Check the status of a certificate against a file-based Certificate Revocation List (CRL).
Check the status of a certificate against a Certificate Revocation List (CRL) that has been published to an LDAP directory.
Validate the certificate chain to ensure that the client certificate has been issued by a trusted CA.
Ensure that an X.509 certificate has not expired.
Extract the certificate from various sources, including an HTTP header, message attribute, or the User Store.
Check the status of the client certificate using the Online Certificate Status Protocol (OCSP).
Validate the client certificate using the XML Key Management Service (XKMS).
Validate a certificate against a CRL and automatically retrieves the CRL periodically.
Configure the Enterprise Gateway to act as CRL responder by returning CRL files to clients.
Create a human-readable thumbprint from an X.509 certificate.
Extract X.509 attributes from a certificate that is stored in a message attribute.
Check the Enterprise Gateway's certificate store for certificates that are due to expire before a specified number of days.