The online responder (OCSP) requests new signature certificates every four hours

Assume the following scenario:

  • The online responders are configured to request signing certificates using a certificate template from an Active Directory integrated certificate authority.
  • The online responders apply for a new signature certificate at regular intervals (every four hours), even though the existing certificate is still valid for a sufficiently long time.

The Online Responder (Online Certificate Status Protocol, OCSP) is an alternative way of providing revocation status information for certificates. Entities that want to check the revocation status of a certificate do not have to download the complete list of all revoked certificates thanks to OCSP, but can make a specific request for the certificate in question to the online responder. For a more detailed description, see the article "Basics Online Responder (Online Certificate Status Protocol, OCSP)„.

Cause

The online responder evaluates the Certificate Template Information field to determine if it has already received a certificate from a particular certificate template.

In this case, the certificate authority has been configured so that this extension is not written to the issued certificates.

Whether a certificate authority is appropriately configured not to write certain extensions to the issued certificates can be checked with the following command:

certutil -getreg policy\DisableExtensionList 

The following commands can be used to remove the object identifiers (OIDs) from the list:

certutil -setreg policy\DisableExtensionList -1.3.6.1.4.1.311.20.2
certutil -setreg policy\DisableExtensionList -1.3.6.1.4.1.311.21.7

A restart of the certification authority service is then required to apply the configuration. The online responders should now apply for new certificates once and use them until shortly before they expire.

Related links:

en_USEnglish