18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.2 Document Identification<br />

There are eight levels of assurance in this <strong>Certificate</strong> <strong>Policy</strong>, which are defined in subsequent<br />

sections. Each level of assurance has an OID, to be asserted in certificates issued by the<br />

RRCA and the CAs subordinate to the RRCA, which comply with the policy stipulations herein.<br />

The OIDs are registered under the id-infosec arc as follows:<br />

{iso(1) org(3) dod(6) internet(1) private(4) enterprise(1) <strong>Raytheon</strong>(1569) pki(10) certificatepolicy(1)}<br />

id-raytheon ::= 1.3.6.1.4.1.1569<br />

id-pki ::= { id-<strong>Raytheon</strong>-10}<br />

id-certificate-policy ::= { id-pki-1}<br />

id-raytheon-high ::= {<strong>Raytheon</strong>-certificate-policy-1}<br />

id-raytheon-mediumHardware ::= {<strong>Raytheon</strong>-certificate-policy-2}<br />

id-raytheon-mediumSoftware ::= {<strong>Raytheon</strong>-certificate-policy-3}<br />

id-raytheon-mediumCBPHardware ::= {<strong>Raytheon</strong>-certificate-policy-4}<br />

id-raytheon-mediumCBPSoftware ::= {<strong>Raytheon</strong>-certificate-policy-5}<br />

id-raytheon-lowHardware ::= {<strong>Raytheon</strong>-certificate-policy-6}<br />

id-raytheon-lowSoftware ::= {<strong>Raytheon</strong>-certificate-policy-7}<br />

id-raytheon-SHA2-high ::= {<strong>Raytheon</strong>-certificate-policy-11}<br />

id-raytheon-SHA2-mediumHardware ::= {<strong>Raytheon</strong>-certificate-policy-12}<br />

id-raytheon-SHA2-mediumSoftware ::= {<strong>Raytheon</strong>-certificate-policy-13}<br />

id-raytheon-SHA-2-mediumCBPHardware ::= {<strong>Raytheon</strong>-certificate-policy-14}<br />

id-raytheon-SHA2-mediumCBPSoftware ::= {<strong>Raytheon</strong>-certificate-policy-15}<br />

id-raytheon-test ::= {<strong>Raytheon</strong>-certificate-policy-20}<br />

Unless otherwise stated, a requirement stated in this CP applies to all assurance levels.<br />

All of the requirements for “id-raytheon-SHA2…..” are the same as those for the corresponding<br />

certificate policy OID without “SHA2-” in it except that the CAs not asserting “id-raytheon-<br />

SHA2…..” may use SHA-1 for generation of <strong>PKI</strong> objects such as certificates, <strong>Certificate</strong><br />

Revocation Lists (CRLs) and Online <strong>Certificate</strong> Status Protocol (OCSP) responses after<br />

December 31, 2010. For example:<br />

14 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!