Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr
|
|
|
- Merilyn Todd
- 10 years ago
- Views:
Transcription
1 Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Version 0.3 August 2002 Online : Old versions Version 0.2 : Version 0.1 : 1. INTRODUCTION 1.1 Overview This document is a draft. It is structured according to RFC2527. It describes the set of rules used by CNRS/CNRS-Projets/Datagrid-fr certification authority. 1.2 Identification Document name : Certificate Policy and Certification Practice Statement CNRS/CNRS- Projets/Datagrid-fr Version : 0.1 (draft) Date : 05/21/ Community and Applicability Certification authorities CNRS/CNRS-Projets/Datagrid-fr CA is a branch of the CNRS CAs tree (described in the french document : CNRS CA is the root certification authority. This CA certificate his signed by itseft. It has 3 sub-authorities. Each one has a certificate signed by CNRS CA : o CNRS-Standard to deliver general use certificates to people in the 1300 laboratories of CNRS. Every laboratory will have his registration authority (by default the director). o CNRS-Plus to deliver gold" certificates for administrative use. o CNRS-Projets : this authority has also sub-authorities, one by project (in which CNRS is involved) who needs a certification authority. Each project has a limited lifetime and may include different organisations. The project manager decides which people may have a certificate. Datagrid-fr his a sub-authority of CNRS-Projets. The Datagrid-fr certificate is signed by CNRS-Projets. CNRS, CNRS-Standard, CNRS-Plus, CNRS-Projets CA are managed by CNRS/UREC ( Datagrid-fr certificate policy 1
2 1.3.2 Registration authorities The registration authority of Datagrid-fr is Sophie Nicoud who works with François Etienne in WP6. The registration authority has a CNRS-Plus certificate used to accept, reject,... certificate requests End entités Datagrid-fr may issue certificates to every people or server involved in the Datagrid project. François Etienne decides if the requestor may or may not have a Datagrid-fr certificate Applicability The person certificates may be used for user authentication and data integrity in various applications : globus or similar grid software, electronic mail, Web server access,... The server certificates may be used for server authentication and communication encryption. 1.3 Contact Details For this document and the CNRS authorities policy and procedures : Jean-Luc Archimbaud CNRS/UREC [email protected] For Datagrid-fr registration and issuing policy : Sophie Nicoud CNRS/UREC [email protected] François Etienne CPPM Franç[email protected] 2. GENERAL PROVISIONS 2.1 Obligations CA obligations The Datagrid-fr CA : o accepts all requests validated by the registration authority o creates and delivers certificates to users o publishes the issued certificates o accepts all revocations from the registration authority o issues and publishes a CRL RA obligations The Datagrid-fr RA : o authenticates the person requesting a person certificate o determines if the person has the right to have a Datagrid-fr person certificate o sends validated person certificates requests to the CA o sends validated server certificates requests to the CA o creates and sends revocation requests to the CA Subscriber obligations Subscribers : o must be involved in the Datagrid project o must protect their private key and save it Datagrid-fr certificate policy 2
3 o must immediately notify the Datagrid-fr RA in case of key lost or compromised Relying party obligations Relying party : o must use the certificate for the permitted usage only o verify the CRL before validating a certificate Repository obligations CNRS/UREC publishes as soon as issued the Datagrid-fr CRL, the user certificates and the server certificates on a Web server. 2.2 Liability The certification service is run with a reasonable level of security but is provided on a best effort basis. CNRS will take no responsability for problems arising from its operation or for the use made of the certificates it provides. CNRS denies any financial or other kind of responsibility for damages or impaiments resulting from its operation. 2.3 Financial responsibility No financial responsability is accepted. 2.4 Interpretation and Enforcement 2.5 Fees No fees are charged. 2.6 Publication and Repository Publication of CA information is a public Web page which permits o To list and load the CNRS, CNRS-Projets and Datagrid-fr CA certificates and CRLs o To find and load user and server issued certificates o To get various informations Frequency of publication The user and server certificates are published as soon as they are generated. The CRL is published every day. It has a one month validity time Access controls No access controls to these publications are performed Repositories Compliance audit No stipulation Datagrid-fr certificate policy 3
4 2.8 Confidentiality CNRS CAs collect subscribers fullname, organisation and unit names, electronic address. These informations are included in the certificate. These informations are not confidential. CNRS CAs have never access to users or servers private keys. These keys are generated on the users stations and stay there. 3. IDENTIFICATION AND AUTHENTICATION 3.1 Initial Registration Types of names Person DN : C = Country, O = Organisation, OU = Unit, CN = First name Last name / = Server name DN : C = Country, O = Organisation, OU = Unit, CN = DNS server name/ = server administrator Need for names to be meaningful Rules for interpreting various name forms Uniqueness of names Name claim dispute resolution procedure Recognition, authentication and role of trademarks Method to prove possession of private key Person certificate : the public and private keys are generated on the user station when he fills the certificate request form with Netscape or Internet Explorer browser. Server certificate : the private key and the certificate are sent to the requestor in a encrypted mail Authentication of organization identity The registration authority verifies the organisation identity as member of a recognized organization by the CNRS Authentication of individual identity The registration authority cross-check the person identity with reliable and secure informations coming from official administrative managers recognized by the CNRS. 3.2 Routine Rekey This will be done by an online procedure with the old certificate check. Datagrid-fr certificate policy 4
5 3.3 Rekey after Revocation Same rules than the initial registration. 3.4 Revocation request Revocation request must be sent by the user in a signed electronic mail if possible. If not, the user must contact the registration authority who verifies the requester identity with similar procedures used in the initial registration.. 4. OPERATIONAL REQUIREMENTS 4.1 Certificate Application Person certificate : the request is submitted using an online procedure. The requestor fills a form with Nescape or Internet Explorer browser. During this step, the 2 keys are generated in the user browser and the CGI program gets the public key (the private key stays on the user station). After this step, to verify the person electronic address, a program sends an to the person. This one must reply. Server certificate : the requestor must already have a person certificate. The request is submitted with a similar procedure without the 2 keys generation on the user browser. Each request is stored in a private queue and a mail is sent to the registration authority. 4.2 Certificate Issuance When the registration authority receives a request notification mail, he accesses the requests private queue using his CNRS-Plus certificate. He verifies all the requestor form informations in a way described in paragraph. If everything is correct, the request is accepted and sent to the Certification Authority (if not, a "negative" mail is sent to the requestor). If the certificate is a person certificate, the Certification Authority creates the certificate, stores it on a public Web page, and sends an electronic mail to the requestor with the instructions on how to download his certificate. If the certificate is a server certificate the Certification Authority generates the 2 keys and the certificate using openssl. These informations are then sent to the requestor in an signed and encrypted with the public key of the requestor. The Certification Authority publishes the certificate. 4.3 Certificate Acceptance 4.4 Certificate Suspension and Revocation Circumstances for revocation A certificate will be revoked when the information it contains is no longer correct (or suspected to be incorrect) or when the private key is lost (or suspected to be compromised). Datagrid-fr certificate policy 5
6 4.4.2 Who can request revocation The certificate holder or any other entity presenting proof of knowledge of the private key compromise or of the subscriber's data variation can request a certificate revocation Procedure for revocation request The registration authority is the only person who can request a certificate revocation. He uses his CNRS-Plus certificate to process this request wich is sent to the certificate authority. Revocation request must be sent by the user to the registration authority in a signed electronic mail if possible. If not, the user must contact the registration authority by another method. The registration authority verifies the requester identity with the same procedures used in the initial registration Revocation request grace period Circumstances for suspension Who can request suspension Procedure for suspension request Limits on suspension period CRL issuance frequency (if applicable) The CRL is created every night. His lifetime is one month CRL checking requirements On-line revocation/status checking availability The public page permits to get the CRL and the current status of each datagrid certificate On-line revocation checking requirements Other forms of revocation advertisements available Checking requirements for other forms of revocation advertisements Special requirements re key compromise 4.5 Security Audit Procedures Types of event recorded The following events are recorded : o Certificate requests (by persons) o Certificate acceptations (by RA) o Revocation requests (by RA) Datagrid-fr certificate policy 6
7 o Certificate issues o CRL issues Frequency of processing log Retention period for audit log Protection of audit log The CA operators and the RA are the only people who can view audit logs. Access to the audit log is restricted to the machines of CA operators and of the RA (IP control access) and a CNRS-Plus certificate is mandatory Audit log backup procedures The audit log is back up every night Audit collection system (internal vs external) The collection system is an internal UREC system Notification to event-causing subject Vulnerability assessments 4.6 Records Archival Types of event recorded The following events are audited : o Certificate requests (by persons) o Certificate acceptations (by RA) o Revocation requests (by RA) o Certificate issues o CRL issues Datagrid-fr certificate policy 7
8 4.6.2 Retention period for archive Protection of archive Archive backup procedures Requirements for time-stamping of records Archive collection system (internal or external) Procedures to obtain and verify archive information 4.7 Key changeover 4.8 Compromise and Disaster Recovery Computing resources, software, and/or data are corrupted Entity public key is revoked Entity key is compromised Secure facility after a natural or other type of disaster 4.9 CA Termination 5. PHYSICAL, PROCEDURAL, AND PERSONNEL SECURITY CONTROLS 5.1 Physical Controls Site location and construction Physical access RA and CA machines are in a controlled environment where access is restricted to authorized people. Datagrid-fr certificate policy 8
9 5.1.3 Power and air conditioning Water exposures Fire prevention and protection Media storage Waste disposal Off-site backup 5.2 Procedural Controls Trusted roles Number of persons required per task Identification and authentication for each role 5.3 Personnel Controls Background, qualifications, experience, and clearance requirements Background check procedures Training requirements Retraining frequency and requirements Job rotation frequency and sequence Sanctions for unauthorized actions Contracting personnel requirements Documentation supplied to personnel 6. TECHNICAL SECURITY CONTROLS 6.1 Key Pair Generation and Installation Key pair generation Datagrid-fr certificate policy 9
10 The user (or server) key pair is generated on the user station when he fills the certificate request form with a Netscape or Internet Explorer browser. The CA picks up the public key. The private key stays on the user station Private key delivery to entity Public key delivery to certificate issuer User or server public key is picked up by the CA during a SSL session CA public key delivery to users The CA certificate (which includes the CA public key) is delivered by a connection to a secure web server : Key sizes By default the key size is 1024 bits, it may be 512 (Netscape ou IE old releases) or 2024 bits. We recommand at least 1024 bits Public key parameters generation Parameter quality checking Hardware/software key generation Netscape ou Internet Explorer key generation software are used Key usage purposes (as per X.509 v3 key usage field) Key usages are : Digital Signature, Non Repudiation, Key Encipherment. 6.2 Private Key Protection The users or servers private keys must be protected and backed up by the users. Datagrid-fr CA private key is kept, encrypted, in multiple CD-Rom copies stored in different locations. The passphrase to access the private key is known by 4 people. Datagrid-fr certificate policy 10
11 6.2.1 Standards for cryptographic module Private key (n out of m) multi-person control Private key escrow Private key backup Private key archival Private key entry into cryptographic module Method of activating private key Method of deactivating private key Method of destroying private key 6.3 Other Aspects of Key Pair Management Public key archival Usage periods for the public and private keys The default user or server certificate lifetime is one year. It may be less. The Datagrid-fr CA certificate has a lifetime of 10 years. 6.4 Activation Data Activation data generation and installation Activation data protection Other aspects of activation data 6.5 Computer Security Controls Specific computer security technical requirements CA servers are dedicated servers : o Their operating systems are maintained at a high level of security (all recommanded patches are installed) o The network services are reduced to the minimum o The servers access is restricted to a few stations o They are protected by a firewall Datagrid-fr certificate policy 11
12 6.5.2 Computer security rating 6.6 Life Cycle Technical Controls System development controls Security management controls Life cycle security ratings 6.7 Network Security Controls 6.8 Cryptographic Module Engineering Controls 7. CERTIFICATE AND CRL PROFILES 7.1 Certificate Profile o A user certificate example : Version: 3 (0x2) Serial Number: 72 (0x48) Signature Algorithm: md5withrsaencryption Issuer: C=FR, O=CNRS, CN=Datagrid-fr Validity Not Before: Aug 22 16:41: GMT Not After : Aug 22 16:41: GMT Subject: C=FR, O=CNRS, OU=LAPP, CN=Dominique Boutigny/ [email protected] Subject Public Key Info: Public Key Algorithm: rsaencryption RSA Public Key: (1024 bit) Modulus (1024 bit):... Exponent: (0x10001) X509v3 extensions: X509v3 Basic Constraints: critical CA:FALSE Netscape Cert Type: SSL Client, S/MIME, Object Signing X509v3 Key Usage: critical Digital Signature, Non Repudiation, Key Encipherment Netscape Comment: Certificat Datagrid-fr. Pour toute information se reporter X509v3 Subject Key Identifier:... X509v3 Authority Key Identifier: keyid:... DirName:/C=FR/O=CNRS/CN=CNRS-Projets serial:02 Datagrid-fr certificate policy 12
13 X509v3 Subject Alternative Name: X509v3 Issuer Alternative Name: URI: X509v3 CRL Distribution Points: URI: Netscape CA Policy Url: Signature Algorithm: md5withrsaencryption :... o A server certificate example : Version: 3 (0x2) Serial Number: 67 (0x43) Signature Algorithm: md5withrsaencryption Issuer: C=FR, O=CNRS, CN=Datagrid-fr Validity Not Before: Aug 6 12:12: GMT Not After : Aug 6 12:12: GMT Subject: C=FR, O=CNRS, OU=LPC, CN=biolpc03.in2p3.fr/ [email protected] Subject Public Key Info: Public Key Algorithm: rsaencryption RSA Public Key: (1024 bit) :... X509v3 extensions: X509v3 Basic Constraints: critical CA:FALSE Netscape Cert Type: SSL Server X509v3 Key Usage: critical Digital Signature, Non Repudiation, Key Encipherment Netscape Comment: Certificat serveur Datagrid-fr X509v3 Subject Key Identifier:... X509v3 Authority Key Identifier: keyid:... DirName:/C=FR/O=CNRS/CN=CNRS-Projets serial:02 X509v3 Issuer Alternative Name: URI: X509v3 CRL Distribution Points: URI: Netscape CA Policy Url: Signature Algorithm: md5withrsaencryption :... Datagrid-fr certificate policy 13
14 7.1.1 Version number(s) Certificate extensions Algorithm object identifiers Name forms Name constraints Certificate policy Object Identifier Usage of Policy Constraints extension Policy qualifiers syntax and semantics Processing semantics for the critical certificate policy extension 7.2 CRL Profile o A Datagrid-fr CRL example : Version 1 (0x0) Signature Algorithm: md5withrsaencryption Issuer: /C=FR/O=CNRS/CN=Datagrid-fr Last Update: May 28 22:14: GMT Next Update: Jun 27 22:14: GMT Revoked Certificates: Serial Number: 02 Revocation Date: May 15 06:48: GMT Signature Algorithm: md5withrsaencryption Version number(s) CRL and CRL entry extensions 8. SPECIFICATION ADMINISTRATION 8.1 Specification change procedures 8.2 Publication and notification policies The last version of this document is available at : CPS approval procedures Datagrid-fr certificate policy 14
TR-GRID CERTIFICATION AUTHORITY
TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.1 January, 2009 Table of Contents: TABLE OF CONTENTS:...2 1. INTRODUCTION...7 1.1 OVERVIEW...7 1.2 DOCUMENT
TR-GRID CERTIFICATION AUTHORITY
TR-GRID CERTIFICATION AUTHORITY CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Version 2.3 May 15, 2014 Table of Contents TABLE OF CONTENTS:... 2 1. INTRODUCTION... 7 1.1 OVERVIEW... 7 1.2 DOCUMENT
ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0
ESnet SSL CA service Certificate Policy And Certification Practice Statement Version 1.0 June 30, 2004 Table of Contents Table of Contents...2 1 Introduction...3 1.1 Overview...3 1.1.1 General Definitions...4
Malaysian Identity Federation and Access Management Certification Authority Certificate Policy and Certification Practice Statement
Malaysian Identity Federation and Access Management Certification Authority Certificate Policy and Certification Practice Statement Version 2.2 Document OID: 1.3.6.1.4.1.36355.2.1.2.2 February 2012 Contents
Fraunhofer Corporate PKI. Certification Practice Statement
Fraunhofer Corporate PKI Certification Practice Statement Version 1.1 Published in June 2012 Object Identifier of this Document: 1.3.6.1.4.1.778.80.3.2.1 Contact: Fraunhofer Competence Center PKI Fraunhofer
THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Published By: RSA Security Inc.
THE RSA ROOT SIGNING SERVICE Certification Practice Statement For RSA Certificate Authorities (CAs) Last Revision Date: June 28, 2007 Version: 3.0 Published By: RSA Security Inc. Copyright 2002-2007 by
THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY. July 2011 Version 2.0. Copyright 2006-2011, The Walt Disney Company
THE WALT DISNEY COMPANY PUBLIC KEY INFRASTRUCTURE CERTIFICATE POLICY July 2011 Version 2.0 Copyright 2006-2011, The Walt Disney Company Version Control Version Revision Date Revision Description Revised
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
CMS Illinois Department of Central Management Services
CMS Illinois Department of Central Management Services State of Illinois Public Key Infrastructure Certification Practices Statement For Digital Signature And Encryption Applications Version 3.3 (IETF
thawte Certification Practice Statement Version 2.3
thawte Certification Practice Statement Version 2.3 Effective Date: July, 2006 thawte Certification Practice Statement 2006 thawte, Inc. All rights reserved. Printed in the United States of America. Revision
SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates
SwissSign Certificate Policy and Certification Practice Statement for Gold Certificates Version March 2004 Version 2004-03 SwissSign Gold CP/CPS Page 1 of 66 Table of Contents 1. INTRODUCTION...9 1.1 Overview...
apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.
California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority. Version 3.
California Independent System Operator Certification Practice Statement for Basic Assurance Certification Authority Version 3.4 April 2015 Table of Contents 1.0 INTRODUCTION... 8 1.1 OVERVIEW... 8 1.2
Gandi CA Certification Practice Statement
Gandi CA Certification Practice Statement Gandi SAS 15 Place de la Nation Paris 75011 France Version 1.0 TABLE OF CONTENTS 1.INTRODUCTION...10 1.1.Overview...10 1.2.Document Name and Identification...10
Symantec Trust Network (STN) Certificate Policy
Symantec Trust Network (STN) Certificate Policy Version 2.8.5 Effective Date: September 8, 2011 Symantec Corporation 350 Ellis Street Mountain View, CA 94043 USA +1 650.527.8000 http//:www.symantec.com
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
VeriSign Trust Network Certificate Policies
VeriSign Trust Network Certificate Policies Version 2.8.1 Effective Date: February 1, 2009 VeriSign, Inc. 487 E. Middlefield Road Mountain View, CA 94043 USA +1 650.961.7500 http//:www.verisign.com - 1-
epki Root Certification Authority Certification Practice Statement Version 1.2
epki Root Certification Authority Certification Practice Statement Version 1.2 Chunghwa Telecom Co., Ltd. August 21, 2015 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 1 1.1.1 Certification Practice Statement...
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
Registration Practices Statement. Grid Registration Authority Approved December, 2011 Version 1.00
Registration Practices Statement Grid Registration Authority Approved December, 2011 Version 1.00 i TABLE OF CONTENTS 1. Introduction... 1 1.1. Overview... 1 1.2. Document name and Identification... 1
Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States
Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States www.globessl.com TABLE OF CONTENTS 1. INTRODUCTION...
EuropeanSSL Secure Certification Practice Statement
EuropeanSSL Secure Certification Practice Statement Eunetic GmbH Version 1.0 14 July 2008 Wagnerstrasse 25 76448 Durmersheim Tel: +49 (0) 180 / 386 384 2 Fax: +49 (0) 180 / 329 329 329 www.eunetic.eu TABLE
thawte Certification Practice Statement
thawte Certification Practice Statement Version 3.7.5 Effective Date: 4 June, 2012 (All CA/Browser Forum-specific requirements are effective on July 1, 2012) thawte Certification Practice Statement 2012
SSL.com Certification Practice Statement
SSL.com Certification Practice Statement SSL.com Version 1.0 February 15, 2012 2260 W Holcombe Blvd Ste 700 Houston, Texas, 77019 US Tel: +1 SSL-CERTIFICATE (+1-775-237-8434) Fax: +1 832-201-7706 www.ssl.com
X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities
X.509 Certificate Policy for the Australian Department of Defence Root Certificate Authority and Subordinate Certificate Authorities Version 5.1 May 2014 Notice to all parties seeking to rely Reliance
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Trusted Certificate Service
TCS Server and Code Signing Personal CA CPS Version 2.0 (rev 15) Page 1/40 Trusted Certificate Service TCS Server CAs, escience Server CA, and Code Signing CA Certificate Practice Statement Version 2.0
KIBS Certification Practice Statement for non-qualified Certificates
KIBS Certification Practice Statement for non-qualified Certificates Version 1.0 Effective Date: September, 2012 KIBS AD Skopje Kuzman Josifovski Pitu 1 1000, Skopje, Republic of Macedonia Phone number:
SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY
SAUDI NATIONAL ROOT-CA CERTIFICATE POLICY Document Classification: Public Version Number: 2.5 Issue Date: June 25, 2015 National Center for Digital Certification Policies and Regulations Department Digitally
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
X.509 Certificate Policy for India PKI
X.509 Certificate Policy for India PKI Version 1.4 May 2015 Controller of Certifying Authorities Department of Information Technology Ministry of Communications and Information Technology Document Control
Equens Certificate Policy
Equens Certificate Policy WebServices and Connectivity Final H.C. van der Wijck 11 March 2015 Classification: Open Version 3.0 Version history Version no. Version date Status Edited by Most important edit(s)
TeliaSonera Server Certificate Policy and Certification Practice Statement
TeliaSonera Server Certificate Policy and Certification Practice Statement v.1.4 TeliaSonera Server Certificate Policy and Certification Practice Statement CA name Validation OID TeliaSonera Server CA
The Boeing Company. Boeing Commercial Airline PKI. Basic Assurance CERTIFICATE POLICY
The Boeing Company Boeing Commercial Airline PKI Basic Assurance CERTIFICATE POLICY Version 1.4 PA Board Approved: 7-19-2013 via e-mal PKI-233 BCA PKI Basic Assurance Certificate Policy Page 1 of 69 Signature
Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS)
[Draft] Bangladesh Bank Certification Authority (BBCA) Certification Practice Statement (CPS) Version: 1.00 August, 2015 Bangladesh Bank Page 2 of 42 Document Reference Title Document Type Bangladesh Bank
TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT. Version 2.0
TREND MICRO SSL CERTIFICATION PRACTICE STATEMENT Version 2.0 Effective Date: 14 April 2015 TABLE OF CONTENTS 1. INTRODUCTION 1.1 Overview 1.2 Document name and identification 1.3 PKI participants 1.3.1
Trustwave Holdings, Inc
Trustwave Holdings, Inc Certificate Policy and Certification Practices Statement Version 2.9 Effective Date: July 13, 2010 This document contains Certification Practices and Certificate Policies applicable
PKI NBP Certification Policy for ESCB Encryption Certificates. OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2
PKI NBP Certification Policy for ESCB Encryption Certificates OID: 1.3.6.1.4.1.31995.1.2.3.1 version 1.2 Security Department NBP Warsaw, 2015 Table of Contents 1. Introduction 1 1.1 Overview 1 1.2 Document
ING Public Key Infrastructure Certificate Practice Statement. Version 5.3 - June 2015
ING Public Key Infrastructure Certificate Practice Statement Version 5.3 - June 2015 Colophon Commissioned by Additional copies ING Corporate PKI Policy Approval Authority Additional copies of this document
CERTIFICATE POLICY (CP) (For SSL, EV SSL, OSC and similar electronic certificates)
(CP) (For SSL, EV SSL, OSC and similar electronic certificates) VERSION : 09 DATE : 01.12.2014 1. INTRODUCTION... 10 1.1. Overview... 10 1.2. Document Name and Identification... 11 1.3. Participants...
American International Group, Inc. DNS Practice Statement for the AIG Zone. Version 0.2
American International Group, Inc. DNS Practice Statement for the AIG Zone Version 0.2 1 Table of contents 1 INTRODUCTION... 6 1.1 Overview...6 1.2 Document Name and Identification...6 1.3 Community and
PKI NBP Certification Policy for ESCB Signature Certificates. OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5
PKI NBP Certification Policy for ESCB Signature Certificates OID: 1.3.6.1.4.1.31995.1.2.2.1 version 1.5 Security Department NBP Warsaw, 2015 Table of Contents 1. Introduction 1 1.1 Overview 1 1.2 Document
Advantage Security Certification Practice Statement
Advantage Security Certification Practice Statement Version 3.8.5 Effective Date: 01/01/2012 Advantage Security S. de R.L. de C.V. Prol. Paseo de la Reforma # 625 Int 402, Col Paseo de las Lomas. Del Alvaro
Page de signatures électroniques / Electronic Signatures Page
Page de signatures électroniques / Electronic Signatures Page Information Documentaire / Document Information Titre / Title : Auteur / Author : Reference : This document has been digitally signed and timestamped.
GARR Certification Authority Certificate Policy and Certification Practice Statement. Version 1.0
GARR Certification Authority Certificate Policy and Certification Practice Statement Version 1.0 November 2006 The PDF version of this document has been signed with following PGP key: pub 1024R/5BA9D271
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
Certificate Policy KEYNECTIS SSL CA CP. Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2
Certificate Policy KEYNECTIS SSL CA CP Emmanuel Montacutelli 12/11/2014 DMS_CP_KEYNECTIS SSL CA CP_1.2 KEYNECTIS SSL CA CP Version 1.2 Pages 51 Status Draft Final Author Emmanuel Montacutelli OpenTrust
Getronics Certification Certificate of Authentic Trustworthy
Getronics Version 3.0 Effective Date: 15 october, 2008 Getronics Nederland B.V. Fauststraat 1 P.O. Box 9105 7300 HN Apeldoorn The Netherlands Phone: +31 (0)20 570 4511 http://www.pki.getronicspinkroccade.nl
Post.Trust Certificate Authority
Post.Trust Certificate Authority Certification Practice Statement CA Policy and Procedures Document Issue date: 03 April 2014 Version: 2.7.2.1 Release Contents DEFINITIONS... 6 LIST OF ABBREVIATIONS...
Ford Motor Company CA Certification Practice Statement
Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate
Trusted Certificate Service (TCS)
TCS Personal and escience Personal CA CPS Version 2.0 (rev 15) Page 1/40 Trusted Certificate Service (TCS) TCS Personal CA, escience Personal CA, and Document Signing CA Certificate Practice Statement
PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy
PEXA Public Key Infrastructure (PKI) Certification Authority Certificate Policy Version: 1.0 Issued: August 2014 Status: Final PEXA Certification Authority Certificate Profile 1. Introduction Property
CERTIFICATE POLICY KEYNECTIS SSL CA
CERTIFICATE POLICY KEYNECTIS SSL CA Date: 05/02/2009 KEYNECTIS SSL CA CERTIFICATE POLICY Subject: KEYNECTIS SSL CA Certificate Policy Version number: 1.1 Number of pages: 49 Status of the Project Final
phicert Direct Certificate Policy and Certification Practices Statement
phicert Direct Certificate Policy and Certification Practices Statement Version 1. 1 Effective Date: March 31, 2014 Copyright 2013-2014 EMR Direct. All rights reserved. [Trademark Notices] phicert is a
TELSTRA RSS CA Subscriber Agreement (SA)
TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this
- X.509 PKI EMAIL SECURITY GATEWAY. Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1
- X.509 PKI EMAIL SECURITY GATEWAY Certificate Policy (CP) & Certification Practice Statement (CPS) Edition 1.1 Commerzbank AG - Page 1 Document control: Title: Description : RFC Schema: Authors: Commerzbank
Certificate Policy. SWIFT Qualified Certificates SWIFT
SWIFT SWIFT Qualified Certificates Certificate Policy This Certificate Policy applies to Qualified Certificates issued by SWIFT. It indicates the requirements and procedures to be followed, and the responsibilities
SWITCHaai Metadata CA. Certificate Policy and Certification Practice Statement
SWITCHaai Metadata CA Certificate Policy and Certification Practice Statement Version 1.0, OID 2.16.756.1.2.6.7.1.0 July 15, 2008 Table of Contents 1. INTRODUCTION...6 1.1 Overview...6 1.2 Document name
TC TrustCenter GmbH. Certification Practice Statement
TC TrustCenter GmbH Certification Practice Statement NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certification Practice Statement is published in conformance
Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5
Public Certification Authority Certification Practice Statement of Chunghwa Telecom (PublicCA CPS) Version 1.5 Chunghwa Telecom Co., Ltd. August 21, 2015 Contents 1. INTRODUCTION... 1 1.1 OVERVIEW... 1
Certificate Policy and Certification Practice Statement
DigiCert Certificate Policy and Certification Practice Statement DigiCert, Inc. Version 3.03 March 15, 2007 333 South 520 West Lindon, UT 84042 USA Tel: 1-801-805-1620 Fax: 1-801-705-0481 www.digicert.com
Ericsson Group Certificate Value Statement - 2013
COMPANY INFO 1 (23) Ericsson Group Certificate Value Statement - 2013 COMPANY INFO 2 (23) Contents 1 Ericsson Certificate Value Statement... 3 2 Introduction... 3 2.1 Overview... 3 3 Contact information...
Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria
Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
X.509 Certification Practices Statement for the U.S. Government Printing Office Principal Certification Authority (GPO-PCA)
.509 Certification Practices Statement for the U.S. Government Printing Office Principal Certification Authority (GPO-PCA) June 11, 2007 FINAL Version 1.6.1 FOR OFFICIAL USE ONLY SIGNATURE PAGE U.S. Government
Symantec External Certificate Authority Key Recovery Practice Statement (KRPS)
Symantec External Certificate Authority Key Recovery Practice Statement (KRPS) Version 2 24 April 2013 (Portions of this document have been redacted.) Symantec Corporation 350 Ellis Street Mountain View,
Certification Practice Statement. of the. Public Key Infrastructure in the. Deutsche Forschungsnetz. - Grid -
Certification Practice Statement of the Public Key Infrastructure in the Deutsche Forschungsnetz - Grid - DFN-Verein Grid-CPS V1.4, May 2008 This document and all parts thereof are copyrighted. Distribution
e-tuğra CERTIFICATE POLICY E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Version: 3.1 Validity Date: September, 2013 Update Date: 30/08/2013
e-tuğra CERTIFICATE POLICY E-Tuğra EBG Bilişim Teknolojileri ve Hizmetleri A.Ş. Version: 3.1 Validity Date: September, 2013 Update Date: 30/08/2013 Ceyhun Atıf Kansu Cad. 130/58 Balgat / ANKARA TURKEY
Certificate Policy for the United States Patent and Trademark Office November 26, 2013 Version 2.5
Certificate Policy for the United States Patent and Trademark Office November 26, 2013 Prepared by: United States Patent and Trademark Office Public Key Infrastructure Policy Authority This page is intentionally
Starfield Technologies, LLC. Certificate Policy and Certification Practice Statement (CP/CPS)
Starfield Technologies, LLC Certificate Policy and Certification Practice Statement (CP/CPS) Version 3.8 April 15, 2016 i Starfield CP-CPS V3.8 Table of Contents 1 Introduction... 1 1.1 Overview... 1 1.2
SSL CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT
SSL CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Kamu Sertifikasyon Merkezi TÜBİTAK Yerleşkesi, P.K. 74 Gebze 41470 Kocaeli, TURKEY Tel: +90 (0) 262 648 18 18 Fax: +90 (0) 262 648 18 00 www.kamusm.gov.tr
InCommon Certification Practices Statement. Server Certificates
InCommon Certification Practices Statement for Server Certificates 16 August 2010 Version 1.0 Latest version: https://www.incommon.org/cert/repository/cps_ssl.pdf This version: https://www.incommon.org/cert/repository/cps_ssl_20100816.pdf
Internet Security Research Group (ISRG)
Internet Security Research Group (ISRG) Certificate Policy Version 1.0 Updated May 5, 2015 Approved by ISRG Policy Management Authority ISRG Web Site: https://letsencrypt.org Page 1 of 83 Copyright Notice
X.509 Certification Practice Statement for the Australian Department of Defence
X.509 Certification Practice Statement for the Australian Department of Defence Version 5.1 December 2014 Document Management This document is controlled by: Changes are authorised by: Defence Public Key
GENERAL PROVISIONS...6
Preface This Key Recovery Policy (KRP) is provided as a requirements document to the External Certification Authorities (ECA). An ECA must implement key recovery policies, procedures, and mechanisms that
Government CA Government AA. Certification Practice Statement
PKI Belgium Government CA Government AA Certification Practice Statement 2.16.56.1.1.1.3 2.16.56.1.1.1.3.2 2.16.56.1.1.1.3.3 2.16.56.1.1.1.3.4 2.16.56.1.1.1.6 2.16.56.1.1.1.6.2 2.16.56.9.1.1.3 2.16.56.9.1.1.3.2
BUYPASS CLASS 3 SSL CERTIFICATES Effective date: 11.06.2013
CERTIFICATE POLICY BUYPASS CLASS 3 SSL CERTIFICATES Effective date: 11.06.2013 PUBLIC Version: 2.0 Document date: 11.05.2013 Buypass AS Nydalsveien 30A, PO Box 4364 Nydalen Tel.: +47 23 14 59 00 E-mail:
DigiCert Certification Practice Statement
DigiCert Certification Practice Statement DigiCert, Inc. Version 2.22 June 01, 2005 333 South 520 West Orem, UT 84042 USA Tel: 1-801-805-1620 Fax: 1-801-705-0481 www.digicert.com 1 General...7 1.1 DigiCert,
CA Certificate Policy. SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT
CA Certificate Policy SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT This page is intentionally left blank. 2 ODETTE CA Certificate Policy Version Number Issue Date Changed By 1.0 1 st April 2009 Original
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
RAPIDPIV-I Credential Service Certification Practice Statement Redacted
James D. Campbell Digitally signed by James D. Campbell DN: c=us, cn=james D. Campbell Date: 2014.06.18 10:45:03-07'00' RAPIDPIV-I Credential Service Certification Practice Statement Redacted Key Information:
TACC ROOT CA CERTIFICATE POLICY
TACC ROOT CA CERTIFICATE POLICY AND CERTIFICATE PRACTICES STATEMENT (In RFC 3647 format) January 20, 2009 OID: 1.3.6.1.4.1.17940.5.1.1.1 Version 1.2 1 INTRODUCTION... 3 1.1 Overview...3 1.2 Document Name
Swiss Government Root CA II. Document OID: 2.16.756.1.17.3.21.1
Swiss Government Root CA II CP/CPS End-user Certificates Swiss Government PKI - Root CA II Certificate Policy and Certification Practice Statement (CP/CPS) Document OID: 2.16.756.1.17.3.21.1 Project Name:
e-mudhra CPS e-mudhra CERTIFICATION PRACTICE STATEMENT VERSION 2.1 (emcsl/e-mudhra/doc/cps/2.1) Date of Publication: 11 February 2013
e-mudhra CPS e-mudhra CERTIFICATION PRACTICE STATEMENT VERSION 2.1 (emcsl/e-mudhra/doc/cps/2.1) Date of Publication: 11 February 2013 e-mudhra emudhra Consumer Services Ltd., 3rd Floor, Sai Arcade, Outer
Comodo Certification Practice Statement
Comodo Certification Practice Statement Notice: This CPS should be read in conjunction with the following documents:- * LiteSSL addendum to the Certificate Practice Statement * Proposed Amendments to the
Version 2.4 of April 25, 2008
TC TrustCenter GmbH Certificate Policy for SAFE NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This Certificate Policy is published in conformance with international
TeliaSonera Root CA v1 Certificate Practice Statement. Published by: TeliaSonera AB
2007-10-18 1 (46) TeliaSonera Root CA v1 Certificate Practice Statement Published by: TeliaSonera AB Company Information Created Modified Approved Valid from 2007-10-12 Reg. office: Printed Coverage Business
Certification Practice Statement. Internet Security Research Group (ISRG)
Certification Practice Statement Internet Security Research Group (ISRG) Version 1.0 Updated May 5, 2015 Approved by ISRG Policy Management Authority Web Site: https://letsencrypt.org Page 1 of 11 Copyright
REVENUE ON-LINE SERVICE CERTIFICATE POLICY. Document Version 1.2 Date: 15 September 2007. OID for this CP: 1.2.372.980003.1.1.1.1.
REVENUE ON-LINE SERVICE CERTIFICATE POLICY Document Version 1.2 Date: 15 September 2007 OID for this CP: 1.2.372.980003.1.1.1.1.1 No part of this document may be copied, reproduced, translated, or reduced
CERTIFICATION PRACTICE STATEMENT. EV SSL CA Certification Practice Statement
CERTIFICATION PRACTICE STATEMENT EV SSL CA Certification Practice Statement Emmanuel Montacutelli September 1, 2015 OpenTrust_DMS_EV Statement SSL CA Certification Practice Manage d Services Signature
InCommon Certification Practices Statement. Client Certificates
InCommon Certification Practices Statement for Client Certificates 14 February 2011 Version 1.0 Latest version: 14 February 2011 This version: 14 February 2011 Table of Contents 1 INTRODUCTION... 4 1.1
KSRegistry DNSSEC Policy Statement
KSRegistry DNSSEC Policy Statement 1. INTRODUCTION...5 1.1 Overview...5 1.2 Document name and identification...5 1.3. Community and Applicability...5 1.3.1 Registry...5 1.3.2 Registrars...5 1.3.3 Registrants...6
SECOM Trust.net Root1 CA
CERTIFICATE POLICY/ CERTIFICATION PRACTICE STATEMENT May 22, 2006 Version 2.00 SECOM Trust Systems Co.,Ltd. Revision History Version Date Description V1.00 2003.08.01 Initial Draft (Translated from Japanese
Operational Research Consultants, Inc. Non Federal Issuer. Certificate Policy. Version 1.0.1
Operational Research Consultants, Inc. Non Federal Issuer Certificate Policy Version 1.0.1 Operational Research Consultants, Inc. 11250 Waples Mill Road South Tower, Suite 210 Fairfax, Virginia 22030 June
ENTRUST CERTIFICATE SERVICES
ENTRUST CERTIFICATE SERVICES Certification Practice Statement Version: 2.13 February 12, 2016 2016 Entrust Limited. All rights reserved. Revision History Issue Date Changes in this Revision 1.0 May 26,
Certification Practice Statement
Certification Practice Statement Version 2.0 Effective Date: October 1, 2006 Continovation Services Inc. (CSI) Certification Practice Statement 2006 Continovation Services Inc. All rights reserved. Trademark
