11.07.2015 Views

Internet X.509 Public Key Infrastructure (PKI) Proxy ... - Clizio.com

Internet X.509 Public Key Infrastructure (PKI) Proxy ... - Clizio.com

Internet X.509 Public Key Infrastructure (PKI) Proxy ... - Clizio.com

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

RFC 3820 <strong>X.509</strong> <strong>Proxy</strong> Certificate Profile June 2004For example, a <strong>Proxy</strong> Issuer MAY use a sequentially assigned integeror a UUID to assign a unique serial number to a PC it issues. Or a<strong>Proxy</strong> Issuer MAY use a SHA-1 hash of the PC public key to assign aserial number with a high probability of uniqueness.3.4. SubjectThe subject field of a <strong>Proxy</strong> Certificate MUST be the issuer field(that is the subject of the <strong>Proxy</strong> Issuer) appended with a singleCommon Name <strong>com</strong>ponent.The value of the Common Name SHOULD be unique to each <strong>Proxy</strong>Certificate bearer amongst all <strong>Proxy</strong> Certificates with the sameissuer.If a <strong>Proxy</strong> Issuer issues two proxy certificates to the same bearer,the <strong>Proxy</strong> Issuer MAY choose to use the same Common Name for both.Examples of this include <strong>Proxy</strong> Certificates for different uses (e.g.,signing vs encryption) or the re-issuance of an expired <strong>Proxy</strong>Certificate.The <strong>Proxy</strong> Issuer MAY use an approach to assigning Common Name valuesthat merely ensures a high probability of uniqueness. This value MAYbe the same value used for the serial number.The result of this approach is that all subject names of <strong>Proxy</strong>Certificates are derived from the name of the issuing EEC (it will bethe first part of the subject name appended with one or more CN<strong>com</strong>ponents) and are unique to each bearer.3.5. Subject Alternative NameThe subjectAltName extension MUST NOT be present in a <strong>Proxy</strong>Certificate.3.6. <strong>Key</strong> Usage and Extended <strong>Key</strong> UsageIf the <strong>Proxy</strong> Issuer certificate has a <strong>Key</strong> Usage extension, theDigital Signature bit MUST be asserted.This document places no constraints on the presence or contents ofthe key usage and extended key usage extension. However, section 4.2explains what functions should be allowed a proxy certificate by arelying party.Tuecke, et al. Standards Track [Page 13]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!