18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Table of Contents<br />

1 INTRODUCTION .......................................................................................................... 11<br />

1.1 Overview ....................................................................................................................... 12<br />

1.1.1 <strong>Certificate</strong> <strong>Policy</strong> (CP) ............................................................................................. 12<br />

1.1.2 Relationship between this CP & the <strong>Raytheon</strong> CPS ............................................... 12<br />

1.1.3 Scope ...................................................................................................................... 13<br />

1.2 Document Identification .............................................................................................. 14<br />

1.3 <strong>PKI</strong> Participants ........................................................................................................... 16<br />

1.3.1 <strong>PKI</strong> Authorities ......................................................................................................... 16<br />

1.3.2 Registration Authority (RA) ...................................................................................... 18<br />

1.3.3 Subscribers ............................................................................................................. 18<br />

1.3.4 Relying Parties ........................................................................................................ 19<br />

1.3.5 Other Participants .................................................................................................... 19<br />

1.3.6 Applicability ............................................................................................................. 19<br />

1.4 <strong>Certificate</strong> Usage .......................................................................................................... 20<br />

1.4.1 Appropriate <strong>Certificate</strong> Uses ................................................................................... 20<br />

1.4.2 Prohibited <strong>Certificate</strong> Uses ...................................................................................... 20<br />

1.5 <strong>Policy</strong> Administration .................................................................................................. 21<br />

1.5.1 Organization administering the document ............................................................... 21<br />

1.5.2 Contact Person ........................................................................................................ 21<br />

1.5.3 Person Determining Certification Practice Statement Suitability for the <strong>Policy</strong> ....... 21<br />

1.5.4 CPS Approval Procedures ...................................................................................... 21<br />

1.5.5 Waivers ................................................................................................................... 21<br />

2 PUBLICATION & <strong>PKI</strong> REPOSITORY RESPONSIBILITES .................................................... 22<br />

2.1 <strong>PKI</strong> Repositories .......................................................................................................... 22<br />

2.1.1 Repository Obligations ............................................................................................ 22<br />

2.2 <strong>Public</strong>ation of <strong>Certificate</strong> Information ........................................................................ 22<br />

2.2.1 <strong>Public</strong>ation of CA Information .................................................................................. 22<br />

2.2.2 Interoperability ......................................................................................................... 22<br />

2.3 Time or Frequency of <strong>Public</strong>ation .............................................................................. 22<br />

2.4 Access Controls on <strong>PKI</strong> Repositories ....................................................................... 22<br />

3 IDENTIFICATION & AUTHENTICATION ........................................................................... 23<br />

3.1 Naming .......................................................................................................................... 23<br />

3.1.1 Types of Names ...................................................................................................... 23<br />

3.1.2 Need for Names to be Meaningful ........................................................................... 23<br />

3.1.3 Anonymity or Pseudonymity of Subscribers ............................................................ 23<br />

3.1.4 Rules for Interpreting Various Name Forms ............................................................ 23<br />

3.1.5 Uniqueness of Names ............................................................................................. 23<br />

3 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!