18.11.2012 Views

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

Raytheon Company Public Key Infrastructure (PKI) Certificate Policy

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

10.9 Medium Assurance Code Signing <strong>Certificate</strong><br />

Field Value<br />

Version V3 (2)<br />

Serial Number Must be unique<br />

Issuer Signature Algorithm sha-1WithRSAEncryption {1 2 840 113549 1 1 5} or<br />

sha256 WithRSAEncryption {1 2 840 113549 1 1 11}<br />

Issuer Distinguished Name ou=class3, o=CAs, dc=raytheon, dc=com<br />

Validity Period No longer than 3 years from date of issue expressed in UTCTime until<br />

2049<br />

Subject Distinguished Name Unique X.500 subject DN within the namespace dc=raytheon, dc=com<br />

as specified in Section 7.1.4 of the <strong>Raytheon</strong> CP<br />

Subject <strong>Public</strong> <strong>Key</strong><br />

2048 bit RSA key modulus, rsaEncryption<br />

Information<br />

Issuer’s Signature sha-1WithRSAEncryption {1 2 840 113549 1 1 5} or<br />

sha256 WithRSAEncryption {1 2 840 113549 1 1 11}<br />

Extension Value<br />

Authority <strong>Key</strong> Identifier c=no; Octet String (same as subject key identifier in MASCA certificate )<br />

Subject <strong>Key</strong> Identifier c=no; Octet String (same as in PKCS#10 request or calculated by the<br />

MASCA)<br />

<strong>Key</strong> Usage c=yes; digitalSignature; nonRepudiation<br />

Private <strong>Key</strong> Usage Period c=no; 2 years for 2048 bit keys<br />

Extended key usage c=yes; { iso(1) identified-organization(3) dod(6) internet(1) security(5)<br />

mechanisms(5) pkix(7) id-kp(3) id-kp-codesigning (3) }<br />

<strong>Certificate</strong> Policies 22 c=no;<br />

SHA1: {1.3.6.1.4.1.1569.10.1.2} or {1.3.6.1.4.1.1569.10.1.4} or<br />

SHA256: {1.3.6.1.4.1.1569.10.1.12} or {1.3.6.1.4.1.1569.10.1.14}<br />

Authority Information Access c=no; id-ad-caIssuers access method entry contains HTTP URL for .p7c<br />

file containing certificates issued to MASCA or LDAP URL pointer to the<br />

ca<strong>Certificate</strong> attribute of the MASCA; id-ad-ocsp access method entry<br />

contains HTTP URL for the MASCA OCSP Responder<br />

Subject Alternative Name DN of the person controlling the code signing private key; RFC822 email<br />

address of role (optional)<br />

Subject Directory Attributes c=no; Entrust User Role= integer, where integer is a numeric role<br />

identifier<br />

CRL Distribution Points 23 c=no<br />

22<br />

<strong>Certificate</strong> Policies will be asserted such that all lower assurance policies will also be asserted. (For<br />

example if 10.4 is asserted 10.5 will also be asserted).<br />

23<br />

The CRL distribution point extension shall only populate the distributionPoint field. The<br />

distributionPoint field shall contain HTTP (i.e., of the form http://…) URI. The distributionPoint field may<br />

contain LDAP (i.e., of the form ldap://…) URI. The reasons and cRLIssuer fields shall not be populated.<br />

The CRL shall point to a full and complete CRL or a Distribution Point based partitioned CRL. The<br />

Distribution Point field shall contain a full name (i.e, the Distribution Point field shall not contain<br />

nameRelativetoCRLIssuer).<br />

97 7/25/2011

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!