Skip to main content

Documentation Index

Fetch the complete documentation index at: https://infisical.com/docs/llms.txt

Use this file to discover all available pages before exploring further.

Every certificate issued by an internal CA embeds a CRL Distribution Point (CDP) extension that tells validators where to fetch the revocation list. You can register additional mirror URLs at the CA level so validators have fallback locations if the primary endpoint is unreachable.
This page is for product admins managing PKI infrastructure. CRL configuration is an advanced topic — most users don’t need to configure custom mirrors.

How It Works

  • The Infisical-managed URL is always included as the primary CDP and cannot be removed.
  • Up to 4 mirror URLs can be configured per CA.
  • URLs must use http:// or https://.
  • Changes apply only to certificates issued after the update — existing certificates are not affected.
Infisical only advertises the mirror URLs in issued certificates — it does not publish your CRL to them. You are responsible for fetching the latest CRL from Infisical and serving an up-to-date copy at every mirror URL you register. If a mirror serves a stale CRL, validators that fall back to it will get outdated revocation information and may continue to trust certificates you have already revoked.

Configure CRL Mirrors

Mirror URLs can be configured at CA creation time or any time after via the CRL Distribution Points card on the CA detail page.
1

Navigate to CA details

Go to Certificate Manager → Certificate Authorities → Internal and select your CA.
2

Edit CRL Distribution Points

Click the pencil icon on the CRL Distribution Points card.
3

Add mirror URLs

Add one URL per row, in order of preference (clients try them in the listed order).

Keeping Mirrors in Sync

Infisical regenerates each CA’s CRL automatically — CRLs are rebuilt whenever a certificate is revoked or the existing CRL is approaching its nextUpdate time. To keep your mirrors useful, pull the latest CRL on a schedule and republish it at each mirror URL.

Fetch the current CRL

curl --location --request GET 'https://app.infisical.com/api/v1/cert-manager/ca/internal/<ca-id>/crls' \
  --header 'Authorization: Bearer <access-token>'
The response contains the PEM-encoded CRL. Write it to your mirror destination using your preferred sync method.
Run this on a cron schedule that’s well within the CRL validity window — every few hours is a reasonable default — so mirrors never serve a stale or expired CRL to validators.

Example: Sync to S3

#!/bin/bash
# Fetch CRL and upload to S3

CRL=$(curl -s -H "Authorization: Bearer $TOKEN" \
  "https://app.infisical.com/api/v1/cert-manager/ca/internal/$CA_ID/crls")

echo "$CRL" | aws s3 cp - s3://my-bucket/crl/internal-ca.crl \
  --content-type "application/pkix-crl"

What’s Next?

CA Renewal

Renew your CA certificates before expiry.

Certificate Policies

Define rules for certificate issuance.