Verifying Integration
Generate a Certificate Request
Log on to the OCSPCL machine and generate certificate requests using the below template structure. (Try to use different vendors' cryptographic service providers).
Copy and paste the above template into any text editor and ensure that Provider Name variable is specified correctly (with the speech marks around it).
Once the template has been successfully setup, save it as
test.inf
on C:\ drive.Open the command prompt and go to local drive (In this case C:). Type
certreq -new test.inf test.req
command in the command prompt. A certificate request calledtest.req
is generated in C:\ drive.Execute
certreq -submit -attrib "CertificateTemplate:WebServer" test.req
command in the command prompt. A pop up window confirming which CA to use is displayed. Click the OCSPCA entry, and click OK. A file dialog to save the certificate in a file is displayed.Save the certificate file and click OK. After a short pause, a message Certificate Successfully Generated displays on the command prompt and a certificate file called
test.cer
is generated on the C:\ drive.
Test the certificate's origin
Log on to OCSPCA and go to Start > Control Panel > Administrative Tools > Certification Authority.
In the Certification Authority snap-in, click Certification Authority (Computer)/CA name/Revoked Certificates in the console tree to publish a new CRL. Then, right-click on the on the Revoked Certificates folder, point to All Tasks, and click Publish.
Open the Certification Authority snap-in and right-click on the CA, to remove all CRL distribution point extensions from the issuing CA.
In the pop-up menu, click Properties.
On the Extensions tab, confirm that Select extension is set to CRL Distribution Point (CDP).
From the list, click any CRL distribution points, click Remove, and click OK.
Click Apply. A pop-up box displays stating that you need to restart the service.
Click OK to restart the service.
Using the certificate called
test.cer
that was generated earlier on the OCSPCL machine, verify that clients can still obtain revocation data. On the OCSPClient, executecertutil -url test.cer
command.In the URL Retrieval Tool dialog box, click the radio button next to CRLs (from CDP) and click Retrieve. Click the radio button next to OCSP (from AIA) and click Retrieve. The list should contain an OCSP entry showing the web address of your OCSP server.
OCSP Verification
Open the command prompt and select the local drive (in this case C:). Enter
certutil -verify test.cer > test.txt
in the command prompt window.When the Verify command has been completed, open the test.txt file on C:\ drive. It should contain information in the following format:
Ensure that last section of the verify command's output reads something like this:
This shows that the OCSP Server is working correctly. The most important part of the above example is the Leaf certificate revocation check passed line, as this shows the OCSP server is returning the certificate status as 'Good'.
Note
If the log generated by the verify command does not include the above section (or similar) and has errors in the output, then restart the OCSP server and client machine. Run the verify command again on the certificate file.