Dual Use Certificate Addendum to the Comodo Certification Practice Statement v.3.0



Similar documents
High Assurance SSL Sub CA Addendum to the Comodo Certification Practice Statement v.3.0

ECC Certificate Addendum to the Comodo EV Certification Practice Statement v.1.03

Certificate Warranty Plan Addendum to the Comodo Certification Practice Statement v.3.0

Enterprise Public Key Infrastructure (EPKI) Manager. Version 3.5

Comodo Certification Practice Statement

Web Host Reseller Program

Comodo Certification Practice Statement

Comodo Extended Validation (EV) Certification Practice Statement

Comodo Certification Practice Statement

DigiCert Certification Practice Statement

Class 3 Registration Authority Charter

Comodo Extended Validation (EV) Certification Practice Statement

EBIZID CPS Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.14 Effective Date: September 9, 2015

apple WWDR Certification Practice Statement Version 1.8 June 11, 2012 Apple Inc.

TELSTRA RSS CA Subscriber Agreement (SA)

Comodo Certificate Manager Software Version 4.6

Comodo One Software Version 1.8

Gandi CA Certification Practice Statement

Importing and using your Personal Authentication Certificate with Djigzo for Android

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Importing and exporting your certificate using Internet Explorer

EuropeanSSL Secure Certification Practice Statement

Using etoken for Securing s Using Outlook and Outlook Express

Importing your Personal Authentication Certificate to Android Devices

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Globe Hosting Certification Authority Globe Hosting, Inc. 501 Silverside Road, Suite 105, Wilmington, DE 19809, County of New Castle, United States

SSL.com Certification Practice Statement

Public Key Infrastructure

HKUST CA. Certification Practice Statement

PCI Security Compliance

Domain Control Validation in Comodo Certificate Manager

Danske Bank Group Certificate Policy

How To Understand And Understand The Security Of A Key Infrastructure

Certification Practice Statement

Tel: Tel: +44 (0) Comodo Group.

TeliaSonera Server Certificate Policy and Certification Practice Statement

GEOSURE PROTECTION PLAN

Certificate Policy and Certification Practice Statement CNRS/CNRS-Projets/Datagrid-fr

Comodo ONE Software Version 1.8

Key Management and Distribution

TATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-3 CERTIFICATE SERVER / DEVICE CERTIFICATE

Vodafone Group CA Web Server Certificate Policy

Transnet Registration Authority Charter

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Comodo Certificate Manager Version 5.4

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Extended Validation SSL

VeriSign Trust Network Certificate Policies

CS 356 Lecture 28 Internet Authentication. Spring 2013

Advantage Security Certification Practice Statement

Eskom Registration Authority Charter

Certificate Policy and Certification Practice Statement

Wakefield Council Secure and file transfer User guide for customers, partners and agencies

Importing and Using your Personal Authentication Certificate with Outlook 2010 / 2013

Importing and Using your Personal Authentication Certificate with Mac OS X Mail / Apple Mail

Comodo Certificate Manager Software Version 4.8

Bugzilla ID: Bugzilla Summary:

esign Online Digital Signature Service

IBM Client Security Solutions. Client Security User's Guide

TeliaSonera Public Root CA. Certification Practice Statement. Revision Date: Version: Rev A. Published by: TeliaSonera Sverige AB

Technical Certificates Overview

TR-GRID CERTIFICATION AUTHORITY

Microsoft Trusted Root Certificate: Program Requirements

Ford Motor Company CA Certification Practice Statement

Comodo Certificate Manager Software Version 5.0

Purchase and Import a Signed SSL Certificate

TR-GRID CERTIFICATION AUTHORITY

thawte Certification Practice Statement Version 2.3

Capitalized terms not defined below shall have the meaning given to them in the applicable CP/CPS, unless the context requires otherwise.

Ciphermail S/MIME Setup Guide

Symantec Trust Network (STN) Certificate Policy

Registration Practices Statement. Grid Registration Authority Approved December, 2011 Version 1.00

COMODO CERTIFICATE SUBSCRIBER AGREEMENT

Chapter 7 Managing Users, Authentication, and Certificates

Certification Practice Statement

Learn More Cloud Extender Requirements Cheat Sheet

Comodo Certificate Manager. Comodo Enterprise

Importing and Using your Personal Authentication Certificate with Mozilla SeaMonkey Client (PC)

CERTIFICATION PRACTICE STATEMENT UPDATE

GlobalSign Customers. Enterprise PKI Client Authentication User Guide. Employing authentication as an additional security layer to the EPKI platform

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Controller of Certification Authorities of Mauritius

APPLICATION FOR DIGITAL CERTIFICATE

CLASS - III Digital Signature Certificate Application Check List (To be filled by applicant)

GlobalSign Digital IDs for Adobe AIR Code Signing

StartCom Certification Authority

Purpose of PKI PUBLIC KEY INFRASTRUCTURE (PKI) Terminology in PKIs. Chain of Certificates

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7

Managing the OATS Certificate

Transcription:

Dual Use ertificate Addendum to the omodo ertification Practice Statement v.3.0 omodo A, Ltd. Dual Use ertificate Addendum to Version 3.0 Amendments 13 March 2008 3rd Floor, ffice Village, Exchange Quay, Trafford Road Salford, Manchester, M5 3EQ, United Kingdom www.comodogroup.com

Beginning April 1, 2008, omodo A Ltd. ( omodo ) will offer a new type of certificate called Dual Use ertificates. These certificates are high assurance identification certificates will be issued by omodo and its RA s through the omodo ertificate Manager software to Subscribers. The purpose of this Addendum to the omodo ertification Practice Statement ( APS ) is to amend version 3.0 of the omodo ertification Practice Statement ( PS ) to include information and details on how these certificates will work, the purposes of the new program, and the validation procedures behind the certificates issued using the ertificate Manager. All provisions of the PS not specifically amended or added herein remain in full force and effect and where applicable shall apply to the new product offerings. nly the amended portions in this APS are included herein. Nothing in the PS shall be deemed omitted, deleted or amended unless expressly stated in this APS. Headings from the PS are included to identify the location of the Amended information, and are not intended to be duplicative. 1 General 1.4 ther Practice Statements omodo Dual Use ertificate Subscriber Agreement 1.8 omodo PKI Hierarchy Public omodo Repository 1.8.12 Dual Use ertificates UTN-USERFirst-lient Authentication and Email (serial number = 44 be 0c 8b 50 00 24 b4 11 d3 36 25 25 67 c9 89, expiry = 09 July 2019 18:36:58) End Entity (serial number = x, expiry = 1 month or up to 10 year(s) from issuance) 2.4 Types of omodo ertificates e) omodo Dual Use ertificates omodo Dual Use ertificates are high assurance certificates used as email and identification certificates that are issued through the ertificate Manager software to the end users of the ertificate Manager subscriber. These certificates are used for secure remote access to the subscriber s computer networks by its employees, agents, and contractors as well as providing these individuals with secure email services. In accordance with section 4.2.12 (Validation Practices), validation procedures of applicants for omodo Dual Use ertificates are by having the ertificate Applicant appear before an agent of the A, RA, or before a notary public or other official with comparable authority within the Applicant s jurisdiction.

2.6 Subscriber Private Key Generation Process omodo Dual Use ertificate requests are generated by omodo on the omodo Servers. The omodo ertificate Manager software generates the private key on behalf of the end user and delivers the private key and certificate to the end user. 2.9.7 omodo Dual Use ertificates omodo Dual Use ertificates are downloaded by the subscribers from the omodo ertificate Manager Software. 2.12.4 ertificate Policy (P) omodo Secure Server ertificate Secure Email ertificate (Free Version) / Secure Email ertificate (orporate Version) / ustom lient ertificates / omodo TF / Dual Use ertificates Signature Algorithm Sha1 Issuer (option 1) Issuer (option 2) Issuer (option 3) Validity Subject (for Free version) N omodo lass 3 Security Services A U (c) 2002 omodo A Limited U Terms and onditions of use: http://www.comodo.net/repository U omodo Trust Network omodo Limited GB N UTN-USERFirst-lient Authentication and Email U http://www.usertrust.com The USERTRUST Network L Salt Lake ity S UT US N omodo lass 3 Security Services A U (c) 2006 omodo A Limited U Terms and onditions of use: http://www.comodo.com/repository U omodo Trust Network omodo A Limited GB 1 year / 2 year / 3 year E Email address N ommon Name (name of subscriber) U (c)2003 omodo Limited U Terms and onditions of use: http://www.comodo.net/repository

Subject (for orporate version) Subject (for ustom lient. omodo TF version, and Dual Use ertificates) Authority Key Identifier Key Usage (Nonritical) (Free Version nly) Key Usage (Nonritical) (orporate and ustom lient versions) Netscape ertificate Type (orporate Version nly) Netscape ertificate Type (Free and ustom lient versions) Basic onstraint ertificate Policies RL Distribution Policies (nly for certificates issued by omodo lass 3 Security Services A ) U omodo Trust Network - PERSNA NT VALIDATED E Email address N ommon Name (name of subscriber) U orporate Secure Email U (0 or 1 Hosted by [Web Host Reseller Subscriber Name] of) Issued through [EPKI Manager Subscriber Name] Provided by [Powered SSL Subscriber Name] rganization U rganization Unit L Locality STREET Street S State Postalode Zip or Postal ode ountry All fields are customizable on a per-certificate basis. KeyID only is specified. Secure Email (1.3.6.1.5.5.7.3.4) Unknown Key Usage (1.3.6.1.4.1.6449.1.3.5.2) Secure Email (1.3.6.1.5.5.7.3.4) lient Authentication (1.3.6.1.5.5.7.3.2) SSL lient Authentication, SMIME (a0) SMIME(20) Subject Type = End Entity Path Length onstraint = None [1] ertificate Policy: PolicyIdentifier = 1.3.6.1.4.1.6449.1.2.1.3.5 [1,1]Policy Qualifier Info: Policy Qualifier Id = PS Qualifier: https://secure.comodo.net/ps [1]RL Distribution Point Distribution Point Name: Full Name: URL=<Primary DP URL> [2]RL Distribution Point Distribution Point Name: Full Name: URL=<Secondary DP URL> [3]RL Distribution Point Distribution Point Name: Full Name: RF822 Name=<RL Request Email Address>

Authority Information Access (omitted when Issuing A is omodo lass 3 Security Services A ) Subject Alternate Name (omitted from ustom lient version) Thumbprint Algorithm [1]Authority Info Access Access Method=ertification Authority Issuer (1.3.6.1.5.5.7.48.2) Alternative Name: URL=<Primary AIA URL> [2]Authority Info Access Access Method=ertification Authority Issuer (1.3.6.1.5.5.7.48.2) Alternative Name: URL=<Secondary AIA URL> RF822 Name = email address SHA1 Thumbprint 4.1 ertificate Application Requirements All ertificate applicants must complete the enrolment process, which may include: Generate a RSA key pair and demonstrate to omodo ownership of the private key half of the key pair through the submission of a valid PKS#10 ertificate Signing Request (SR) (or SPKA request for certain omodo TF or Dual Use certificates) Make all reasonable efforts to protect the integrity the private key half of the key pair Submit to omodo a certificate application, including application information as detailed in this PS, a public key half of a key pair, and agree to the terms of the relevant subscriber agreement Provide proof of identity through the submission of official documentation as requested by omodo during the enrolment process omodo Dual Use ertificate End User or Administrator of Subscriber Subscriber omodo 4.2.12 omodo Dual Use ertificates Validation procedures of applicants for omodo Dual Use ertificates are performed by omodo or an RA. Authentication is based on the physical presence of the Applicant before an agent of the A or RA or before a notary or other official with comparable authority. The agent, notary, or other official is responsible for checking the identity of the Applicant. An RA may issue the ertificate to its own employees and users if the organization authenticates the employment of the employee and the employee s authorization to obtain a ertificate. Verification by omodo is based on the confirmation of the identity of the Applicant in connection with their Application..

5.31 ertificate Insurance Plan omodo Dual Use ertificate $0 $0 Document ontrol This document is the Dual Use ertificate Addendum to omodo PS Version 3.0, created on 25 March 2008 and signed off by the omodo ertificate Policy Authority. omodo A Limited 3rd Floor, ffice Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United Kingdom URL: http://www.comodogroup.com Email: legal@comodogroup.com Tel: +44 (0) 161 874 7070 Fax: +44 (0) 161 877 1767 opyright Notice opyright omodo A Limited 2008. All rights reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without prior written permission of omodo Limited. Requests for any other permission to reproduce this omodo document (as well as requests for copies from omodo) must be addressed to: omodo A Limited 3rd Floor, ffice Village, Exchange Quay, Trafford Road, Salford, Manchester, M5 3EQ, United Kingdom