High Assurance SSL Sub CA Addendum to the Comodo Certification Practice Statement v.3.0
|
|
|
- Junior Horton
- 9 years ago
- Views:
Transcription
1 High Assurance SSL Sub A Addendum to the omodo ertification Practice Statement v.3.0 omodo A, Ltd. High Assurance SSL Sub-A Addendum to Version 3.0 Amendments 21 ctober rd Floor, ffice Village, Exchange Quay, Trafford Road Salford, Manchester, M5 3EQ, United Kingdom
2 Begining ctober 29, 2008, omodo A Ltd. ( omodo ) will begin to issue High Assurance SSL ertificates from its omodo High Assurance Secure Server A intermediary certificate. The purpose of this Addendum to the omodo ertification Practice Statement ( APS ) is to amend version 3.0 of the omodo ertification Practice Statement ( PS ) to include the hierarchy and crl addresses for the certificate chain. All provisions of the PS not specifically amended or added herein remain in full force and effect and where applicable shall apply to the new product offerings. nly the amended portions in this APS are included herein. Nothing in the PS shall be deemed omitted, deleted or amended unless expressly stated in this APS. Headings from the PS are included to identify the location of the Amended information and are not intended to be duplicative. 1 General 1.8 omodo PKI Hierarchy year certificates (InstantSSL and EnterpriseSSL) Entrust ertificates Entrust.net Secure Server ertification Authority (serial number = 37 4a d2 43, expiry = 25 MAY 2019) Entrust omodo Intermediate - TBA (serial number = TBA, expiry = TBA) GTE ertificates End Entity SSL/End Entity Secure (serial number = x, expiry = 1, 2 or 3 years from issuance) GTE ybertrust Root (serial number = 01A5, expiry = 14 August 2018) omodo lass 3 Security Services A (serial number = A, expiry = 27 August 2012) End Entity SSL/End Entity Secure (serial number = x, expiry = 1, 2 or 3 years from issuance) UTN/AddTrust certificates InstantSSL and EnterpriseSSL A Visible on IE compatible browsers as follows: UTN-USERFIRST-Hardware (serial number = 44 be 0c 8b b4 11 d3 36 2a fe 65 0a fd, expiry = 09 July :19:22) End Entity SSL/End Entity Secure (serial number = x, expiry = 1 month or up to 10 year(s) from issuance) ross signed and therefore visible on Netscape compatible browsers as follows: AddTrust External A Root (serial number = 01, expiry = 30/05/ :48:38)
3 UTN-USERFirst-Hardware (serial number = 48 4b ac f1 aa c7 d d1 a , expiry = 30 May :48:38) End Entity SSL/End Entity Secure (serial number = x, expiry = 1 month or up to 10 year(s) from issuance) omodo ertification Authority ertificates Visible on IE compatible browsers as follows: MD ertification Authority (serial number = 4e 81 2d 8a e0 0b 02 ee 3e e5 3d, expiry = 31 Dec ember :59:59 MD High Assurance Secure Server A (serial number = 08 0a c c6f5 e1 4f 19 b c , expiry = 31 December :59:59) End Entity SSL ertificate (serial number = x, expiry = 1 month or up to 5 year(s) from issuance) ross signed and therefore visible on Netscape compatible browsers as follows: AddTrust External A Root (serial number = 01, expiry = 30/05/ :48:38) MD ertification Authority (serial number = 4e 81 2d 8a e0 0b 02 ee 3e e5 3d, expiry = 31 Dec ember :59:59 MD High Assurance Secure Server A (serial number = 08 0a c c6f5 e1 4f 19 b c , expiry = 31 December :59:59) End Entity SSL ertificate (serial number = x, expiry = 1 month or up to 5 year(s) from issuance) omodo SG / Platinum SG / Multi-Domain certificates UTN ertificates Visible on IE compatible browsers as follows: UTN - DATAorp SG (serial number = 44 be 0c 8b b4 11 d3 2a a9 ad 69, expiry = 24 June :06:40) End Entity SSL (serial number = x, expiry = 1 month or up to 10 year(s) from issuance) ross signed and therefore visible on Netscape compatible browsers as follows: AddTrust External A Root (serial number = 01, expiry = 30/05/ :48:38) UTN - DATAorp SG (serial number = 53 7b f 29 7f 14 dc e9 22 ad 2c 79, expiry = 30 May :48:38) End Entity SSL (serial number = x, expiry = 1 month or up to 10 year(s) from issuance) omodo ertification Authority ertificates Visible on IE compatible browsers as follows: UTN - DATAorp SG (serial number = 44 be 0c 8b b4 11 d3 2a a9 ad 69, expiry = 24 June :06:40)
4 MD ertification Authority (serial number = 4e 81 2d 8a e0 0b 02 ee 3e e5 3d, expiry = 31 Dec ember :59:59 MD High Assurance Secure Server A (serial number = 08 0a c c6f5 e1 4f 19 b c , expiry = 31 December :59:59) End Entity SSL ertificate (serial number = x, expiry = 1 month or up to 5 year(s) from issuance) ross signed and therefore visible on Netscape compatible browsers as follows: AddTrust External A Root (serial number = 01, expiry = 30/05/ :48:38) UTN - DATAorp SG (serial number = 53 7b f 29 7f 14 dc e9 22 ad 2c 79, expiry = 30 May :48:38) MD ertification Authority (serial number = 4e 81 2d 8a e0 0b 02 ee 3e e5 3d, expiry = 31 Dec ember :59: Relying Parties MD High Assurance Secure Server A (serial number = 08 0a c c6f5 e1 4f 19 b c , expiry = 31 December :59:59) End Entity SSL ertificate (serial number = x, expiry = 1 month or up to 5 year(s) from issuance) To verify the validity of a digital certificate they receive, relying parties must refer to the ertificate Revocation List (RL) or SP response prior to relying on information featured in a certificate to ensure that omodo has not revoked the certificate. The RL location is detailed within the certificate. SP responses are sent through the omodo SP responder Root A Signing Key Protection and Recovery 90 omodo ertification Authority 153 omodo High Assurance Secure Server A High Assurance SSL ertificates Intermediate for High Assurance SSL ertificates 31 Dec Dec omodo Directories, Repository and ertificate Revocation Lists omodo manages and makes publicly available directories of revoked certificates using ertificate Revocation Lists (RLs). All RLs issued by omodo are X.509v2 RLs, in particular as profiled in RF3280. Users and relying parties are strongly urged to consult the directories of
5 revoked certificates at all times prior to relying on information featured in a certificate. omodo updates and publishes a new RL every 24 hours or more frequently under special circumstances. The RL for end entity certificates can be accessed via the following URLs: crl omodo operates an SP service at omodo s SP responder conforms to RF Revocation information is made immediately available through the SP services. The SP responder and responses are available 24x ertificate Policy (P) omodo Secure Server ertificates InstantSSL / ProSSL / PremiumSSL / PremiumSSL Wildcard / EliteSSL /GoldSSL / PlatinumSSL / PlatinumSSL Wildcard / PremiumSSL Legacy / PremiumSSL Legacy Wildcard / PlatinumSSL Legacy / PlatinumSSL Legacy Wildcard / PlatinumSSL SG Legacy / PlatinumSSL SG Legacy Wildcard / omodo SG SSL / omodo SG SSL Wildcard / Trial SSL / Intranet SSL / ther SSL ertificates Signature Algorithm Issuer (option 1) (not for any SG type) Issuer (option 2) (not for any SG type) Issuer (option 3) for SG types only. Issuer (option 4) (not for any SG type) Issuer (option 5) Sha1 N N L S N L S N N omodo lass 3 Security Services A (c) 2002 omodo Limited Terms and onditions of use: omodo Trust Network omodo Limited GB UTN-USERFIRST-Hardware The USERTRUST Network Salt Lake ity UT US UTN - DATAorp SG The USERTRUST Network Salt Lake ity UT US omodo lass 3 Security Services A (c) 2006 omodo A Limited Terms and onditions of use: omodo Trust Network omodo A Limited GB omodo High Assurance Secure Server A 2008 omodo A Limited
6 Validity Subject Authority Key Identifier Key Usage (Nonritical) Extended Key Usage (Additional usages for SG types only) Netscape ertificate Type Basic onstraint ertificate Policies Terms and onditions of use: omodo Trust Network omodo A Limited GB 1 year / 2 year / 3 year / 4 year / 5 year N ommon Name InstantSSL / ProSSL/PremiumSSL / PremiumSSL Wildcard / EliteSSL /GoldSSL / PlatinumSSL / PlatinumSSL Wildcard / PremiumSSL Legacy / PremiumSSL Legacy Wildcard / PlatinumSSL Legacy / PlatinumSSL Legacy Wildcard / PlatinumSSL SG Legacy / PlatinumSSL SG Legacy Wildcard / omodo SG SSL / omodo SG SSL Wildcard / ther SSL ertificate name / Powered SSL product name (0 or 1 Hosted by [Web Host Reseller Subscriber Name] of) Issued through [EPKI Manager Subscriber Name] (for Intranet SSL only) (for Trial SSL only) L STREET S Postalode Provided by [Powered SSL Subscriber Name] INTRANET USE NLY N WARRANTY ATTAHED MPANY NT VALIDATED TEST USE NLY - N WARRANTY ATTAHED rganization rganization Unit Locality Street State Zip or Postal ode ountry KeyID only is specified. Digital Signature, Key Encipherment(A0) Server Authentication ( ) lient Authentication ( ) Microsoft SG ( ) Netscape SG ( ) SSL lient Authentication, SSL Server Authentication(c0) Subject Type = End Entity Path Length onstraint = None [1] ertificate Policy: PolicyIdentifier = [1,1]Policy Qualifier Info: Policy Qualifier Id = PS Qualifier:
7 RL Distribution Policies [1]RL Distribution Point Distribution Point Name: Full Name: URL=<Primary DP URL> [2]RL Distribution Point Distribution Point Name: Full Name: URL=<Secondary DP URL> (only when the Issuing A is omodo lass 3 Security Services A ) Authority Information Access (omitted when Issuing A is omodo lass 3 Security Services A ) (non-critical) Thumbprint Algorithm Thumbprint [3]RL Distribution Point Distribution Point Name: Full Name: RF822 Name=<RL Request Address> [1]Authority Info Access Access Method = id-ad-caissuers ( ) URL=<Primary AIA URL> [2]Authority Info Access Access Method = id-ad-ocsp ( ) URL = SHA1 omodo MD Signature Algorithm Issuer (ption 1) Issuer (ption 2) Validity Subject Sha1 N UTN - DATAorp SG The USERTRUST Network L Salt Lake ity S UT US N omodo High Assurance Secure Server A 2008 omodo A Limited Terms and onditions of use: omodo Trust Network omodo A Limited GB 1 Year / 2 Year / 3 Year N ommon Name [Name Windows displays as Issued To Typically Entity Name like field] Hosted by [Web Host Reseller Subscriber Name] Issued through [EPKI Manager Subscriber Name] Provided by [Powered SSL Subscriber Name] rganisation rganisation Unit L Locality S Street ountry N Domain Name 1
8 N Domain Name 2 N Domain Name 3 (etc to Domain Name 100) N ommon Name [Name Windows displays as Issued To Typically Entity Name like field] Enhanced Key Usage Server Authentication ( ) lient Authentication ( ) Microsoft SG ( ) Netscape SG ( ) Key Usage (Nonritical) Digital Signature, Key Encipherment(A0) Netscape ertificate Type SSL lient Authentication, SSL Server Authentication(c0) Basic onstraint Subject Type=End Entity Path Length onstraint=none ertificate Policies [1]ertificate Policy: Policy Identifier= [1,1]Policy Qualifier Info: Policy Qualifier Id=PS Qualifier: RL Distribution Points [1]RL Distribution Point Distribution Point Name: Full Name: URL= <Primary DP URL> Authority Information Access (non-critical) [2]RL Distribution Point Distribution Point Name: Full Name: URL=<Secondary DP URL> [1]Authority Info Access Access Method = id-ad-caissuers ( ) URL=<Primary AIA URL> [2]Authority Info Access Access Method = id-ad-ocsp ( ) URL = Subject Alternate Name DNS Name=Domain Name 1 DNS Name=Domain Name 2 DNS Name=Domain Name 3.up to DNS Name=Domain Name 100 Thumbprint Algorithm Thumbprint Effect of Revocation SHA1 Upon revocation of a certificate, the operational period of that certificate is immediately considered terminated. The serial number of the revoked certificate will be placed within the ertificate Revocation List (RL) and remains on the RL until some time after the end of the certificate s validity period. An updated RL is published on the omodo website every 24 hours; however, under special circumstances the RL may be published more frequently. In addition, omodo s systems are configured to pre-generate SP responses using the private key of the certificate. This provides real-time information regarding the validity of the ertificate making the revocation information immediately available through the SP.
9 5.12 Reliance on Unverified Digital Signatures Parties relying on a digital certificate must verify a digital signature at all times by checking the validity of a digital certificate against the relevant RL published by omodo or using the omodo SP responder. Relying parties are alerted that an unverified digital signature cannot be assigned as a valid signature of the subscriber bligations of a Relying Party A party relying on a omodo certificate accepts that in order to reasonably rely on a omodo certificate they must: Minimize the risk of relying on a digital signature created by an invalid, revoked, expired or rejected certificate; the relying party must have reasonably made the effort to acquire sufficient knowledge on using digital certificates and PKI. Study the limitations to the usage of digital certificates and be aware through the Relying Party agreement the maximum value of the transactions that can be made using a omodo digital certificate. Read and agree with the terms of the omodo PS and relying party agreement. Verify a omodo certificate by referring to the relevant RL and the RLs of intermediate A and root A or by checking the SP response using the omodo SP responder. Trust a omodo certificate only if it is valid and has not been revoked or has expired. Rely on a omodo certificate, only as may be reasonable under the circumstances listed in this section and other relevant sections of this PS. Document ontrol This document is the High Assurance SSL Sub-A Addendum to omodo PS Version 3.0, created on 16 ctober 2008 and signed off by the omodo ertificate Policy Authority. omodo A Limited 3rd Floor, ffice Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United Kingdom URL: [email protected] Tel: +44 (0) Fax: +44 (0) opyright Notice opyright omodo A Limited All rights reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without prior written permission of omodo Limited. Requests for any other permission to reproduce this omodo document (as well as requests for copies from omodo) must be addressed to: omodo A Limited 3rd Floor, ffice Village, Exchange Quay, Trafford Road,
10 Salford, Manchester, M5 3EQ, United Kingdom
Dual Use Certificate Addendum to the Comodo Certification Practice Statement v.3.0
Dual Use ertificate Addendum to the omodo ertification Practice Statement v.3.0 omodo A, Ltd. Dual Use ertificate Addendum to Version 3.0 Amendments 13 March 2008 3rd Floor, ffice Village, Exchange Quay,
ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03
ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03 Comodo CA, Ltd. ECC Certificate Addendum to Comodo EV CPS v. 1.03 6 March 2008 3rd Floor, Office Village, Exchange Quay,
Comodo Certification Practice Statement
Comodo Certification Practice Statement Comodo CA, Ltd. Version 3.0 22 September 2006 3rd Floor, Office Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United Kingdom Tel: +44 (0) 161
Comodo Certification Practice Statement
Comodo Certification Practice Statement Comodo CA, Ltd. Version 4.0 Effective: 1 July 2012 3rd Floor, Office Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United Kingdom Tel: +44
Certificate Warranty Plan Addendum to the Comodo Certification Practice Statement v.3.0
Certificate Warranty Plan Addendum to the Comodo Certification Practice Statement v.3.0 Comodo CA, Ltd. Certificate Warranty Plan Addendum to Version 3.0 Amendments 13 January 2012 3rd Floor, Office Village,
Comodo Certification Practice Statement
Comodo Certification Practice Statement Notice: This CPS should be read in conjunction with the following documents:- * LiteSSL addendum to the Certificate Practice Statement * Proposed Amendments to the
DigiCert Certification Practice Statement
DigiCert Certification Practice Statement DigiCert, Inc. Version 2.22 June 01, 2005 333 South 520 West Orem, UT 84042 USA Tel: 1-801-805-1620 Fax: 1-801-705-0481 www.digicert.com 1 General...7 1.1 DigiCert,
EBIZID CPS Certification Practice Statement
EBIZID EBIZID CPS Certification Practice Statement Version 1.02 Contents 1 General 7 1.1 EBIZID 7 1.2 Digital Certificates 7 1.3 User Interaction for Selecting a Certification Service 7 1.4 EBIZID Registration
Comodo Extended Validation (EV) Certification Practice Statement
Comodo Extended Validation (EV) Certification Practice Statement Comodo CA, Ltd. Version 1.0 8 December 2006 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United
Comodo Extended Validation (EV) Certification Practice Statement
Comodo Extended Validation (EV) Certification Practice Statement Comodo CA, Ltd. Version 1.03 4th June 2007 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United
Domain Control Validation in Comodo Certificate Manager
Domain Control Validation in Comodo Certificate Manager The purpose of this document is to explain the new domain control validation (DCV) processes for the Comodo Certificate Manager. DCV is an industry
TELSTRA RSS CA Subscriber Agreement (SA)
TELSTRA RSS CA Subscriber Agreement (SA) Last Revision Date: December 16, 2009 Version: Published By: Telstra Corporation Ltd Copyright 2009 by Telstra Corporation All rights reserved. No part of this
Enterprise Public Key Infrastructure (EPKI) Manager. Version 3.5
Enterprise Public Key Infrastructure (EPKI) Manager For issuance & management of Enterprise - wide SSL Certificates & Secure Email (S/MIME) Certificates Introduction: Comodo s EPKI Manager is a web-based
Web Host Reseller Program
How To Use Your Account To Implement and Start Selling SSL Through The Web Host Program Version 2.4 Introduction: The Comodo Web Host Reseller Program gives you the unique ability to integrate the Comodo
www.enterprisessl.com www.comodo.com [email protected] Tel: +1 888 266 6361 Tel: +44 (0) 161 874 7070 2006 Comodo Group.
www.enterprisessl.com www.comodo.com [email protected] Tel: +1 888 266 6361 Tel: +44 (0) 161 874 7070 2006 Comodo Group. The Internet has created many new global business opportunities for enterprises
The IVE also supports using the following additional features with CA certificates:
1 A CA certificate allows you to control access to realms, roles, and resource policies based on certificates or certificate attributes. For example, you may specify that users must present a valid client-side
Public Key Infrastructure
UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported
Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates
Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Purpose, Methods, Revocation, PKIX To distribute public keys securely Requires - Certificates and Certification Authorities - Method for retrieving certificates
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
L@Wtrust Class 3 Registration Authority Charter
Class 3 Registration Authority Charter Version 1.0 applicable from 09 November 2010 Building A, Cambridge Park, 5 Bauhinia Street, Highveld Park, South Africa, 0046 Phone +27 (0)12 676 9240 Fax +27 (0)12
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Chapter 7 Managing Users, Authentication, and Certificates
Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,
Enterprise Public Key Infrastructure (EPKI) Manager Version 3.0
Enterprise Public Key Infrastructure (EPKI) Manager Version 3.0 For issuance & management of Enterprise-wide SSL Certificates & Secure Email (S/MIME) Certificates Introduction The EPKI Manager allows you
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)
Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series
User Guide Supplement S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series SWD-292878-0324093908-001 Contents Certificates...3 Certificate basics...3 Certificate status...5 Certificate
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
www.instantssl.com www.comodogroup.com [email protected] Tel: (877) COMODO-5 Tel: +44 (0) 161 874 7070 2002 Comodo Group.
www.instantssl.com www.comodogroup.com [email protected] Tel: (877) COMODO-5 Tel: +44 (0) 161 874 7070 2002 Comodo Group. The Internet has created many new global business opportunities for enterprises
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015 Table of Contents 1. Introduction... 5 1.1. Trademarks...
Comodo Certificate Manager. Comodo Enterprise
Comodo Certificate Manager Comodo Enterprise Challenges Enterprises lose track of the SSL certificates on their websites Expired SSL certificates go unnoticed, which leads to customers seeing browser error
apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.
Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.8 Effective Date: June 11, 2012 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2.
TeliaSonera Server Certificate Policy and Certification Practice Statement
TeliaSonera Server Certificate Policy and Certification Practice Statement v.1.4 TeliaSonera Server Certificate Policy and Certification Practice Statement CA name Validation OID TeliaSonera Server CA
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
Comodo Certificate Manager Software Version 4.6
Cert dialog Comodo Certificate Manager Software Version 4.6 MRAO Administrator Guide Guide Version 4.6.063014 Comodo CA Limited, 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater
Configuring Secure Socket Layer HTTP
Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Sockets Layer HTTP, page 1 Restrictions for Configuring the Switch for Secure Sockets Layer HTTP, page 2 Information
Transnet Registration Authority Charter
Registration Authority Charter Version 3.0 is applicable from Effective Date Inyanda House 21 Wellington Road Parktown, 2193 Phone +27 (0)11 544 9368 Fax +27 (0)11 544 9599 Website: http://www.transnet.co.za/
Certification Practice Statement
Certification Practice Statement Version 2.0 Effective Date: October 1, 2006 Continovation Services Inc. (CSI) Certification Practice Statement 2006 Continovation Services Inc. All rights reserved. Trademark
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Certificate Policy and Certification Practice Statement
DigiCert Certificate Policy and Certification Practice Statement DigiCert, Inc. Version 3.03 March 15, 2007 333 South 520 West Lindon, UT 84042 USA Tel: 1-801-805-1620 Fax: 1-801-705-0481 www.digicert.com
TeliaSonera Public Root CA. Certification Practice Statement. Revision Date: 2006-11-17. Version: Rev A. Published by: TeliaSonera Sverige AB
Document no 1/011 01-AZDA 102 213 TeliaSonera Sverige AB Certification Practice Statement Rev A TeliaSonera Public Root CA Certification Practice Statement Revision Date: 2006-11-17 Version: Rev A Published
EuropeanSSL Secure Certification Practice Statement
EuropeanSSL Secure Certification Practice Statement Eunetic GmbH Version 1.0 14 July 2008 Wagnerstrasse 25 76448 Durmersheim Tel: +49 (0) 180 / 386 384 2 Fax: +49 (0) 180 / 329 329 329 www.eunetic.eu TABLE
Using etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
Public Key Infrastructure for a Higher Education Environment
Public Key Infrastructure for a Higher Education Environment Eric Madden and Michael Jeffers 12/13/2001 ECE 646 Agenda Architectural Design Hierarchy Certificate Authority Key Management Applications/Hardware
Eskom Registration Authority Charter
REGISTRATION WWW..CO.ZA Eskom Registration Authority Charter Version 2.0 applicable from 20 November 2009 Megawatt Park Maxwell Drive Sunninghill, SOUTH AFRICA, 2157 Phone +27 (0)11 800 8111 Fax +27 (0)11
COMODO CERTIFICATE SUBSCRIBER AGREEMENT
COMODO CERTIFICATE SUBSCRIBER AGREEMENT IMPORTANT PLEASE READ THIS CERTIFICATE SUBSCRIBER AGREEMENT CAREFULLY BEFORE APPLYING FOR, ACCEPTING, OR USING A COMODO CERTIFICATE. BY USING, APPLYING FOR, OR ACCEPTING
Comodo Certificate Manager Version 5.4
Comodo Certificate Manager Version 5.4 Comodo Certificate Authority Proxy Server Architectural Overview Guide Version 5.4.031816 Comodo CA Limited 3rd Floor, 26 Office Village, Exchange Quay, Trafford
Microsoft Trusted Root Certificate: Program Requirements
Microsoft Trusted Root Certificate: Program Requirements 1. Introduction The Microsoft Root Certificate Program supports the distribution of root certificates, enabling customers to trust Windows products.
Configuring Digital Certificates
CHAPTER 36 This chapter describes how to configure digital certificates and includes the following sections: Information About Digital Certificates, page 36-1 Licensing Requirements for Digital Certificates,
Technical Certificates Overview
Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good
SSL.com Certification Practice Statement
SSL.com Certification Practice Statement SSL.com Version 1.0 February 15, 2012 2260 W Holcombe Blvd Ste 700 Houston, Texas, 77019 US Tel: +1 SSL-CERTIFICATE (+1-775-237-8434) Fax: +1 832-201-7706 www.ssl.com
Gandi CA Certification Practice Statement
Gandi CA Certification Practice Statement Gandi SAS 15 Place de la Nation Paris 75011 France Version 1.0 TABLE OF CONTENTS 1.INTRODUCTION...10 1.1.Overview...10 1.2.Document Name and Identification...10
Djigzo S/MIME setup guide
Author: Martijn Brinkers Table of Contents...1 Introduction...3 Quick setup...4 Create a CA...4 Fill in the form:...5 Add certificates for internal users...5 Add certificates for external recipients...7
Certificate technology on Pulse Secure Access
Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client
This section includes troubleshooting topics about certificates.
This section includes troubleshooting topics about certificates. Cannot Remove or Overwrite Existing, page 1 Cannot Remove an SSO IdP Certificate, page 2 Certificate Chain Error, page 2 Certificate Does
Certificate technology on Junos Pulse Secure Access
Certificate technology on Junos Pulse Secure Access How-to Introduction:... 1 Creating a Certificate signing request (CSR):... 1 Import Intermediate CAs: 3 Using Trusted Client CA on Juno Pulse Secure
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013
www.novell.com/documentation Administration Guide Certificate Server 3.3.8 May 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Integrated SSL Scanning
Version 9.2 SSL Enhancements Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
Comodo Certificate Manager Software Version 4.5
Comodo Certificate Manager Software Version 4.5 Windows Auto Enrollment Setup Guide Guide Version 4.5.052714 Comodo CA Limited 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater
StartCom Certification Authority
StartCom Certification Authority Intermediate Certification Authority Policy Appendix Version: 1.5 Status: Final Updated: 05/04/11 Copyright: Start Commercial (StartCom) Ltd. Author: Eddy Nigg Introduction
Integrated SSL Scanning
Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive
RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0
Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
User Guide. MailMarshal Secure 5.5. August 2006
User Guide MailMarshal Secure 5.5 August 2006 THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON-DISCLOSURE AGREEMENT.
Certification Practice Statement
FernUniversität in Hagen: Certification Authority (CA) Certification Practice Statement VERSION 1.1 Ralph Knoche 18.12.2009 Contents 1. Introduction... 4 1.1. Overview... 4 1.2. Scope of the Certification
Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States
Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States www.globessl.com TABLE OF CONTENTS 1. INTRODUCTION...
thawte Certification Practice Statement Version 2.3
thawte Certification Practice Statement Version 2.3 Effective Date: July, 2006 thawte Certification Practice Statement 2006 thawte, Inc. All rights reserved. Printed in the United States of America. Revision
associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], buttyan@crysys.
Foundations for secure e-commerce (bmevihim219) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) [email protected], [email protected]
Websense Content Gateway HTTPS Configuration
Websense Content Gateway HTTPS Configuration web security data security email security Support Webinars 2010 Websense, Inc. All rights reserved. Webinar Presenter Title: Sr. Tech Support Specialist Cisco
Neutralus Certification Practices Statement
Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3
Ford Motor Company CA Certification Practice Statement
Certification Practice Statement Date: February 21, 2008 Version: 1.0.1 Table of Contents Document History... 1 Acknowledgments... 1 1. Introduction... 2 1.1 Overview... 3 1.2 Ford Motor Company Certificate
ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example
ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example Document ID: 98596 Contents Introduction Prerequisites Requirements Components Used Conventions Configure
GEOSURE PROTECTION PLAN
GEOSURE PROTECTION PLAN I. SCOPE/INTRODUCTION The GeoSure Protection Plan is designed to provide protection against economic loss resulting from specific types of risks associated with certain SSL Certificates
Key Management and Distribution
Key Management and Distribution Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] udio/video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Bugzilla ID: Bugzilla Summary:
Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)
CA Certificate Policy. SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT
CA Certificate Policy SCHEDULE 1 to the SERVICE PROVIDER AGREEMENT This page is intentionally left blank. 2 ODETTE CA Certificate Policy Version Number Issue Date Changed By 1.0 1 st April 2009 Original
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES
OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES Table of contents 1.0 SOFTWARE 1 2.0 HARDWARE 2 3.0 TECHNICAL COMPONENTS 2 3.1 KEY MANAGEMENT
Comodo Certificate Manager. Centrally Managing Enterprise Security, Trust & Compliance
Centrally Managing Enterprise Security, Trust & Compliance SSL Certificate Management - PKI With an ever-increasing abundance of web-enabled, collaborative and mobile applications, as well as netaccessible
Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr
Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr Version 0.3 August 2002 Online : http://www.urec.cnrs.fr/igc/doc/datagrid-fr.policy.pdf Old versions Version 0.2 :
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
InCommon Certification Practices Statement. Server Certificates
InCommon Certification Practices Statement for Server Certificates 16 August 2010 Version 1.0 Latest version: https://www.incommon.org/cert/repository/cps_ssl.pdf This version: https://www.incommon.org/cert/repository/cps_ssl_20100816.pdf
Vodafone Group CA Web Server Certificate Policy
Vodafone Group CA Web Server Certificate Policy Publication Date: 06/09/10 Copyright 2010 Vodafone Group Table of Contents Acknowledgments... 1 1. INTRODUCTION... 2 1.1 Overview... 3 1.2 Document Name
Comodo Certificate Manager Software Version 5.0
Comodo Certificate Manager Software Version 5.0 SSL Web Service API Guide Version 5.0.042015 Comodo CA Limited 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Security. 2014 Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -
Security - 1 - OPC UA - Security Security Access control Wide adoption of OPC SCADA & DCS Embedded devices Performance Internet Scalability MES Firewalls ERP Communication between distributed systems OPC
Understanding Digital Certificates and Secure Sockets Layer (SSL)
Understanding Digital Certificates and Secure Sockets Layer (SSL) Author: Peter Robinson January 2001 Version 1.1 Copyright 2001-2003 Entrust. All rights reserved. Digital Certificates What are they?
SSL Certificates Enrollment, Collection, Installation and Renewal Release Date: May, 2015
Version 5.4 SSL Certificates Enrollment, Collection, Installation and Renewal Release Date: May, 2015 InCommon c/o Internet2 1000 Oakbrook Drive, Suite 300 Ann Arbor MI, 48104 Enrolling For Your Certificate
Comodo 2048 bit SSL Certificates. Security for your online business now and long into the future
Security for your online business now and long into the future Today, online commerce is worth over US $1 trillion and continues to grow at a substantial rate. are an indispensable cornerstone of this
SharePoint Password Change & Expiration 3.0 User Guide
SharePoint Password Change & Expiration 3.0 User Guide Copyright Copyright 2008-2013 BoostSolutions Co., Ltd. All rights reserved. All materials contained in this publication are protected by Copyright
