CRL partitioning allows CRLs to be partitioned in several smaller CRLs, instead of one large CRL. This enables you to verify portions of very large CRLs without spending the time to access and validate one large CRL.

CRL partitioning works by assigning each certificate to a random-generated CRL partition number upon issuance. The relying party can map the certificate to the correct partition via the CRL Distribution Point extension, and the CRL can be verified to be the correct CRL from the right partition, by checking its Issuing Distribution Point extension. The functionality is compliant with RFC 5280.

Please verify that your relying parties' software support CRL partitioning before using it. Both the CRL Distribution Point and the Issuing Distribution Point extension must be supported, in the certificate and the CRL respectively. For most use cases, OCSP is a better option.

Note that the use of Partitioned CRLs is mutually exclusive with Microsoft Compatibility Mode.


The following tables list configurations required for the CA and Certificate Profile respectively.

CA Configuration

To use partitioned CRLs, the CA must be configured according to the following. For information on all available CA fields, see CA Fields.

CA SettingRequirements
CRL Specific Data
Issuing Distribution Point on CRLs

Must be enabled. Setting it to critical is strongly recommended for security reasons.

This extension is needed so client can check that a CRL belongs to the correct partition. Without this extension (or if non-critical, and not understood by the client), it would be possible to send the wrong CRL to a client, which would then consider all certificates to be not revoked.

Use CRL partitionsMust be enabled for partitioned CRLs to work.
Number of CRL partitions

Total number of partitions, and the number of CRLs to generate. This is the highest partition number that will be used in new certificates. Must be at least 1.

This value can be increased to scale up with more partitions. Do not decrease this value, unless you are sure there are no certificates in existence with a higher CRL partition.

Number of suspended partitions

Normally this should be 0, which means there will be no suspended partitions. A suspended partition will not receive new certificates. This value can be temporarily increased to balance the partitions, if the low numbered partitions are larger than the high numbered ones. Since certificates are randomly assigned to a CRL partition, there should be no need to balance the partitions unless the number of partitions has been increased.

New certificates will be assigned a partition between (number of suspended partitions + 1) and (number of CRL partitions), inclusive. CRLs are always generated for all partitions, regardless of this setting.

Default CA defined validation data
Default CRL Distribution Point

Certificates must have a CRL Distribution Point (DP) URL which points to the correct partition. The CRL DP URL affects the CRL scope (see RFC 5280, section 5), and must match exactly between the certificate and the CRL.

Asterisks "*" are replaced with the partition number (except for partition 0, where the asterisks are removed without replacing). The URL must contain at least one asterisk.

If you use the built-in "certdist" URL, all you need to do is to add &param=* to the URL. This is done automatically if you click Generate button after enabling the Use CRL partitions option.

Default Freshest CRL Distribution Point

Delta CRLs (also known as the "Freshest CRL" extension) are not supported with CRL partitioning.

Certificate Profile Configuration

The Certificate Profile for issued certificates must be configured according to the following. For information on all available Certificate Profile fields, see Certificate Profile Fields.

Certificate Profile SettingRequirements
CRL Distribution PointsMust be enabled
Use CA defined CRL Distribution PointMust be enabled

Certificates that are issued with certificate profiles not configured as above, and any pre-existing certificates prior to activating partitioned CRLs, will have partition number 0.


Let's assume you have the following settings for your CA:

If you then issue a certificate with a certificate profile configured as in the Configuration section, it would be assigned a partition number between 21 and 30, inclusive. The certificate will point to the correct CRL partition using the CRL Distribution Point extension in the certificate. For example, if the certificate was assigned partition 25, then the URL would be included in the certificate at issuance. Relying parties would then use this URL to check for revocation.

When you revoke the certificate it would go to that CRL partition, and would be included on the CRL the next time it is generated. If the certificate in this example was revoked, then the next time CRLs were generated for the CA, the CRL for partition 25 would contain the serial number of the revoked certificate.

CRL Generation

After a CA has been configured with partitioned CRLs, then requesting creation of a new CRL will generate CRLs for all partitions.

This applies to the CRL Update Worker, CLI, the WebService, the AdminWeb, as well as all operations that indirectly trigger CRL generation, such as CA import or renewal.

CRL Partitioning and Publishing

Certificate publishers and CRL publishers may or may not support partitioned CRLs. Publisher support is shown in the following table:

PublisherTypeCRL Partitioning Support
Active Directory PublisherCertificate/CRL

Yes, for certificates.
No, for CRLs.

LDAP V3 PublisherCertificate/CRL

Yes, for certificates.

No, for CRLs.
LDAP V3 Search PublisherCertificate/CRL

Yes, for certificates.

No, for CRLs.
Multi Group PublisherCertificate/CRLYes (if publishers in groups support partitioned CRLs).

The CRL DP URL (with the partition number) is stored in the certificate, which is not published if "Publishing Without Identifying Information" is enabled.

Validation Authority Peer PublisherCertificate/CRL


For certificates, the VA does not need to know the partition (it does not issue CRLs), so the CRL partition number will be NULL in the CertificateData table on the VA.
Validation Authority PublisherCertificate/CRL

For certificates, the VA does not need to know the partition (it does not issue CRLs), so the CRL partition number will be NULL in the CertificateData table on the VA.

Fetching CRL Partitions

EJBCA supports fetching CRL partitions by specifying a parameter in the URL. By default, if no parameter is given, it will return CRL partition 0 (which will contain any existing certificates, see Configuration).

The following servlets support retrieving CRL partitions. In the example URLs, the partition number is 123.

Servlet nameParameter nameExample URL

(RFC 4387)



partition Requires client certificate.

Non-existing partitions are handled the same way as a non-existing CA would be handled. For example, search.cgi will give the HTTP response "204 No Content".

Certificate import

EJBCA supports import of certificates to a CA with partitioned CRLs, as long as the CRL Distribution Point extension is present and exactly matches the value configured in the CA setting Default CRL Distribution Point. The CRL partition number will be extracted from the CRL DP URL.

Certificates that do not meet the requirement above will be imported into partition 0.