18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.9.8 Maximum Latency for CRLs<br />

The maximum delay between the time a Subscriber certificate is revoked by a CA and the time<br />

that this revocation information is available to Relying Parties shall be no greater than 24 hours.<br />

4.9.9 Online Revocation Checking Availability<br />

In addition to CRLs, CAs and Relying Party client software may optionally support on-line status<br />

checking. Client software using on-line status checking need not obtain or process CRLs.<br />

CSAs shall function in a manner that ensures that:<br />

� Accurate and up-to-date information from the authorized CA is used to provide the<br />

revocation status;<br />

� Revocation status responses provide authentication and integrity services<br />

commensurate with the assurance level of the certificate being checked.<br />

If on-line revocation/status checking is supported by a CA, the latency of certificate status<br />

information distributed on-line by the CA or its delegated status responders shall meet or<br />

exceed the requirements for CRL issuance as stated in 4.9.7.<br />

4.9.10 Online Revocation Checking Requirements<br />

CAs are not required to operate a CSA covering the certificates they issue. The <strong>Raytheon</strong> <strong>PKI</strong><br />

Repository shall contain and publish a list of all CSAs operated by the <strong>Raytheon</strong> <strong>PKI</strong>.<br />

Relying Parties may optionally use on-line status checking. Since <strong>Raytheon</strong> operates in some<br />

environments that cannot accommodate on-line communications, all CAs shall be required to<br />

support CRLs. Client software using on-line revocation checking need not obtain or process<br />

CRLs.<br />

4.9.11 Other Forms of Revocation Advertisements Available<br />

Any alternate forms used to disseminate revocation information shall be implemented in a<br />

manner consistent with the security and latency requirements for the implementation of CRLs<br />

and on-line revocation and status checking.<br />

4.9.11.1 Checking Requirements for Other Forms of Revocation<br />

Advertisements<br />

No stipulation.<br />

4.9.12 Special Requirements Related To <strong>Key</strong> Compromise<br />

None beyond those stipulated in Section 4.9.7.<br />

4.9.13 Circumstances for Suspension<br />

Suspension shall be permitted for certificates issued under the medium-hardware or medium-<br />

CBP-hardware policies only, in the event that a user’s token is temporarily unavailable to them.<br />

4.9.14 Who can Request Suspension<br />

A human subscriber, human supervisor of a human subscriber, HR person for the human<br />

subscriber, issuing CA, or RA may request suspension of a certificate.<br />

39 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!