Revoking Certificates
Table of Contents
Expand all | Collapse all
-
- Activate Next-Generation Trust Security
-
-
- Configure Akamai Connection
- Configure AWS Connection
- Configure Azure Key Vault Connection
-
- Workload Identity Federation Authentication
- Workload Identity Federation - Azure Identity Provider Authentication
- Next-Gen Trust Security Generated Key Authentication
- User Permissions
- Workload Identity Federation Authentication
- Next-Gen Trust Security Generated Key Authentication
- User Permissions
- Supported OIDC Claims
-
-
-
- Working with the Built-in CA
- Add AWS Public CA
- Add AWS Private CA
- Add DigiCert One Certificate Authority
- Add Entrust
- Add GlobalSign Atlas
- Add GlobalSign MSSL
- Add GoDaddy
- Add Google Cloud Private CA
- Add a HID PKIaaS CA
- Add Certificate Manager - Self-Hosted
- Set Up an OpenSSL Certificate Authority Connector
- Create a Sectigo Certificate Manager Certificate Authority
- Add Zero Touch PKI
- Set Up Certificate Expiration Notifications
- Using a Custom DNS Provider
-
-
-
-
- Create an F5 BIG-IP LTM Machine
- Create a Microsoft Azure Private Key Vault Machine
- Create a Microsoft Azure Application Registration Machine
- Create a Microsoft IIS Machine
- Create a Microsoft Windows (PowerShell) Machine
- Create a Microsoft SQL Server Machine
- Create a Common KeyStore Machine
- Create a Citrix ADC Machine
- Create an Imperva WAF Machine
- Create a VMware NSX Advanced Load Balancer (AVI) Machine
- Create an A10 Thunder ADC Machine
- Create a Cloudflare Machine
- Create Kemp Virtual LoadMaster Machine
- Create a Palo Alto Panorama Machine
- Create a Radware Alteon Machine
-
- Provision to an F5 BIG-IP LTM
- Provision to a Microsoft Azure Private Key Vault
- Provision to Microsoft IIS
- Provision to Microsoft Windows (PowerShell)
- Provision to Microsoft SQL Server
- Provision to a Common KeyStore
- Provision to a Citrix ADC
- Provision to an Imperva WAF
- Provision to VMware NSX Advanced Load Balancer (AVI)
- Provision to an A10 Thunder ADC
- Provision to Cloudflare
- Provision to a Kemp Virtual LoadMaster
- Provision to Palo Alto Panorama
- Provision Certificates to Radware Alteon
-
-
- 47-Day Validity Readiness TLS Certificates dashboard
- About the Certificate Inventory
- Managing Certificate Lifecycle Settings
- Reissuing Certificates in Next-Gen Trust Security
- Downloading Certificates, Certificate Chains, and Keystores
- Retiring, Recovering, and Deleting Certificates
- Finding Certificates in the Certificate Inventory
- Importing Certificates from a CA Using EJBCA
- Domain-Based Validation for External Emails
-
- Create a Workload Identity Management or Discovery Agent Built-in Account
- Create an OCI Registry Built-in Account
- Create a Certificate Manager - Self-Hosted Built-in Account
- Create a Scanafi Built-in Account
- Toggling a Built-in Account on or Off
- Editing Built-in Accounts
- Deleting Existing Built-in Accounts
- Renew Existing Built-in Accounts
- Troubleshooting
Revoking Certificates
You can revoke certificates that should no longer be trusted, such as certificates that have been replaced, compromised, or are no longer needed.
Next-Gen Trust Security supports certificate revocation for the following certificate authorities:
- AWS
- Microsoft AD CS
- Venafi Zero Touch PKI
- DigiCert
- DigiCert One
- ACMEv2
- EJBCA
- GlobalSign MSSL
- HID PKIaaS
- Sectigo Certificate Manager
- CyberArk Certificate Manager - Self-Hosted
- Google Cloud Certificate Authority Service
- GoDaddy
- OpenSSL
Before You Begin
- The certificate must be issued by a supported certificate authority.
- The certificate must be present in the Certificate Inventory.
Revoke a Certificate
- Sign in to Next-Gen Trust Security.
- Click Inventory > Certificates.
- Locate the certificate you want to revoke and open its details.
- Click Revoke.
- If prompted, confirm the certificate authority account associated with the certificate.Only the issuing certificate authority can revoke the certificate.
- In Revocation reason, select the most appropriate reason.Revocation reasons are defined by RFC 5280 and include:
- Superseded: The certificate has been replaced with a newer one.
- Affiliation changed: The certificate owner’s relationship with the issuer has changed.
- Cessation of operation: The service or system using the certificate is no longer in operation.
- Key compromise: The private key is suspected or confirmed to be compromised.
- Unspecified: No specific reason applies.
- Optional: Enter a comment to help identify the reason for the revocation later.
- Select the confirmation checkbox, then click Revoke.
The certificate is submitted for revocation with the issuing certificate authority.You can monitor the certificate’s revocation status from the Certificate Inventory.