User Certificates
Monitor any changes of your AD user accounts and revoke bygone certificates.
Machine Identities
Revoke certificates of deleted or altered computers in your AD.
Revoke from any CA
Submit revocation requests directly to your Microsoft CAs or to any CA connected by certEP.
"Secardeo certRevoke helps to keep your certificate inventory up-to-date, increase security and minimize PKI costs."
Digital certificates can be revoked before the end of their lifetime. Then the contained public key will no longer be accepted for encryption or authentication. For this, the certificate is put on a certificate revocation list that is signed by the CA or the returned status of an online responder (OCSP) will be “revoked”. However, common phenomenons like employee fluctuation or equipment replacement lead to situations where hundreds or thousands of valid certificates still exist but the contained subject or object has disappeared. Another typical scenario is that attributes of an AD object change. For example the surname and e-mail address of a user after marriage or computer or server network addresses and names.
Secardeo certRevoke is a Windows service that integrates with Active Directory and monitors the desired AD tree and object types or the members of an AD group for deletions or attribute changes. certRevoke will automatically send a revocation request to the CA that issued a certificate for the detected AD object.
If an Active Directory object is modified or deleted certRevoke sends a revocation request for all its associated certificates to the CA. The object attributes and organizational units which should be monitored can be configured. By this, automatic re-enrollment of certificates will be triggered through group policy, for example in case of name or address changes. certRevoke supports auto-revocation for multiple Windows CAs or certEP instances.
© 2024 Secardeo GmbH.
All rights reserved.