Amazon Trust Services Certificate Policy
Total Page:16
File Type:pdf, Size:1020Kb
Certificate Policy Version 1.0.9 1 1 INTRODUCTION ................................................................................................................................................... 13 1.1 Overview ...................................................................................................................................................... 13 1.1.1 Compliance ............................................................................................................................................ 13 1.1.2 Types of Certificates .............................................................................................................................. 13 1.1.2.1 CA-Certificates .............................................................................................................................. 13 1.1.2.1.1 Missing Heading ........................................................................................................................ 14 1.1.2.1.2 Missing Heading ........................................................................................................................ 14 1.1.2.1.3 Terminus CA-Certificates .......................................................................................................... 14 1.1.2.1.4 Policy CA-Certificates ................................................................................................................ 14 1.1.2.1.5 Technically Constrained CA-Certificates ................................................................................... 14 1.1.2.1.6 Unconstrained CA-Certificates.................................................................................................. 14 1.1.2.1.7 Root CA-Certificates .................................................................................................................. 14 1.1.2.1.8 Subordinate CA-Certificates ..................................................................................................... 14 1.1.2.2 End-Entity Certificates................................................................................................................... 14 1.1.2.2.1 Extended Validation TLS Server Authentication Certificates .................................................... 14 1.1.2.2.2 Standard Validation TLS Server Authentication Certificates .................................................... 14 1.1.2.2.3 Extended Validation Code Signing Certificates ......................................................................... 14 1.1.2.2.4 Standard Validation Code Signing Certificates ......................................................................... 15 1.1.2.2.5 Client Certificates (including Augmented Client Certificates) .................................................. 15 1.1.2.2.6 OCSP Signing Certificate ........................................................................................................... 15 1.1.2.2.7 Time Stamp Authority Certificate ............................................................................................. 15 1.1.2.3 Subscriber Certificates .................................................................................................................. 15 1.2 Document name and identification ............................................................................................................. 15 1.3 PKI participants ............................................................................................................................................ 15 1.3.1 Certification authorities ......................................................................................................................... 15 1.3.2 Registration authorities ......................................................................................................................... 15 1.3.3 Subscribers ............................................................................................................................................. 16 1.3.4 Relying parties ....................................................................................................................................... 16 1.3.5 Other participants .................................................................................................................................. 17 1.4 Certificate usage .......................................................................................................................................... 17 1.4.1 Appropriate certificate uses .................................................................................................................. 17 1.4.2 Prohibited certificate uses ..................................................................................................................... 17 1.5 Policy administration ................................................................................................................................... 17 1.5.1 Organization administering the document ............................................................................................ 18 1.5.2 Contact person....................................................................................................................................... 18 2 1.5.3 Person determining CPS suitability for the policy .................................................................................. 18 1.5.4 CPS approval procedures ....................................................................................................................... 18 1.6 Definitions and acronyms ............................................................................................................................ 18 1.6.1 Definitions .............................................................................................................................................. 18 1.6.2 Acronyms ............................................................................................................................................... 26 1.6.3 References ............................................................................................................................................. 27 1.6.4 Conventions ........................................................................................................................................... 28 2 PUBLICATION AND REPOSITORY RESPONSIBILITIES ............................................................................................ 28 2.1 Repositories ................................................................................................................................................. 28 2.2 Publication of certification information....................................................................................................... 28 2.3 Time or frequency of publication ................................................................................................................ 29 2.4 Access controls on repositories ................................................................................................................... 29 3 IDENTIFICATION AND AUTHENTICATION ............................................................................................................ 29 3.1 Naming ......................................................................................................................................................... 29 3.1.1 Types of names ...................................................................................................................................... 29 3.1.2 Need for names to be meaningful ......................................................................................................... 29 3.1.3 Anonymity or pseudonymity of subscribers .......................................................................................... 29 3.1.4 Rules for interpreting various name forms ............................................................................................ 29 3.1.5 Uniqueness of names............................................................................................................................. 29 3.1.6 Recognition, authentication, and role of trademarks ............................................................................ 29 3.2 Initial identity validation .............................................................................................................................. 29 3.2.1 Method to prove possession of private key .......................................................................................... 30 3.2.2 Authentication of Organization and Domain Identity ........................................................................... 30 3.2.2.1 Identity .......................................................................................................................................... 30 3.2.2.2 DBA/Tradename............................................................................................................................ 30 3.2.2.3 Verification of Country .................................................................................................................. 30 3.2.2.4 Validation of Domain Authorization or Control ............................................................................ 31 3.2.2.4.1 Validating the Applicant as a Domain Contact ......................................................................... 31 3.2.2.4.2 Email, Fax, SMS, or Postal Mail to Domain Contact .................................................................