18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

present proof of identity to Trusted Agents or Registration Authorities, to agree to the Subscriber<br />

Agreement, and to sign it with a handwritten signature.<br />

4.2 <strong>Certificate</strong> Application Processing<br />

It is the responsibility of the CA and RA to verify that the information in certificate applications is<br />

accurate. The CPS shall specify procedures to verify information in certificate applications.<br />

4.2.1 Performing Identification and Authentication Functions<br />

For the cross-certificate issued by the RRCA, the identification and authentication of the<br />

applicant representing the Entity CA shall be performed by the <strong>Raytheon</strong> Operational Authority.<br />

For the <strong>Raytheon</strong> CAs, the identification and authentication of the applicant representing the<br />

<strong>Raytheon</strong> CA shall be performed by the <strong>Raytheon</strong> Operational Authority.<br />

For end entity certificates issued by the <strong>Raytheon</strong> Signing CA, the identification and<br />

authentication of the Subscriber must meet the requirements specified for Subscriber<br />

authentication as specified in Sections 3.2 and 3.3 of this CP.<br />

Prior to certificate issuance, a Subscriber shall be required to sign a document containing the<br />

requirements the Subscriber shall protect the private key and use the certificate and private key<br />

for authorized purposes only.<br />

4.2.2 Approval or Rejection of <strong>Certificate</strong> Applications<br />

For a CA certificate application, the RPMA may approve or reject a certificate application.<br />

For subscriber certificates, the Trusted Agent, RA or CA may approve or reject a certificate<br />

application.<br />

4.2.3 Time to Process <strong>Certificate</strong> Applications<br />

The entire subscriber registration process (i.e., from initial application to identity proofing to<br />

certificate issuance) shall take no more than 30 days.<br />

No stipulation for the CA application registration process.<br />

4.3 <strong>Certificate</strong> Issuance<br />

Upon receiving a request for a certificate, the CA or RA shall respond in accordance with the<br />

requirements set forth in this CP and the applicable CPS.<br />

The certificate request may contain an already built ("to-be-signed") certificate. This certificate<br />

shall not be signed until the process set forth in this CP and the applicable CPS has been met.<br />

While the Subscriber may do most of the data entry, it is still the responsibility of the CA and the<br />

RA to verify that the information is correct and accurate. This may be accomplished through a<br />

system approach linking trusted databases containing personnel information, other equivalent<br />

authenticated mechanisms, or through personal contact with the Subscriber’s sponsoring<br />

organization. If databases are used to confirm Subscriber information, then these databases<br />

must be protected from unauthorized modification to a level commensurate with the level of<br />

assurance of the certificate being sought. Specifically, the databases shall be protected using<br />

physical security controls, personnel security controls, cryptographic security controls, computer<br />

security controls, and network security controls specified for the RA elsewhere in this CP.<br />

32 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!