The Entrust Validation Authority (EVA) solution responds to OCSP requests on the validation status of the certificates issued by a Certificate Authority. To respond to these requests, the Entrust Validation Authority solution connects with different components.  

See below for a description of each component.

OCSP client

Multiple clients send OCSP requests to the OCSP Responder service of the Entrust Validation Authority solution.

Certificate Authority

The Entrust Validation Authority solution checks the status of certificates issued by one or multiple Certificate Authorities (CAs).

As explained in Starting up Certificate Authorities, the Certificate Authorities solution provides built-in CRL and OCSP services. Therefore, you do not need an Entrust Validation Authority for CAs created with the Certificate Authorities solution.

Certificate information source

Through Entrust CA Gateway, Entrust solutions obtain a direct feed of issued certificates from each supported Certificate Authority (CA). See the following table for the CA Gateway deployment required by each type of CA.

CA type

CA Gateway deployment

Certificate Authority running on PKI Hub

Create a Certificate Authority instance, as explained in Starting up Certificate Authorities, and select the built-in CA Gateway service of this CA.

External Certificate Authority 

Start up the Entrust CA Gateway solution and connect it with the external CA as explained Starting up CA Gateway.

Alternatively, the Entrust Validation Authority solution can obtain revocation information from a full or "combined" CRL published in an LDAP or HTTP server. 

Entrust Validation Authority does not support partitioned CRLs.

Hardware Security Module

A Hardware Security Module (HSM) manages one or several OCSP signing keys.

Database.

A database stores the status of the certificates.