POST Certificates Revoke
POST Certificates Revoke
The POST /Certificates/Revoke method is used to revoke one or more certificates with the specified ID(s). This method returns HTTP 200 OK on a success with
Certificate permission can be granted at either the global or collection The certificate search function allows you to query the Keyfactor Command database for certificates from any available source based on any criteria of the certificates and save the results as a collection that will be availble in other places in the Management Portal (e.g. expiration alerts and certain reports). level. See note under CollectionId, below.




Table 210: POST Certificates Revoke Input Parameters
Name | In | Description |
---|---|---|
CertificateIDs | Body | Required. An array containing the list of Keyfactor Command reference IDs for certificates that should be revoked. |
Reason | Body |
An integer containing the specific reason that the certificate is being revoked. The default is Unspecified. |
Comment | Body | Required. A string containing a freeform reason or comment on why the certificate is being revoked. |
EffectiveDate | Body | The date and time when the certificate will be revoked. The date and time should be given using the ISO 8601 UTC time format YYYY-MM-DDTHH:mm:ss.000Z (e.g. 2021-05-19T16:23:01Z). The default is the current date and time. |
CollectionId | Body |
An integer specifying an optional certificate collection identifier to validate that the user executing the request has sufficient permissions to do so. If a certificate collection ID is not supplied, the user must have global permissions to complete the action. Supplying a certificate collection ID allows for a check of the user's certificate collection-level permissions to determine whether the user has sufficient permissions at a collection level to complete the action. See Certificate Permissions in the Keyfactor Command Reference Guide for more information. |