A list of certificates identified by the Certificate Authority as no longer being trusted. The CRL provides a way for relying parties to check the revocation status before trusting a digital certificate.
A list of revoked certificates that is generated and signed by a certificate authority (CA). You can download the latest CRL to your browser or to a server, then check against it to make sure that certificates are still valid before permitting their use for authentication.
A Certificate Revocation List is a list of certificates that have been revoked or suspended. The list includes data explaining why a certificate was revoked.
List of certificates that have been revoked or suspended before their validity period ended. Issued at least once a day, digitally signed by the certificate authority. Contains issuer identity, dates of current and next scheduled publication, serial numbers of revoked/suspended certificates, revocation/suspension dates and reasons for their invalidation. Certificate is listed in the CRL on its user's demand. In case of private key or PIN compromise, a new list is published in no longer than one hour.
The published directory which lists revoked and/or suspended certificates. The CRL may form part of the certificate directory or may be published separately.
The CRL is the CA's listing of invalid certificates. Revocation can occur due to time lapse, employment change, theft of a private key, or other reasons.
A list of users whose X.509 certificates have been revoked. An application uses this list to determine who gains access to the application.
A list containing the serial numbers of public key certificates that have been revoked. CRLs are placed in directories so that applications can check the revocation status of certificates before trusting them.
A list of certificates that need to be revoked before their expiration date.
A list of public key certificates that have been revoked by a CA. CRLs are stored in the CRL database that is maintained through IKE.
(CRL) A document maintained and published by a certification authority (CA) that lists certificates issued by the CA that are no longer valid.
A list of retracted certificates
A list published by a certification authority indicating which issued certificates should be considered invalid.
As defined by the X.509 standard, a list of revoked certificates by serial number, generated and signed by a certificate authority (CA).
A method of certificate revocation. A CRL is a time-stamped list identifying revoked certificates, which is signed by a CA and made available to the participating IPSec peers on a regular periodic basis (for example, hourly, daily, or weekly). Each revoked certificate is identified in a CRL by its certificate serial number. When a participating peer device uses a certificate, that system not only checks the certificate signature and validity but also acquires a most recently issued CRL and checks that the certificate serial number is not on that CRL.
This is a document which is maintained and published by a Certificate Authority (CA) that lists all certificates issued by the CA that are no longer valid.
CA list, provided by the CA, of all revoked certificates.
A list of revoked but unexpired certificates issued by a CA.
Certificates are issued with a specific lifetime, defined by a start date/time and an expiration date/time. However, situations can arise, such as a compromised key value, that necessitate the revocation of the certificate. In this case, the certificate authority can revoke the certificate. This is accomplished by including the certificate's serial number on a Certificate Revocation List (CRL) updated and published on a regular basis by the CA and made available to certificate users.
An online, up-to-date list of previously issued certificates that are no longer valid.
A list of revoked certificates generated by the CA that originally issued them. When using GSI this list is typically found in /etc/grid-security/certificates/hash.r0, where hash is the hash code of the CA identity.
A document maintained and published by a certification authority that lists certificates that have been revoked. See also: certificate; certification authority (CA)
A list maintained by a Certificate Authority of certificates that are no longer valid, excluding expired certificates. The list is checked to ensure the validity of existing certificates.
A list of revoked certificates. A certificate user/holder should check the most recent CRL just like a merchant validates a credit card before completing a transaction.
A list of certificates that have been revoked before their expiration date.
(CRL): List of certificates that have been declared invalid before their expiry date by the issuing CA. The CA maintains this list and is obliged to publish it, i.e. update it regularly and put it at the disposal of all participants.
In the operation of some cryptosystems, usually public key infrastructures (PKIs), a certificate revocation list (CRL) is a list of certificates (more accurately: their serial numbers) which have been revoked, are no longer valid, and should not be relied upon by any system user.