Edit

Share via


Microsoft Entra certificate-based authentication Certificate Revocation List (CRL)

A Certificate Revocation List (CRL) is a list of certificates that have been revoked by the issuing Certificate Authority (CA) before their scheduled expiration date. CRLs are essential for maintaining authentication integrity. When a certificate is revoked, it’s marked as untrusted even if not expired. Incorporating CRLs in certificate-based authentication ensures only valid, non-revoked certificates are accepted, and Microsoft Entra ID blocks any attempt using a revoked certificate.

CRLs are digitally signed by the CA and published to publicly accessible locations, allowing them to be downloaded over the internet to verify the revocation status of certificates. When a client presents a certificate for authentication, the system checks the CRL to determine if the certificate has been revoked.

If the certificate is found in the CRL, the authentication attempt is rejected. CRLs are usually updated periodically, and organizations should ensure they have the latest version of the CRL to make accurate decisions about certificate validity.

In Microsoft Entra certificate-based authentication (CBA), when CRLs are configured, the system must retrieve and validate the CRL during authentication. If Microsoft Entra ID cannot access the CRL endpoint, authentication fails because the CRL is required to confirm certificate validity.

How a CRL works in certificate-based authentication

A CRL works by providing a mechanism to check the validity of certificates used for authentication. The process involves several key steps:

  • Certificate Issuance: When a certificate is issued by a CA, it is valid until its expiration date unless it is revoked earlier. Each certificate contains a public key and is signed by the CA.
  • Revocation: If a certificate needs to be revoked (for example, if the private key is compromised or the certificate is no longer needed), the CA adds it to the CRL.
  • CRL Distribution: The CA publishes the CRL to a location accessible by clients, such as a web server or a directory service. The CRL is typically signed by the CA to ensure its integrity.
  • Client Check: When a client presents a certificate for authentication, the system retrieves the CRL for each CA in the certificate chain from its published locations and checks for any revoked CAs. If any CRL location is unavailable, authentication fails because the system cannot verify the certificate’s revocation status.
  • Authentication: If the certificate is found in the CRL, the authentication attempt is rejected, and the client is denied access. If the certificate is not in the CRL, the authentication proceeds as normal.
  • CRL Updates: The CRL is updated periodically by the CA, and clients should ensure they have the latest version to make accurate decisions about certificate validity. The system does cache the CRL for a certain period to reduce network traffic and improve performance, but it does also check for updates regularly.

Understanding the certificate revocation process in Microsoft Entra certificate-based authentication

The certificate revocation process enables Authentication Policy Administrators to revoke a previously issued certificate so it can't be used for future authentication.

Authentication Policy Administrators configure the CRL distribution point during the setup process for trusted issuers in the Microsoft Entra tenant. Each trusted issuer should have a CRL that you can reference by using an internet-facing URL. For more information, see Configure Certificate Authorities.

Microsoft Entra ID supports only one CRL endpoint and supports only HTTP or HTTPS. We recommend using HTTP instead of HTTPS for CRL distribution. CRL checks occur during certificate-based authentication, and any delay or failure in retrieving the CRL can block authentication. Using HTTP minimizes latency and avoids potential circular dependencies caused by HTTPS (which itself requires certificate validation). To ensure reliability, host CRLs on highly available HTTP endpoints and verify that they're accessible over the internet.

Important

The maximum size of a CRL for Microsoft Entra ID to successfully download on an interactive sign-in is 20 MB in public Microsoft Entra ID and 45 MB in Azure US Government clouds. The time required to download the CRL must not exceed 10 seconds. If Microsoft Entra ID can't download a CRL, certificate-based authentications by using certificates issued by the corresponding CA fail. As a best practice to keep CRL files within size limits, keep certificate lifetimes within reasonable limits and clean up expired certificates.

  1. When a user performs an interactive sign-in with a certificate, Microsoft Entra ID downloads and caches the customer's certificate revocation list (CRL) from their certificate authority to check if certificates are revoked during the authentication of the user. Microsoft Entra uses the SubjectKeyIdentifier attribute instead of SubjectName to build the certificate chain. When CRLs are enabled, PKI configurations must include SubjectKeyIdentifier and Authority Key Identifier values to ensure proper revocation checking.

    SubjectKeyIdentifier provides a unique, immutable identifier for the certificate’s public key, making it more reliable than SubjectName, which can change or be duplicated across certificates. This attribute ensures accurate chain building and consistent CRL validation in complex PKI environments.

    Important

    If an Authentication Policy Administrator skips the configuration of the CRL, Microsoft Entra ID doesn't perform any CRL checks during the certificate-based authentication of the user. This behavior can be helpful for initial troubleshooting, but shouldn't be considered for production use.

    • Base CRL only: If only the base CRL is configured, Microsoft Entra ID downloads and caches it until the Next Update timestamp. Authentication fails if the CRL has expired and can't be refreshed due to connectivity issues or if the CRL endpoint doesn't provide an updated version. Microsoft Entra strictly enforces CRL versioning: when a new CRL is published, its CRL Number must be higher than the previous version.

      CRL Number ensures monotonic versioning, preventing replay attacks where an older CRL could be reintroduced to bypass revocation checks. By requiring each new CRL to have a higher version number, Microsoft Entra ID guarantees that the most recent revocation data is always used.

    • Base + Delta CRL: When both are configured, both must be valid and accessible. If either is missing or expired, certificate validation fails per RFC 5280 standards.

  2. The user certificate-based authentication fails if a CRL is configured for the trusted issuer and Microsoft Entra ID can't download the CRL, due to availability, size, or latency constraints. This limitation makes the CRL endpoint a critical single point of failure, reducing the resiliency of Microsoft Entra ID’s certificate-based authentication. To mitigate this risk, we recommend using highly available solutions that ensure continuous uptime for CRL endpoints.

  3. If the CRL exceeds the interactive limit for a cloud, the user's initial sign-in fails with the following error:

    The Certificate Revocation List (CRL) downloaded from {uri} has exceeded the maximum allowed size ({size} bytes) for CRLs in Microsoft Entra ID. Try again in few minutes. If the issue persists, contact your tenant administrators.

  4. Microsoft Entra ID attempts to download the CRL subject to the service-side limits (45 MB in public Microsoft Entra ID and 150 MB in Azure for US Government).

  5. Users can retry the authentication after a few minutes. If the user's certificate is revoked and appears in the CRL, the authentication fails.

    Important

    Token revocation for a revoked certificate isn't immediate because of CRL caching. If a CRL is already cached, newly revoked certificates aren't detected until the cache refreshes with an updated CRL. Delta CRLs typically include these updates, so revocation takes effect once the delta CRL is loaded. If delta CRLs aren't used, revocation depends on the base CRL’s validity period. Administrators should manually revoke tokens only when immediate revocation is critical, such as in high-security scenarios. For more information, see Configure revocation.

  6. We don't support Online Certificate Status Protocol (OCSP) because of performance and reliability reasons. Instead of downloading the CRL at every connection by the client browser for OCSP, Microsoft Entra ID downloads it once at the first sign-in and caches it. This action improves the performance and reliability of CRL verification. We also index the cache so the search is much faster every time.

  7. If Microsoft Entra successfully downloads the CRL, it caches and reuses the CRL for any subsequent usage. It honors the Next update date and, if available, Next CRL Publish date (used by Windows Server CAs) in the CRL document.

  8. If the user's certificate is listed as revoked on the CRL, user authentication fails.

    Screenshot of the revoked user certificate in the CRL.

    Important

    Due to the nature of CRL caching and publishing cycles, it's highly recommended that, if there's a certificate revocation, you also revoke all sessions of the affected user in Microsoft Entra ID.

  9. Microsoft Entra ID attempts to pre-fetch a new CRL from the distribution point if the cached CRL document is expired. If CRL has a "Next Publish Date" Microsoft Entra does a CRL pre-fetch even if the CRL in cache is not expired. As of now, there's no way to manually force or retrigger the download of the CRL.

    Note

    Microsoft Entra ID checks the CRL of the issuing CA and other CAs in the PKI trust chain up to the root CA. We have a limit of up to 10 CAs from the leaf client certificate for CRL validation in the PKI chain. The limitation is to make sure a bad actor doesn't bring down the service by uploading a PKI chain with a huge number of CAs with a bigger CRL size. If the tenant's PKI chain has more than 10 CAs, and if there's a CA compromise, Authentication Policy Administrators should remove the compromised trusted issuer from the Microsoft Entra tenant configuration. For more information, see CRL Pre-fetching.

How to configure revocation

To revoke a client certificate, Microsoft Entra ID fetches the certificate revocation list (CRL) from the URLs uploaded as part of certificate authority information and caches it. The last publish timestamp (Effective Date property) in the CRL is used to ensure the CRL is still valid. The CRL is periodically referenced to revoke access to certificates that are a part of the list.

If a more instant revocation is required (for example, if a user loses a device), the authorization token of the user can be invalidated. To invalidate the authorization token, set the StsRefreshTokensValidFrom field for this particular user using Windows PowerShell. You must update the StsRefreshTokensValidFrom field for each user you want to revoke access for.

To ensure that the revocation persists, you must set the Effective Date of the CRL to a date after the value set by StsRefreshTokensValidFrom and ensure the certificate in question is in the CRL.

The following steps outline the process for updating and invalidating the authorization token by setting the StsRefreshTokensValidFrom field.

# Authenticate to Microsoft Graph
Connect-MgGraph -Scopes "User.Read.All"

# Get the user
$user = Get-MgUser -UserPrincipalName "test@yourdomain.com"

# Get the StsRefreshTokensValidFrom property
$user.StsRefreshTokensValidFrom

The date you set must be in the future. If the date is not in the future, the StsRefreshTokensValidFrom property is not set. If the date is in the future, StsRefreshTokensValidFrom is set to the current time (not the date indicated by Set-MsolUser command).

Enforce CRL validation for CAs

When you upload CAs to the Microsoft Entra trust store, you don't need to include a CRL or the CrlDistributionPoint attribute. You can upload a CA without a CRL endpoint, and certificate-based authentication doesn't fail if an issuing CA doesn't specify a CRL.

To strengthen security and avoid misconfigurations, an Authentication Policy Administrator can require CBA authentication to fail if a CA that issues an end user certificate doesn't configure a CRL.

Enable CRL validation

  1. Select Require CRL validation (recommended) to enable CRL validation.

    Screenshot of how to require CRL validation.

    When you enable this setting, CBA fails if the end user certificate comes from a CA that doesn't configure a CRL.

  2. An Authentication Policy Administrator can exempt a CA if its CRL has issues that need to be fixed. Select Add Exemption and choose any CAs to exempt.

    Screenshot of how to exempt CAs from CRL validation.

  3. CAs in the exempted list don't need to configure a CRL, and the end-user certificates they issue don't fail authentication.

    Select CAs and select Add. Use the Search text box to filter the CA lists and select specific CAs.

    Screenshot of CAs that are exempted from CRL validation.

Guidance for setting up CRLs (base and delta CRL) for Microsoft Entra ID

  1. Publish accessible CRLs:

    • Ensure your CA publishes both the base CRL and delta CRLs (if applicable) to internet-facing URLs accessible via HTTP.
    • Microsoft Entra ID can't validate certificates if CRLs are hosted on internal-only servers. The URLs should be highly available, performant, and resilient to prevent authentication failures due to unavailability.
    • Validate CRL accessibility by testing the CRL URL in a browser and using certutil -url for distribution checks.
  2. Configure CRL URLs in Microsoft Entra ID:

    • Upload the CA public certificate to Microsoft Entra ID and configure the CRL distribution points (CDPs).
    • Base CRL URL: Contains all revoked certificates.
    • Delta CRL URL (optional but recommended): Contains certificates revoked since the last base CRL was published.
    • Use tools like certutil to verify CRL validity and troubleshoot certificate and CRL issues locally.
  3. Set validity periods:

    • Set the base CRL validity period long enough to balance operational overhead and security (typically days to weeks).
    • Set the delta CRL validity period shorter (commonly 24 hours) to allow for timely recognition of revoked certificates.
    • Shorter delta CRL validity improves security by reducing the window where revoked certificates remain valid but increases issuance and distribution load.
    • The recommended 24-hour default validity for delta CRLs on Windows Servers is a widely accepted standard security and performance.
    • Microsoft Entra ID is designed to efficiently handle frequent delta CRL updates without performance degradation, and ongoing improvements help enhance this further.
    • Microsoft Entra ID applies throttling mechanisms to protect against DDoS attacks during delta CRL downloads, which can result in temporary errors like "AADSTS2205013" for a small subset of users.
  4. Ensure high availability and performance:

    • Host CRLs on reliable web servers or content delivery networks (CDNs) to minimize delays or failures during retrieval.
    • Monitor CRL publication and accessibility proactively.
  5. Protect against throttling and distributed denial-of-service (DDoS) attacks:

    • To protect Microsoft Entra ID services and users, throttling is applied to CRL fetch operations during high load or potential abuse.
    • Schedule CRL publication and expiration cycles during off-peak hours to minimize the likelihood of throttling impacting users.
  6. CRL size management

    • Keep CRL payloads as small as possible, ideally by frequent delta CRL issuance and archival of old entries, to improve fetch speed and reduce bandwidth.
  7. Enable CRL validation

    • Enforce CRL validation in Microsoft Entra ID policies to ensure revoked certificates are detected. For more information, see Enable CRL validation.
    • Consider temporary bypass of CRL checking only as a last resort during troubleshooting, with an understanding of the security risks.
  8. Test and monitor

    • Perform regular tests to verify that CRLs are downloadable and recognized correctly by Microsoft Entra ID.
    • Use monitoring to detect and quickly remediate any CRL availability or validation issues.

CRL error reference

Error code and message Description Common causes Recommendations
AADSTS500171: Certificate has been revoked. Please contact your administrator. Certificate is in the CRL, indicating it's revoked. Certificate is revoked by the admin. If a certificate is mistakenly included in the CRL, have the issuing CA reissue the CRL with an updated list that accurately reflects the intended revocations.
AADSTS500172: Certificate '{name}' issued by '{issuer}' is not valid. Current time: '{curTime}'. Certificate NotBefore: '{startTime}'. Certificate NotAfter: '{endTime}'. CRL isn't valid in time. The CRLs or delta CRLs used to validate the certificate have timing issues such as expired CRLs or incorrectly configured publication/validity times. - Confirm that the certificate’s NotBefore and NotAfter dates properly encompass the current time.
- Verify that the base and delta CRLs published by your CA aren't expired.
AADSTS500173: >Unable to download a Certificate Revocation List (CRL). Invalid status code {code} from CRL distribution point. Please contact your administrator. CRL couldn't be downloaded due to endpoint issues. - CRL endpoint returns HTTP errors (such as 403)
- CRL expired with no update
- Confirm CRL endpoint returns valid data
- Ensure CA regularly publishes updated CRLs
- The CRL URL is inaccessible due to network issues, firewall blocks, or server downtime.
- Enable CRL fail-safe to block unverifiable certificates.
AADSTS500174: Unable to construct valid Certificate Revocation List (CRL) from response. Microsoft Entra ID can't parse or use the CRL retrieved from the specified distribution point. - The CRL URL is inaccessible due to network issues, firewall blocks, or server downtime.
- The downloaded CRL file is corrupted, incomplete, or incorrectly formatted.
- The URLs in the certificate’s CDP fields don't point to valid CRL files or are misconfigured.
- Verify CRL accessibility, validity, and integrity.
- Inspect the CRL file for corruption or incomplete content.
AADSTS500175: Revocation check failed because the Certificate Revocation List (CRL) for one certificate in the chain is missing. During certificate revocation checking, Microsoft Entra couldn't locate a required segment or portion of the Certificate Revocation List (CRL). - The CRL file downloaded from the CRL Distribution Point (CDP) is corrupted or truncated.
- Incorrect or incomplete publication of the CRL by the CA.
- Network issues causing incomplete or failed CRL downloads.
- Misconfiguration of the CRL distribution point URLs or file segments.
- Verify CRL Integrity
- Republish or Regenerate CRL
- Check Network and Proxy Settings
- Ensure Correct CDP Configuration on all the CAs
AADSTS500176: The certificate authority that issued your certificate hasn't been set up in the tenant. Please contact your administrator. Microsoft Entra couldn't locate the issuing CA certificate in its trusted certificate store. This prevents successful validation of the user certificate’s chain of trust. - The issuing CA certificate (root or intermediate) isn't uploaded or configured in the Microsoft Entra ID trusted certificates list.
- The certificate chain stored on the client or device doesn't properly link to a trusted CA certificate.
- Mismatched or missing Subject Key Identifier (SKI) and Authority Key Identifier (AKI) references in the certificate chain.
- The issuing certificate might be expired, revoked, or otherwise invalid.
- Tenant administrator should upload all relevant root and intermediate CA certificates to the Microsoft Entra trusted certificate store via the Microsoft Entra admin center.
- Confirm that the SKI of the issuing CA certificate matches the AKI in the user’s certificate to ensure proper chain linkage.
- Use tools like certutil or OpenSSL to verify that the full certificate chain is intact, unbroken, and trusted.
- Replace any expired or revoked CA certificates in the trusted store to maintain chain validity.
AADSTS500177: Certificate Revocation List (CRL) misconfigured. Delta CRL distribution point is configured without a corresponding base CRL distribution point. Please contact your administrator. Indicates that your CA configuration includes a Delta CRL distribution point, but the corresponding Base CRL distribution point is missing or not configured properly. - The CRL distribution points (CDPs) configured in the certificates or CA settings are invalid, inaccessible, or incorrect URLs.
- The CA hasn't published the CRL properly or the CRL has expired, causing validation failures.
- Devices or Microsoft Entra ID services can't access the CRL URLs due to firewall rules, proxy restrictions, or network connectivity issues.
- Misconfigured settings either in Microsoft Entra or the issuing Certificate Authority related to CRL handling.
- Confirm and update CRL distribution points to accurate, publicly accessible URLs.
- Ensure CRLs are published and renewed regularly before expiry. Automate CRL publication if possible.
- Allow necessary network traffic to CRL distribution points by updating firewall, proxy, or security device rules.
- Verify the downloaded CRLs for corruption or truncation, and republish if necessary.
- Double-check Microsoft Entra ID and CA configurations related to CRL publishing, URLs, and validation policies.
AADSTS500178: Unable to retrieve valid CRL segments for {type}. Please try again later. Microsoft Entra ID fails to download or process all required segments of the Certificate Revocation List (CRL) during certificate validation. - The CRL is published in multiple segments, and one or more segments are missing, corrupt, or inaccessible.
- Network restrictions or firewalls block access to one or more CRL segments.
- The CRL segments available might have expired or aren't properly updated.
- Incorrect URLs or missing entries in the certificate’s CRL distribution points where segments are hosted.
- Manually download all CRL segments from their distribution points and check for completeness and validity.
- Ensure all CRL segment URLs are correctly configured and accessible. Update certificates or CA configurations if CDP URLs have changed.
- Confirm the CA publishes and maintains all CRL segments properly without corruption or missing parts.
AADSTS500179: CRL validation timed out. Please try again later. CRL download timed out or was interrupted. - CRL size exceeds limits
- Network latency or instability
- Keep CRL size under 20MB (commercial Azure) or 45MB (Azure for US Government)
- Set Next Update interval to at least one week
- Monitor CRL download performance via sign-in logs.
AADSTS500183: Certificate has been revoked. Please contact your administrator An Authentication attempt failed because the client device presented a certificate that was revoked by the issuing CA. The certificate used for authentication is found in the Certificate Revocation List (CRL) or flagged as revoked by the CA. - Tenant Administrator should ensure the new certificate is correctly provisioned and trusted by Microsoft Entra ID.
- Verify that the CRLs and delta CRLs published by your CA are up to date and accessible for the devices.
AADSTS2205011: The downloaded Certificate Revocation List (CRL) isn't in a valid ASN.1 encoding format. Please contact your administrator. CRL file fetched by Microsoft Entra isn't correctly encoded following the Abstract Syntax Notation One (ASN.1) Distinguished Encoding Rules (DER) standard, which is required for parsing and validating the CRL data. - The CRL file is corrupted or truncated during publication or transmission.
- The CRL was generated or encoded incorrectly by the CA and doesn't conform to ASN.1 DER standards.
- File format conversions (such as improper base64/PEM encoding) corrupted the CRL data.
- Manually download the CRL and inspect it with tools like openssl or specialized ASN.1 parsers to confirm if it's corrupted or malformed.
- Regenerate and republish the CRL from the CA ensuring compliance with ASN.1 DER encoding standards.
- Ensure the CA software or tools generating CRLs comply with RFC 5280 and correctly encode CRLs in ASN.1 DER format.
AADSTS2205012: The attempt to download the Certificate Revocation List (CRL) from '{uri}' during the interactive sign-in has timed out. We're trying to download again. Please try again in a few minutes. Microsoft Entra ID couldn't retrieve the CRL file within the expected time from the specified URL. - Microsoft Entra ID services can't reach the CRL distribution point due to network outages, firewall restrictions, or DNS failures.
- The server hosting the CRL is down, overloaded, or not responding in a timely manner.
- Large CRLs take longer to download, potentially causing timeouts.
- Use delta CRLs to keep CRL file sizes smaller and refresh more frequently to reduce download time.
- Publish or refresh CRLs during off-peak hours to reduce server load and improve response times.
- Monitor and maintain high availability and performance of the CRL hosting servers.
AADSTS2205013: Certificate Revocation List (CRL) download is currently in progress. Please try again in a few minutes. Happens when multiple authentication attempts simultaneously trigger CRL downloads, and the system is still processing the current CRL retrieval. - When a CRL expires or is about to expire, multiple users signing in concurrently can cause simultaneous attempts to download the fresh CRL.
- Microsoft Entra ID applies a locking mechanism to prevent concurrent downloads of the same CRL to reduce load and potential race conditions.This causes some authentication requests to be temporarily denied with this retry message.
- Large user populations or heavy sign-in bursts can increase the frequency of this error.
- Allow a few minutes for the ongoing CRL download to finish before retrying sign-in.
- Ensure CRLs are published and updated regularly before expiry to reduce forced re-downloads.
AADSTS2205014:The attempt to download the Certificate Revocation List (CRL) from '{uri}' during the interactive sign-in has exceeded the maximum allowed size ({size} bytes). The CRL is being provisioned with CRL's service download limit, please try again in a few minutes. The CRL file Microsoft Entra ID tried to download is larger than the size limit set by the service. Microsoft Entra will try to download in background with higher limits. - The CRL file published by the CA is too large, often due to a high number of revoked certificates.
- Large CRLs can occur if revoked certificates aren't cleaned up or if the CA keeps long expiration periods for revocation data.
- Large CRL sizes increase download times and resource consumption during certificate-based authentication.
- Remove stale or expired revoked certificates from the CA database.
- Shorten CRL validity periods and increase publishing frequency to keep CRL sizes manageable.
- Implement delta CRLs to distribute only incremental revocation information and reduce bandwidth.
AADSTS2205015: The Certificate Revocation List (CRL) failed signature validation. The expected SubjectKeyIdentifier {expectedSKI} doesn't match CRL's AuthorityKeyIdentifier {crlAK}. Please contact your administrator. The cryptographic signature on the CRL couldn't be validated because the CRL was signed by a certificate whose Subject Key Identifier (SKI) doesn't match the Authority Key Identifier (AKI) expected by Microsoft Entra ID. - The CA certificate used to sign the CRL changed but the new SKI wasn't updated or synchronized in the trusted certificates list.
- The CRL is outdated or mismatched due to misconfiguration in the PKI hierarchy.
- Incorrect or missing intermediate CA certificates in the trusted certificate list.
- CRL signing certificate might not have the appropriate key usage for signing CRLs.
- Check the Subject Key Identifier (SKI) of the CA certificate signing the CRL matches the Authority Key Identifier (AKI) in the CRL.
- Confirm the signing CA certificate is uploaded and trusted in Microsoft Entra ID.
- Validate that the CA certificate used to sign the CRL has the appropriate key usage flags enabled (such as CRL signing) and verify the certificate chain is intact and unbroken.
- Upload or update the correct root and intermediate CA certificates in Microsoft Entra ID’s trusted certificate authorities list and ensure the certificate used to sign the CRL is included and correctly configured.
AADSTS7000214: Certificate has been revoked. Certificate has been revoked. - Certificate listed in CRL - Replace revoked certificate
- Investigate revocation reason with CA
- Monitor certificate lifecycle and renewal

Frequently asked questions

This next sections cover common questions and answers related to Certificate Revocation Lists.

Is there a limit for CRL size?

The following CRL size limits apply:

  • Interactive sign-in download limit: 20 MB (Azure Global includes GCC), 45 MB for (Azure US government, includes GCC High, Dept. of Defense)
  • Service download limit: 65 MB (Azure Global includes GCC), 150 MB for (Azure US government, includes GCC High, Dept. of Defense)

When a CRL download fails, the following message appears:

"The Certificate Revocation List (CRL) downloaded from {uri} has exceeded the maximum allowed size ({size} bytes) for CRLs in Microsoft Entra ID. Try again in few minutes. If the issue persists, contact your tenant administrators."

Download remains in the background with higher limits.

We're reviewing the impact of these limits and have plans to remove them.

I see a valid Certificate Revocation List (CRL) endpoint set, but why don't I see any CRL revocation?

  • Make sure the CRL distribution point is set to a valid HTTP URL.
  • Make sure the CRL distribution point is accessible via an internet-facing URL.
  • Make sure the CRL sizes are within limits.

How do I instantly revoke a certificate?

Follow the steps to manually revoke a certificate.

How can I turn certificate revocation checking on or off for a particular CA?

We recommend against disabling certificate revocation list (CRL) checking because you won't be able to revoke certificates. However, if you need to investigate issues with CRL checking, you can exempt a CA from CRL checking in the Microsoft Entra admin center. In the CBA Authentication methods policy, select Configure and then select Add exemption. Choose the CA that you want to exempt, and select Add.

After a CRL endpoint is configured, end users can't sign in and they see "AADSTS500173: Unable to download CRL. Invalid status code Forbidden from CRL distribution point."

When a problem prevents Microsoft Entra from downloading the CRL, the cause is often firewall restrictions. In most cases, you can resolve the issue by updating firewall rules to allow the required IP addresses so Microsoft Entra can successfully download the CRL. For more information, see List of Microsoft IPAddress.

Next steps