Globalsign Certificate Policy
Total Page:16
File Type:pdf, Size:1020Kb
GlobalSign Certificate Policy Date: December 29, 2020 Effective date for Qualified Timestamping, Qualified Web Authentication Certificates, Qualified Certificates for Electronic Signatures and Qualified Certificates for Electronic Seals: {normal date + 2 weeks} Version: v6.6 Table of Contents TABLE OF CONTENTS ................................................................................................................................ 2 DOCUMENT HISTORY ............................................................................................................................... 8 ACKNOWLEDGMENTS .............................................................................................................................10 1.0 INTRODUCTION ...........................................................................................................................11 1.1 OVERVIEW ........................................................................................................................................ 12 Additional requirements for Trusted Root Issuer CAs ............................................................ 15 1.2 DOCUMENT NAME AND IDENTIFICATION ................................................................................................. 16 1.3 PKI PARTICIPANTS .............................................................................................................................. 21 Certification Authorities (“Issuer CAs”) .................................................................................. 21 Registration Authorities ......................................................................................................... 21 Subscribers ............................................................................................................................. 22 Relying Parties ....................................................................................................................... 23 Other Participants .................................................................................................................. 23 1.4 CERTIFICATE USAGE ............................................................................................................................ 23 Appropriate Certificate Usage ............................................................................................... 23 Prohibited Certificate Usage .................................................................................................. 23 1.5 POLICY ADMINISTRATION ..................................................................................................................... 24 Organization Administering the Document ........................................................................... 24 Contact Person ....................................................................................................................... 24 Person Determining CP Suitability for the Policy ................................................................... 24 CP Approval Procedures ......................................................................................................... 24 1.6 DEFINITIONS AND ACRONYMS ............................................................................................................... 25 2.0 PUBLICATION AND REPOSITORY RESPONSIBILITIES .....................................................................34 2.1 REPOSITORIES .................................................................................................................................... 34 2.2 PUBLICATION OF CERTIFICATE INFORMATION ........................................................................................... 34 2.3 TIME OR FREQUENCY OF PUBLICATION .................................................................................................... 34 2.4 ACCESS CONTROLS ON REPOSITORIES ..................................................................................................... 34 3.0 IDENTIFICATION AND AUTHENTICATION .....................................................................................34 3.1 NAMING ........................................................................................................................................... 35 Types of Names...................................................................................................................... 35 Need for Names to be Meaningful ........................................................................................ 35 Anonymity or Pseudonymity of Subscribers ........................................................................... 35 Rules for Interpreting Various Name Forms .......................................................................... 35 Uniqueness of Names ............................................................................................................ 35 Recognition, Authentication, and Role of Trademarks .......................................................... 35 3.2 INITIAL IDENTITY VALIDATION ................................................................................................................ 35 Method to Prove Possession of Private Key ........................................................................... 35 Authentication of Organization Identity ................................................................................ 35 Authentication of Individual identity ..................................................................................... 37 Non-Verified Subscriber Information ..................................................................................... 41 Validation of Authority .......................................................................................................... 41 Criteria for Interoperation ..................................................................................................... 43 Authentication of Domain Name ........................................................................................... 43 Authentication of Email addresses ........................................................................................ 43 3.3 IDENTIFICATION AND AUTHENTICATION FOR RE-KEY REQUESTS .................................................................... 43 Identification and Authentication for Routine Re-key ........................................................... 43 Identification and Authentication for Reissuance after Revocation ...................................... 44 Re-verification and Revalidation of Identity When Certificate Information Changes ............ 44 Identification and Authentication for Re-key After Revocation ............................................. 44 3.4 IDENTIFICATION AND AUTHENTICATION FOR REVOCATION REQUEST ............................................................. 44 GlobalSign CP (Certificate Policy) 2 of 81 Version: 6.6 4.0 CERTIFICATE LIFE CYCLE OPERATIONAL REQUIREMENTS .............................................................45 4.1 CERTIFICATE APPLICATION .................................................................................................................... 45 Who Can Submit a Certificate Application ............................................................................. 45 Enrollment Process and Responsibilities ................................................................................ 45 4.2 CERTIFICATE APPLICATION PROCESSING .................................................................................................. 45 Performing Identification and Authentication Functions ....................................................... 45 Approval or Rejection of Certificate Applications .................................................................. 45 Time to Process Certificate Applications ................................................................................ 46 4.3 CERTIFICATE ISSUANCE ........................................................................................................................ 46 CA Actions during Certificate Issuance .................................................................................. 46 Notifications to Subscriber by the CA of Issuance of Certificate ............................................ 46 Notification to North American Energy Standards Board (NAESB) Subscribers by the CA of Issuance of Certificate ........................................................................................................................... 46 4.4 CERTIFICATE ACCEPTANCE .................................................................................................................... 46 Conduct Constituting Certificate Acceptance ........................................................................ 46 Publication of the Certificate by the CA ................................................................................. 46 Notification of Certificate Issuance by the CA to Other Entities ............................................ 46 4.5 KEY PAIR AND CERTIFICATE USAGE ......................................................................................................... 46 Subscriber Private Key and Certificate Usage ........................................................................ 46 Relying Party Public Key and Certificate Usage ..................................................................... 47 4.6 CERTIFICATE RENEWAL .......................................................................................................................