18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

10 CERTIFICATE, CRL, AND OCSP FORMATS<br />

This section contains the formats for the various <strong>PKI</strong> objects such as certificates, CRLs, and<br />

OCSP requests and responses. The section only contains certificate profiles based on RSA.<br />

For algorithm identifiers, parameter encoding, public key encoding, and signature encoding for<br />

ECDSA and ECDH, RFC3279 shall be used.<br />

<strong>Certificate</strong>s and CRLs issued under a policy OID of this CP shall not contain any critical<br />

extensions not listed in the profiles in this section. <strong>Certificate</strong>s and CRLs issued under a policy<br />

OID of this CP may contain non-critical extensions not listed in the profiles in this section only<br />

upon RPMA approval.<br />

First entries in the caIssuers field of the AIA extension and CRL DP shall point to a resource<br />

that is publicly available using HTTP. If LDAP pointers are used, they shall appear only after<br />

the HTTP pointers.<br />

For attribute values other than dc: All CA Distinguished Names (in various fields such as Issuer,<br />

Subject, Subject Alternative Name, Name constraints, etc.) shall be encoded as printable string.<br />

All subscriber DN portions that name constraints apply to, shall be encoded as printable string.<br />

Other portions of the subscriber DN shall be encoded as printable string if possible. If a portion<br />

cannot be encoded as printable string, then and only then shall it be encoded using a different<br />

format and that format shall be UTF8.<br />

For dc and email address attribute values: All dc attribute values shall be encoded as IA5<br />

string.<br />

CAs may issue partitioned CRL as long as the CRLs are not indirect CRL, are not partitioned by<br />

reason code, and CRL DP and Issuing Distribution Point do not assert name relative to issuer.<br />

If the Entity <strong>PKI</strong> provides OCSP services for a CA, that CA must also issue a full and complete<br />

CRL (i.e., a CRL without Issuing Distribution Point extension) for the use by the OCSP<br />

Responder.<br />

85 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!