Article ID: 2514825 - View products that this article applies to.
When trying to access Microsoft ESP from Internet Explorer by using the Admin GUI via HTTPS, the following error message may be seen:
“organizations certificate has been revoked”
This problem occurs because the ESP certificate is no longer valid and it has been revoked from the certificate server. When one tries to access the site, Internet Explorer checks whether the SSL certificate is valid.
The "Check for server certificate revocation" feature is enabled on the browser in which the connection failed. This is true because the certificate for this particular ESP server was revoked by the certificate server.
To work around this problem, use one of the following methods:
Method 1: Disable the certificate revocation checkTo disable the "Check for server certificate revocation" feature in Internet Explorer, follow these steps:
Method 2: Unrevoke or reissue the certificateAsk the certification authority (CA) provider to unrevoke or reissue the ESP server certificate for the affected ESP Server.
For more information about certificate revocation and certificate status checks, see the following topic on the Microsoft TechNet website:
Certificate Revocation and Status Checking
Certificate status checkingWhen a program requests the certificate chaining engine to evaluate a certificate, the validation is performed on all certificates in that certificate’s chain. This includes every certificate from the root certificate to the leaf certificate that is presented to the program.
When the first certificate in the chain is validated, the following steps occur:
Note Windows XP RTM and Windows XP Service Pack 1 (SP1) perform revocation checking as the chain is built instead of performing revocation checking only on chains that end at a trusted root CA.If the base CRL contains the most current CRL extension, the local cache is checked to see whether a time-valid version of the issuing CA’s delta CRL is available in the cache. If a time-valid version is available, it is confirmed that the certificate’s serial number is not included in the CA’s delta CRL. If the delta CRL is not available in the local cache, or if the version in the local cache has expired, the delta CRL is downloaded from the URLs available in the CDP extension of the evaluated certificate.
Warning If delta CRLs are enabled at a CA, both the base CRL and the delta CRL must be inspected to determine the certificate’s revocation status. If either CRL is unavailable or if both CRLs are unavailable, the chaining engine reports that revocation status cannot be determined. In this case, a program may reject the certificate.
After the validation check is completed, the certificate chaining engine returns the results of the validation check to the calling program. The results indicate that one of the following is true: