![]() |
![]() |
![]() |
![]() |
Working With Encrypted Data > Validating certificates
|
![]() |
Use the tabs on the Configure > My Proxy > SSL > Validation page to enable and configure the CVE.
|
![]() |
![]() |
1.
|
In the Content Gateway manager, go to the Configure > SSL > Validation > General tab.
|
2.
|
If it is not already selected, mark the Enable the certificate verification engine check box.
|
3.
|
Indicate whether or not to Deny certificates where the common name does not match the URL. When this option is selected, 2 checks are made:
|
4.
|
If you have enabled the Deny certificates option, indicate whether or not to Allow wildcard certificates. When selected, this option allows matches with Common Names that include the "*" (wildcard) character in the name.
|
5.
|
Select the No expired or not yet valid certificates option to deny access to sites that offer an expired or not yet valid certificate. This is a basic check that is important because many malicious sites operate with expired certificates.
|
6.
|
Indicate whether or not to Deny self-signed certificates. By default, the option is enabled, and self-signed certificates (certificates without an official certificate authority) are considered invalid.
|
7.
|
Indicate whether or not to Verify entire certificate chain. By default, this option is enabled, and Content Gateway verifies expiration and revocation status of all certificates between the site certificate and the root Certificate Authority as specified in the certification path of the certificate. This is an important check.
|
8.
|
Indicate whether or not to Check certificate revocation by CRL. Certificate revocation lists (CRLs) are used to check a certificate's revocation status. CRLs list certificates that have been issued and subsequently revoked by the CA.
|
![]() |
If this option is enabled, verify that the daily CRL update feature is enabled on the Revocation Settings tab under CRL Settings.
|
![]() |
If this option is not used, disable the daily CRL update feature on the Revocation Settings tab under CRL Settings.
|
9.
|
Indicate whether or not to Check certificate revocation by OCSP. Online Certificate Status Protocol (OCSP) is an alternate way to check a certificate's revocation status. While OCSP is beneficial, it is not used as widely as CRLs and therefore is not as reliable. Also, it is a real-time, Internet-hosted check that can introduce some request handling latency.
|
It is recommended that you use OCSP in addition to, rather than instead of, CRLs. See Keeping revocation information up to date for more information about CRLs and OCSP.
|
10.
|
If you are using OCSP revocation checking, use the Block certificates with Unknown OCSP state option to determine whether to block certificates that return the "Unknown" status.
|
11.
|
If both CRL and OCSP revocation checking are enabled, indicate your Preferred method for revocation check. The selected method (CRL, by default), is applied first.
|
12.
|
If you have enabled CRL or OCSP checking (or both), use the Block certificates with no CRL URI and with no OCSP URI option to block certificates that do not have the expected, associated URIs. For example, if only CRL checking is enabled and the certificate doesn't have a CRL URI, if this option is enabled the connection is blocked. When both CRL and OCSP checking are enabled, the block occurs only if both CRL and OCSP lack a URI.
|
![]() |
![]() |
![]() |
![]() |
![]() |
Working With Encrypted Data > Validating certificates
|