We have a Microsoft Certificate Authority running on Windows Server 2019. We are issuing certificates to Android devices via a MDM. The Android device users browse to a web application (hosted by Apache, implemented in PHP 8) using the Chrome web browser (on Android) that requires a client certificate.
We are installing a separate Windows Server 2019 instance with the Microsoft OCSP Responder role to validate/verify that the client certificates presented to the Apache web server are valid. Apache has several directives to handle OCSP validation. We'd also like to validate the certificates in PHP for further security.
From my research reading several RFCs and Microsoft technical documents, it seeems like the Microsoft OCSP Responder validates certificates by referencing against a CRL for revocation status.
How does the Microsoft OCSP Responder validate certificates if they have been deleted from the CA instead of revoked? If deleted and not revoked, they will not show up in the CRL.
Am I missing something here? Will the Microsoft OCSP Responder validate the serial number against the CA database as well as its revocation status?