Nov ember 14, Memo

Similar documents
Axway Validation Authority Suite

Server-based Certificate Validation Protocol

RSA Validation Solution

API Gateway Version September Validation Authority Interoperability Guide

VA DELEGATED TRUST MODEL

[MS20414]: Implementing an Advanced Server Infrastructure

Implementing an Advanced Server Infrastructure

20414C: Implementing an Advanced Server Infrastructure

Installation and Configuration Last updated: May 2010

WHITEPAPER. Vulnerability Analysis of Certificate Validation Systems

PKI Trustpool Management

OCSP Client Tool V2.2 User Guide

Owner of the content within this article is Written by Marc Grote

S/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011

Create Decryption Policies to Control HTTPS Traffic

U.S. E-Authentication Interoperability Lab Engineer

PKI Interoperability Test Tool v1.2 (PITT) Usage Guide

Specification document for OCSP

Mavenir Systems Inc. SSX-3000 Security Gateway

Legacy of Heartbleed: MITM and Revoked Certificates. Alexey Busygin NeoBIT

DBsign for HTML Applications Version 4.0 Release Notes

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

BIG-IP System: SSL Administration. Version

g6 Authentication Platform

Helping Meet the OMB Directive

Forescout. Plugin. Configuration Guide. Version 2.2.4

Copyright

Manage Certificates. Certificates Overview

MOC Configuring Advanced Windows Server 2012 Services

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

IBM Education Assistance for z/os V2R2

NET EXPERT SOLUTIONS PVT LTD

DATA SHEET. ez/piv CARD KEY FEATURES:

SSH Communications Tectia SSH

Course Content of MCSA ( Microsoft Certified Solutions Associate )

Specification document for OCSP

Digital Certificates. About Digital Certificates

MCSA Windows Server 2012

ODYSSEY. cryptic by intent. Odyssey Certrix FAQs. Odyssey Technologies Ltd

Who s Protecting Your Keys? August 2018

SEVENMENTOR TRAINING PVT.LTD

PKI Enhancements in Windows 7 and Windows Server 2008 R2

KEY ARCHIVAL AND OCSP

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Microsoft Implementing an Advanced Server Infrastructure

Federal PKI. Trust Store Management Guide

ECPV: EFFICIENT CERTIFICATE PATH VALIDATION IN PUBLIC-KEY INFRASTRUCTURE

At Course Completion: Course Outline: Course 20742: Identity with Windows Server Learning Method: Instructor-led Classroom Learning

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams

MCSA Windows Server 2012

Forum XWall and Oracle Application Server 10g

Course 20412: Configuring Advanced Windows Server 2012 Services Duración: 05 Días. Acerca de este curso

Configuring Advanced Windows Server 2012 Services

70-742: Identity in Windows Server Course Overview

20412D: Configuring Advanced Windows Server 2012 Services

Federated Access. Identity & Privacy Protection

MS_ Implementing an Advanced Server Infrastructure.

Identity with Windows Server 2016 (742)

When HTTPS Meets CDN

Windows Server : Configuring Advanced Windows Server 2012 Services R2. Upcoming Dates. Course Description.

Microsoft Certified Solutions Associate (MCSA)

XD Framework (XDF) Overview. For More Information Contact BlueSpace at Tel: (512) Web:

Understanding HTTPS CRL and OCSP

The Essential Guide to System Recovery D O C U M E N T V E R S I O N

DoD Wireless Smartphone Security Requirements Matrix Version January 2011

KeyOne. Certification Authority

Certificates for Live Data

Release Notes. Release Purpose... 1 Platform Compatibility... 1 Upgrading Information... 1 Browser Support... 2 Known Issues... 3 Resolved Issues...

DoD Common Access Card Authentication. Feature Description

AKAMAI WHITE PAPER. Security and Mutual SSL Identity Authentication for IoT. Author: Sonia Burney Solutions Architect, Akamai Technologies

Microsoft Configuring Advanced Windows Server 2012 Services

Interagency Advisory Board Meeting Agenda, February 2, 2009

Public Key Enabling Oracle Weblogic Server

Exam : Implementing a Cloud Based Infrastructure

Module 3 Remote Desktop Gateway Estimated Time: 90 minutes

Reference. Base Configuration Updates

Configuring SSH with x509 authentication on IOS devices

Configuring Authorization and Revocation of Certificates in a PKI

DoD Identity & Access Management (IdAM) Portfolio Overview

VPAT Voluntary Product Accessibility Template Version 1.4

Configuring Advanced Windows Server 2012 Services

How to Set Up External CA VPN Certificates

ADSS OCSP S e r v e r

The Device Has Left the Building

Microsoft Certified Solutions Expert (MCSE)

Active Directory Services with Windows Server

M20742-Identity with Windows Server 2016

Balabit s Privileged Session Management and Remote Desktop Protocol Scenarios

Configuring SSL CHAPTER

Updating Your Windows Server 2003 Technology Skills to Windows Server 2008

Configuring Smart Card Authentication to BIG IP Management Interface

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5

Designing and Managing a Windows Public Key Infrastructure

Implementing an Advanced Server Infraestructure

EnterSpace Data Sheet

BIG-IP Access Policy Manager : Authentication and Single Sign-On. Version 13.1

Certification Authority

Active Directory Services with Windows Server

This chapter describes how to configure digital certificates.

This chapter describes how to configure digital certificates.

Transcription:

Memo Subject: Comparison of Validation Capabilities between Axway Desktop Validator and MS Windows Clients as well as Validation Authority Serv er and Windows Serv er Date: December 2016 1/5

1. Introduction This Document provides an overview of the differences between the Microsoft Windows Validation Options and Axway Desktop Validator Client. 2. Comparison Clients Feature Microsoft Windows Clients Axway Desktop Validator Client Support for OCSP/SCVP Trust Models. Digitally Signed OCSP Requests Support Direct and CA Delegated Trust Models. Supports Direct, CA Delegated, CA Designated, and VA Delegated Trust Models. Supports Digitally Signed Requests. SCVP Support Includes support for SCVP Request/Response. Custom Settings Override Status Special Treatment for Misc Statuses Send Request OCSP with Receive OCSP Response with CRL Management Features Defaults to OCSP-AIA and CRLdp. Capability to add additional OCSP URL per CA. Does not send NONCE in OCSP Requests. NONCE is Ignored in OCSP Responses. Only allows setting frequency of CRL fetching from published CRLdp URL. Provides Default and CA Specific Validation Settings. Extensive customization of validation settings (including failover) for each CA Certificate, using OCSP, SCVP, or Various CRL Formats. DV Administrator has ability to configure custom to override status checking for any CA Certificate. Can configure how to treat conditions such as connection attempts that fail and/or OCSP UNKNOWN Status Responses. Ability to send OCSP Requests with or without Ability to enforce NONCE in OCSP Responses when required. Can be configured to ignore the NONCE when not required. Custom CRON based Scheduler to fetch CRLs as needed. Can retrieve CRL s from any location- File System, FTP, HTTP, or LDAP Servers. 2/5

Additional CRL Formats Supported DISK Cache Supports CA Issued CRLs. Automatically stores CRL s & OCSP Status to DISK Cache for the published life of the status. Can utilize HTTP Response Headers for Pre- Fetch e-tag and Cache- Control:max-age, if available to shorten lifespans. Supports CA Issued and VA Issued CRLS, including CompactCRLs for low bandwidth environments. Individual Controls for CRL and OCSP Caching. Simple control to use published or custom time periods for CRLs and OCSP Cache lifespans. Ability to create custom schedule for CRL downloads. Deletion Cache of MEMORY Cache Deletion Cache of Certificate Status Notification PopUps for Users. Logging Custom Settings Deployment Proxy Certutil command must be manually run to delete disk cache on a system (for each logged in user). Delete commands will be ignored for any Items that are still resident in the Memory Cache. No Retention. Items are stored in memory only for the duration of the process that required the OCSP or CRL Status. Certutil command must be manually run to delete any hung memory cache on a system (for each logged in user). Very Minimal, based on Application. Windows Event Log can be enabled to record CAPI events. Validation process info is contained within numerous cryptic entries based on Application. Utilizes Default Windows Proxy Would only need to update AIA an CRLdp via Group Policy Object on Windows Server. Enforcement has to be tracked separately Simple GUI based Button for CRL and OCSP Disk Cache Deletion. Full control over retention period used for Memory Cache of CRLs and OCSP Status. Also includes Memory Size control to limit cache size. Simple GUI based Button for Memory Cache Deletion. Ability to turn on 9 unique alerts informing user of certificate status and customize frequency of notification. MS Applications will still provide status. Concise, consolidated log entries for each Request/Response in Windows Event Log. Can also provide separate debug logging to unique text file. Can use Default Windows Proxy or custom Proxy Settings. DoD and Federal Civilian Agencies have been deploying our Desktop Validator Standard and Enterprise for over ten years, and are very familiar with pushing down updates with flexible rules to be defined for Certificate Validation, and tightly integrate with the Responder and Repeater Servers for 3/5

Never worry about using stale responses Microsoft documentation states that their internal OCSP cache implementation follows the standard RFC 5019.1 The standard allows headers in HTTP responses that provide direction to caches regarding whether and how long to cache the response. Using the cache control information, the clients can cache and reuse the responses for the specified period of time, thereby avoiding the risk of reusing stale responses. automatic configuration. DV provides robust fail-over support with multiple sources of revocation information and can be installed, configured, and maintained using typical 3 rd party software deployment tools. Validating DOD CAC and Federal Civilian Agencies PIV, as wells as PIV-I and other PKI implementations using different policies and different profiles which provides a lot of flexibility for performing your validation requirements. You can easily customize Desktop Validator settings to get most up to date information for CRL, OCSP, and SCVP so that you are never using stale responses and when certificates are revoked you can have instantaneous action for denying access. This can include requiring an OCSP or SCVP nonce signed request response and or ensuring you have different OCSP and SCVP Responders and Repeaters to provide real time status checking and validation. 3. Comparison Server Feature Microsoft Windows Server Axway Validation Authority Server HSM Integration DOD CRL Integration Depends on Windows HSM Integration and Driver Setup. Customers reported they had to go through 20-30 pages documentation. A Microsoft engineer's blog offers a complex script to help get the DOD CRL info, but it's not officially supported and very difficult to implement and get working. https://blogs.technet.microsoft.com/askpfe plat/2014/01/07/microsoft-pki-ocspresponder-now-jitc-certified-and-lab-setupguide/ GUI Based out of the Box Integration with major HSM Vendors like Thales, Safenet, ACP and others. Easy GUI based Setup 4/5

5/5