GET Certificates ID Validate
The GET /Certificates/{id}/Validate method is used to return details for the validity of the certificate chain for the certificate with the specified ID. This method returns HTTP 200 OK on a success with certificate chain validity details in the message body.
Tip: The following permissions (see
Security Roles and Claims) are required to use this feature:
/certificates/collections/read/
OR
/certificates/collections/read/#/ (where # is a reference to a specific certificate collection ID—see CollectionID, below)
OR
/certificate_stores/read/
OR
/certificate_stores/read/#/ (where # is a reference to a specific certificate store container ID—see ContainerID, below)
Permissions for certificates can be configured at multiple levels. You can apply them system-wide—for all certificates or all certificate stores—or use fine-grained control by assigning permissions at the certificate or certificate store container level. The appropriate level depends on how the certificates are accessed. See Certificate Collection Permissions and Container Permissions for more information about system-wide versus more targeted permission models.
Table 312: GET Certificates {id} Validate Input Parameters
id |
Path |
Required. The Keyfactor Command reference ID of the certificate to be validated. |
CollectionId |
Query |
An optional integer that specifies the certificate collection (CollectionId) to validate whether the user has sufficient permissions to perform the action. If a CollectionId is not provided, the user must have appropriate permissions granted system-wide or via certificate store containers.
Providing a CollectionId allows the system to check the user's permissions at the certificate collection level. Permissions are evaluated in the following order:
- System-wide certificate permissions
- Granular certificate permissions
Use either ContainerId or CollectionId, not both. If both are specified, CollectionId takes precedence, and the ContainerId is ignored (defaults to 0).
See Certificate Collection Permissions for more information.
|
ContainerId |
Query |
An optional integer that specifies the certificate store container (ContainerId) to validate whether the user has sufficient permissions to perform the action. If a ContainerId is not provided, the user must have appropriate permissions granted system-wide or via certificate collections.
Providing a ContainerId allows the system to check the user's permissions at the container level. Permissions are evaluated in the following order:
- System-wide certificate store container permissions
- Granular certificate store container permissions
Use either ContainerId or CollectionId, not both. If both are specified, CollectionId takes precedence, and the ContainerId is ignored (defaults to 0).
See Container Permissions for more information.
|
Table 313: GET Certificates {id} Validate Response Data
Valid |
A Boolean that indicates whether all the validity tests are in a passing state (true) or not (false). |
Results |
An object containing the X509 certificate chain validity fields. Show result fields.
NotTimeValid |
Time Valid |
A value of Pass indicates that the certificate time value is valid. A time can appear invalid (Fail) for a certificate that has expired. |
NotTimeNested |
n/a |
A value of Pass indicates that the CA certificate and issued certificate have nested validity periods. A value of Fail can occur if the CA certificate expires before the issued certificate.
This is considered deprecated and may be removed in a future release.
|
Revoked |
Active |
A value of Pass indicates that the X509 certificate chain is valid for the certificate and contains no revoked certificates or errors. |
NotSignatureValid |
Signature |
A value of Fail indicates that the X509 certificate chain is invalid as a result of an invalid certificate signature. |
NotValidForUsage |
Usage |
A value of Fail indicates that the X509 certificate chain is invalid as a result of an invalid key usage. |
UntrustedRoot |
Trusted Root |
A value of Fail indicates that the X509 certificate chain is invalid as a result of an untrusted root certificate. |
RevocationStatusUnknown |
Revocation Status |
A value of Pass indicates that the revocation status can successfully be determined for the certificate. This may be the result of successful access to online certificate revocation lists (CRLs). |
Cyclic |
Chain Built |
A value of Pass indicates that the certificate chain for the certificate could successfully be built. |
InvalidExtension |
Extensions |
A value of Fail indicates that the X509 certificate chain is invalid as a result of an invalid extension. |
InvalidPolicyConstraints |
Policy Constraints |
A value of Fail indicates that the X509 certificate chain is invalid as a result of an invalid policy constraint. |
InvalidBasicConstraints |
Basic Constraints |
A value of Fail indicates that the X509 certificate chain is invalid as a result of an invalid basic constraint. |
InvalidNameConstraints |
Valid Name Constraints |
A value of Fail indicates that the X509 certificate chain is invalid as a result of an invalid name constraint. |
HasNotSupportedNameConstraint |
Supported Name Constraints |
A value of Fail indicates that a name constraint for the certificate is unsupported or that the certificate has no supported name constraints. |
HasNotDefinedNameConstraint |
Defined Name Constraints |
A value of Fail indicates that a name constraint for the certificate is undefined. |
HasNotPermittedNameConstraint |
Permitted Name Constraints |
A value of Fail indicates that a name constraint for the certificate is impermissible. |
HasExcludedNameConstraint |
Excluded Name Constraints |
A value of Fail indicates that a name constraint for the certificate has been excluded. |
PartialChain |
Full Chain |
A value of Pass indicates that the certificate chain for the certificate could successfully be built up to the root certificate. |
CtlNotTimeValid |
CTL Time Valid |
A value of Fail indicates that the certificate trust list (CTL) is invalid because of an invalid time value (e.g., the CTL has expired). |
CtlNotSignatureValid |
CTL Signature Valid |
A value of Fail indicates that the certificate trust list (CTL) contains an invalid signature. |
CtlNotValidForUsage |
CTL Usage Valid |
A value of Fail indicates that the certificate trust list (CTL) is not valid for this use. |
HasWeakSignature |
Strong Signature |
A value of Pass indicates that the certificate has been signed with a secure hashing algorithm. A value of Fail can indicate that a hashing algorithm of MD2 or MD5 was used for the certificate. |
OfflineRevocation |
CRL online |
A value of Pass indicates that the online certificate revocation list (CRL) the chain relies on is available. |
NoIssuanceChainPolicy |
Chain Policy |
A value of Pass indicates that there is either no certificate policy by design in the certificate or that if a group policy has specified that all certificates must have a certificate policy, the certificate policy exists in the certificate. |
ExplicitDistrust |
No Explicit Distrust |
A value of Pass indicates that the certificate is not explicitly distrusted. |
HasNotSupportedCriticalExtension |
Critical Extensions |
A value of Pass indicates that the certificate has a critical extension that is supported or has no critical extensions. |
|
Tip: See the
Keyfactor API Reference and Utility which provides a utility through which the
Keyfactor endpoints can be called and results returned. It is intended to be used primarily for validation, testing and development. It also serves secondarily as documentation for the API. The link to the
Keyfactor API Reference and Utility is in the dropdown from the help icon (

) at the top of the
Management Portal page next to the
Log Out button.