GET /certificateRevocationList

Use this method to download all certificate revocation list (CRLs).

Authentication

Authentication with user name and password is required.

Request URL

GET https://{management_server_IP}/certificateRevocationList

Query parameters

None

Request body

None

Response codes

Code Description Comments
200 OK The request completed successfully.
404 Not found A specified resource cannot be found. A descriptive error message is returned in the response body.
500 Internal Server Error An internal error occurred. A descriptive error message is returned in the response body.

Response body

Attributes Type Description
response Array  
  crl String Contents of the CRL file in PEM format
  issuerDn String LDAP Distinguished Name of the issuer(for example "CN=demo server,OU=CS,O=Com Ltd.,ST=QLD,C=AU")
  next_update String Date and time for the next update. The timestamp is returned in ISO 8601 format (for example 2014-02-05T15:54:13Z)
  signatureAlgorithm String Algorithm used to sign the CRL (for example "MD5withRSA")
  type String CRL type (for example "X.509")
  update String Date and time for this update. The timestamp is returned in ISO 8601 format(for example 2014-02-05T15:54:13Z).
  version Integer CRL version
result String Results of the request . This can be one of the following values.
  • success. The request completed successfully.
  • failure. The request failed. A descriptive error message was returned.
messages Array Information about one or more messages
  id String Message identifier of a returned message
  explanation String Additional information to clarify the reason for the message
  recovery Array Recovery information
    text String User actions that can be taken to recover from the event
    URL String Link to the help system for more information, if available
  text String Message text associated with the message identifier
The following example is returned if the request is successful.
{
   "response": [{
      "crl": "-----BEGIN X509 CRL-----\r\n
            MIIBODCB4zANBgkqhkiG9w0BAQQFADBgMQswCQYDVQQGEwJBVTEMMAoGA1UECBMD\r\n
            UUxEMRkwFwYDVQQKExBNaW5jb20gUHR5LiBMdGQuMQswCQYDVQQLEwJDUzEbMBkG\r\n
            A1UEAxMSU1NMZWF5IGRlbW8gc2VydmVyFw0wMTAxMTUxNjI2NTdaFw0wMTAyMTQx\r\n
            NjI2NTdaMFIwEgIBARcNOTUxMDA5MjMzMjA1WjASAgEDFw05NTEyMDEwMTAwMDBa\r\n
            MBMCAhI0Fw0wMTAxMTUxNjE5NDdaMBMCAhI1Fw0wMTAxMTUxNjIzNDZaMA0GCSqG\r\n
            SIb3DQEBBAUAA0EAHPjQ3M93QOj8Ufi+jZM7Y78TfAzG4jJn/E6MYBPFVQFYo/Gp\r\n
            UZexfjSVo5CIyySOtYscz8oO7avwBxTiMpDEQg==\r\n
            -----END X509 CRL-----\r\n",
      "issuerDn": "CN=SSLeay demo server,OU=CS,O=Mincom Pty. Ltd.,ST=QLD,C=AU",
      "next_update": "2001-02-14T16:26:57Z",
      "signatureAlgorithm": "MD5withRSA",
      "type": "X.509",
      "update": "2001-01-15T16:26:57Z",
      "version": 1
   }],
   "result": "success",
   "messages": [{
      "id": "FQXHMSE0001I",
      "explanation": "",
      "recovery": {
         "text": "Information only; no action is required.",
         "URL": ""
      },
      "text": "The request completed successfully."
   }]
}