18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

establishing how the applicant is known to the verifier as required by this certificate<br />

policy;<br />

� The applicant shall present one valid National Government-issued photo ID (e.g.<br />

passport), or two valid non-National Government IDs, one of which shall be a recent<br />

photo ID (e.g., Drivers License).<br />

� Unique identifying numbers from the Identifier (ID) of the verifier and from an ID of<br />

the applicant;<br />

� The date and time of the verification, and;<br />

� A declaration of identity signed by the applicant using a handwritten signature or<br />

equivalent and performed in the presence of the person performing the identity<br />

authentication, using the format set forth at 28 U.S.C 1746 (declaration under penalty<br />

of perjury) or comparable procedure under local law.<br />

Practice Note: Examples of signatures equivalent to handwritten signature are a<br />

good fingerprint or other adequate biometric that can be linked to the individual<br />

identity. Another example of a signature equivalent to handwritten signature is digital<br />

signature that can be verified using a certificate provided to the same identity.<br />

However, that certificate must not be the same certificate for whose issuance the<br />

identity proofing is being performed.<br />

Identity shall be established by in-person proofing before the RA or Trusted Agent; information<br />

provided shall be verified to ensure legitimacy. Requirements for authentication of individual<br />

identity using an in-person antecedent are listed in Section 3.2.3.3.<br />

3.2.3.1 Authentication of Component Identities<br />

Some computing and communications devices (applications, routers, firewalls, servers, etc.)<br />

shall be named as certificate subjects. In such cases, the device shall have a human sponsor.<br />

The <strong>PKI</strong> sponsor shall be responsible for providing the following registration information:<br />

� Equipment identification (e.g., serial number) or service name (e.g., DNS name)<br />

� Equipment public keys<br />

� Equipment authorizations and attributes (if any are to be included in the certificate)<br />

� Contact information to enable the CA or RA to communicate with the sponsor when<br />

required<br />

� The registration information shall be verified to an assurance level commensurate<br />

with the certificate assurance level being requested. Acceptable methods for<br />

performing this authentication and integrity checking include, but are not limited to:<br />

o Verification of digitally signed messages sent from the sponsor (using certificates<br />

of equivalent or greater assurance than that being requested).<br />

o In person registration by the sponsor, with the identity of the sponsor confirmed<br />

in accordance with the requirements of Section 3.2.3.<br />

3.2.3.2 Human Subscriber Re-Authentication<br />

If a human subscriber credentials containing the private keys associated with the public key<br />

certificates are lost, damaged, or stolen, the subscriber may be issued new certificates using the<br />

process described in this section. However, the validity period of the certificates issued using<br />

this process shall not exceed the identity-reproofing requirements in Section 3.3.1.<br />

Alternatively, the subscriber can undergo an initial identity proofing process described in Section<br />

3.2.3.<br />

25 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!