
  • Microsoft CAs (ADCS),
  • Public or private CAs via certEP.
  • Multiple CAs can be connected in parallel.
  • Monitor user and computer accounts in your Active Directory sub-tree.

Control frequent object changes.


  • Employee fluctuation
  • User name changes (after marriage)
  • Equipment replacement
  • Address changes
  • Object deactivation


Save costs!


  • Save CA fees for unused certificates.
  • Lower service cost of your IT operation provider.
  • Automatically devalue orphaned certificates under thousands of issued certificates.

How it works

Digital certificates can be revoked before the end of their lifetime. Then the contained public key will no longer be accepted for encryption or authentication. For this, the certificate is put on a certificate revocation list that is signed by the CA or the returned status of an online responder (OCSP) will be “revoked”. However, common phenomenons like employee fluctuation or equipment replacement lead to situations where hundreds or thousands of valid certificates still exist but the contained subject or object has disappeared. Another typical scenario is that attributes of an AD object change. For example the surname and e-mail address of a user after marriage or computer or server network addresses and names.


Secardeo certRevoke is a Windows service that integrates with Active Directory and monitors the desired AD tree and object types or the members of an AD group for deletions or attribute changes. certRevoke will automatically send a revocation request to the CA that issued a certificate for the detected AD object.


If an Active Directory object is modified or deleted certRevoke sends a revocation request for all its associated certificates to the CA. The object attributes and organizational units which should be monitored can be configured. By this, automatic re-enrollment of certificates will be triggered through group policy, for example in case of name or address changes. certRevoke supports auto-revocation for multiple Windows CAs or certEP instances.

  • Features

    • Auto-revocation from Microsoft CA (ADCS) 
    • Auto-revocation via Secardeo certEP
    • Multiple CA support
    • Monitoring of user and machine objects in AD
    • Monitoring of AD Group Memberships
    • Flexible control of attributes to monitor
    • Filter for specific OUs in the AD tree
    • Configurable monitoring interval
    • Customizable notifications

Resources

Share by: