Ascertia provide an SCVP service which complies with IETF RFC 5055 and RFC 3379 for delegated path discovery (DPD) and delegated path validation (DPV) of digital certificates. In this demo you can verify any X.509 Certificate. The free service is configured with a list of Certificate Authorities (CAs). The ADSS Verification Server will attempt to build a certificate chain to one of these trust points. Certificate path building uses AIA certificate extension, locally configured intermediate CA certificates, and those obtained from LDAP directories. The ADSS SCVP server can support an unlimited number of CAs each with their own validation policy.
1
Select your Certificate
Validate certificate in Bridge
CA environment (View Certificate)
This certificate chains to the Federal Bridge CA. The certificate validation service will first locate intermediate CA certificate as part of delegated path discovery and then validate the certificate chain.
Use my own certificate

VALIDATE
(View Certificate) (View Certificate)
This free SCVP service is for demo/testing purposes only and powered by ADSS SCVP Server (J2EE application). This web application uses a standard SCVP request to validate the target certificate. The SCVP response is then displayed in the result page. It retrieves certificate status information from these CAs based on unique polling policies and mechanisms.

Server-side validation allows a flexible API to request how ADSS SCVP Server should validate the certificate and what evidence information should be returned, e.g. CRL/OCSP revocation information, certification path, etc. ADSS SCVP Server supports IETF RFC 5055 and RFC 3379 for delegated path discovery (DPD) and delegated path validation (DPV) of digital certificates

All responses are signed by ADSS SCVP Server so that clients can see that these are genuine messages from a trusted authority and they have not been changed.

The ADSS SCVP Server not only ensures that the certificate signature is not tampered, and is valid (not expired, not revoked and issued by a trusted CA) but can also report on the certificate quality level – see this information on PEPPOL.
If you providing your own certificate, make sure to provide a X.509 V3 certificate and that the issuer is supported by this test service.