Skip to main content

Introduction

The Validation Authority (VA) API provides certificate validation services for the Lamassu IoT Platform. It implements industry-standard protocols including OCSP (Online Certificate Status Protocol) and CRL (Certificate Revocation List) distribution, enabling real-time certificate status verification.

Base URL

/api/va/v1

Authentication

  • OCSP and CRL endpoints are publicly accessible (no authentication required)
  • VA role management endpoints require Bearer token authentication with JWT tokens

API Groups

The VA API is organized into three main groups:

OCSP Operations

Online Certificate Status Protocol for real-time certificate validation:
  • HTTP GET method for OCSP requests
  • HTTP POST method for OCSP requests
  • Returns certificate status (good, revoked, unknown)

CRL Distribution

Certificate Revocation List distribution:
  • Retrieve CRLs by Certificate Authority Subject Key Identifier (SKI)
  • Returns DER-encoded CRL data

VA Role Management

Manage Validation Authority configurations per Certificate Authority:
  • Get VA role configuration
  • Update CRL generation settings
  • Configure automatic CRL refresh

Key Features

OCSP Support

Real-time certificate status checking via OCSP protocol (RFC 6960)

CRL Distribution

Distribute Certificate Revocation Lists for offline validation

Automatic CRL Generation

Configurable automatic CRL regeneration based on time intervals or revocation events

Per-CA Configuration

Independent VA configuration for each Certificate Authority

Certificate Validation Methods

OCSP (Online Certificate Status Protocol)

Use when:
  • Real-time validation is required
  • Network connectivity is available
  • Minimal latency is needed
  • Certificate status must be current
Characteristics:
  • Real-time status checks
  • Small response size
  • Requires network connectivity
  • Lower bandwidth than CRL for single checks

CRL (Certificate Revocation List)

Use when:
  • Offline validation is needed
  • Validating many certificates
  • Network connectivity is intermittent
  • Caching is beneficial
Characteristics:
  • Can be cached and used offline
  • Contains all revoked certificates
  • Larger download size
  • Periodic updates (based on refresh interval)

Common Use Cases

Real-Time Device Authentication

Use OCSP to verify device certificates during connection establishment:
  1. Device presents certificate
  2. Server extracts certificate serial number and issuer
  3. Server queries OCSP endpoint
  4. Server accepts or rejects connection based on response

Offline Certificate Validation

Download and cache CRLs for offline validation:
  1. Periodically download CRLs for all trusted CAs
  2. Cache CRLs locally
  3. Validate certificates against cached CRLs
  4. Refresh CRLs based on nextUpdate field

Certificate Revocation Workflow

  1. Certificate is revoked via CA API
  2. VA automatically regenerates CRL (if configured)
  3. OCSP responder immediately returns “revoked” status
  4. CRL is updated for offline validators

OCSP vs CRL Decision Guide

RequirementRecommended Method
Real-time statusOCSP
Offline validationCRL
Low bandwidth per checkOCSP
Validating many certificatesCRL
Privacy concernsCRL (no per-cert query)
Minimal infrastructureCRL
Always-connected devicesOCSP
Intermittent connectivityCRL

Next Steps

Validation Endpoints

Learn about OCSP and CRL endpoints

VA Role Management

Configure VA roles for Certificate Authorities

Build docs developers (and LLMs) love