![Treasury X.509 Certificate Policy [TREASURYCP].” It Only Addresses Where an OLT PKI’S Requirements Differ from the Requirements for Basic Assurance in [TREASURYCP]](https://data.docslib.org/img/3a60ab92a6e30910dab9bd827208bcff-1.webp)
<p><strong>UNCLASSIFIED </strong></p><p><strong>UNITED STATES </strong><br><strong>DEPARTMENT OF THE </strong><br><strong>TREASURY </strong></p><p><strong>DEPARTMENT OF THE TREASURY </strong><br><strong>PUBLIC KEY INFRASTRUCTURE (PKI) X.509 CERTIFICATE POLICY </strong><br><strong>VERSION 3.4 April 27, 2021 </strong></p><p>Digitally signed by Daniel W. Wood </p><p>Daniel W. Wood </p><p>Date: 2021.04.27 10:48:30 -04'00' </p><p>PKI Policy Management Authority (PMA) DANIEL W. WOOD <br>DATE </p><p>1</p><p><strong>UNCLASSIFIED </strong></p><p>DOCUMENT VERSION CONTROL <br>Version </p><p>2.0 </p><ul style="display: flex;"><li style="flex:1">Date </li><li style="flex:1">Author(s) </li><li style="flex:1">Description </li><li style="flex:1">Reason For Change </li></ul><p>Bring the Treasury PKI Policy into compliance with FPKIPA change proposal requiring all cross certified PKI Policies to be in RFC 3647 format. <br>Department of the Treasury PKI Policy in <br>RFC </p><ul style="display: flex;"><li style="flex:1">January 2008 </li><li style="flex:1">James Schminky </li></ul><p>3647 format. </p><p>As a result of mapping the Treasury <br>PKI Policy to Federal Policy, a number of minor changes and omissions where identified and corrected. <br>Errata changes to sections <br>2.2.1, <br>2.1 </p><p>2.2 <br>March 17, 2009 March 11, 2010 <br>James Schminky James Schminky <br>4.8, 4.912, 5.5, and <br>7.1.3. </p><p>As a result of the PMA annual review a number of minor <br>Errata changes to sections <br>5.6, and 6.3.2. Change proposal changes to 2.4, 4.2.2, 5.1, 5.1.1 5.1.2.1, 5.4.4, 5.4.5, 6.1.6, 6.5.1, and 6.7. corrections, Federal Bridge Certification Authority (FBCA) Policy Change Proposal Number: <br>2009-02 and 2010-01, and Treasury <br>Change Proposal </p><p>Change proposal changes As a result of FBCA Policy Change <br>2.3 </p><p>2.4 <br>April 15, 2010 March 22, 2011 <br>James Schminky James Schminky </p><ul style="display: flex;"><li style="flex:1">to 8.1 and 8.4. </li><li style="flex:1">Proposal Number: 2010-02. </li></ul><p>Changes Proposal Changes to 1.3.1.8, <br>3.1.1&.2, 3.1.5, 3.2.3.1, 4.7, 6.1.5, 8.1, and 9.4.3. <br>As a result of FBCA Policy Change Proposal Numbers; 2010-3 thru 8 and CPCA policy Change Proposal <br>Number: 2011-1 </p><p>Made changes to align the <br>Treasury CP with the Common Policy Framework (CPF), removed </p><p>allreference to the acronym “DoT” </p><p>and replaced with the name </p><p>“Treasury”. </p><p>Changes Proposal <br>Changes to 3.2.3.2 and <br>4.9.7 </p><ul style="display: flex;"><li style="flex:1">2.5 </li><li style="flex:1">September 11,2012 </li><li style="flex:1">Daniel Wood </li></ul><p>Daniel Wood <br>Changes Proposal <br>Changes to <br>1.2, 3.2.3.2, 6.1.5, <br>6.2.3, <br>Made changes to align the Treasury CP with the CPF, <br>2.6 2.7 2.8 <br>October 15, 2012 August 22, 2013 March 26, 2015 <br>6.2.4.2, and 6.2.8. </p><p>1.3, 1.3.1, 1.3.1.1, 1.3.1.2, <br>1.3.1.3, 1.3.1.4, 1.3.1.5, </p><p>1.5.2, and 3.2.3.2. <br>Fred Asomani- <br>Atinkah <br>Made changes to align the Treasury CP with the CPF, </p><p>Clarified Treasury’s dual </p><p></p><ul style="display: flex;"><li style="flex:1">role as Federal Legacy and </li><li style="flex:1">Provide capabilities to customers </li></ul><p>SSP; Added PIV-I, role- and baseline update as requested by <br>Daniel Wood, Terry McBride based, and group </p><p>certificates <br>FPKIPA </p><p>2</p><p><strong>UNCLASSIFIED </strong></p><p>Adds PIV-I, andInternal <br>PKI OIDs, changed criteria for suspension, defined the PKIProgram Team, added theinternal PKI addendum, changes to Common/FederalCPs and editorial updates <br>Changes to Treasury PKI based on user needs </p><ul style="display: flex;"><li style="flex:1">2.9 </li><li style="flex:1">March 25, 2017 </li><li style="flex:1">Daniel Wood </li></ul><p>Update based on TOCA Compliance Audit and introduction of the Fed Key Recovery Policyand other Common and Federal Bridge policy changes <br>Correct minorerrors and maintain compliance withFed PKI (through </p><ul style="display: flex;"><li style="flex:1">2.91 </li><li style="flex:1">November 20, 2018 </li><li style="flex:1">Daniel Wood </li></ul><p>2018- </p><p>06) </p><p>Updated based on Comments from BFS <br>Maintain conformance with FBCA <br>CP </p><p>3</p><p>February 28, 2019 October 30, 1,2019 <br>Daniel Wood Daniel Wood <br>Updated Section 5.8with new language to cover CA terminations <br>Maintain conformance with </p><p>Federal/Common CPs </p><p>3.1 <br>Updates in sections: <br>1, 1.1.1, 1.2, 1.4.1, 2.2.1, <br>4.4.2, 5.2.1, 5.2.1.1, <br>5.2.1.2, 5.3.1, 5.3.2, 5.3.7, roles from clearance requirements <br>5.4.2, 5.5.1, and 6.1.5 <br>Responses to audit findings, annual review findings, change proposals, </p><ul style="display: flex;"><li style="flex:1">and for separation of Key Recovery </li><li style="flex:1">3.2 </li></ul><p>3.3 </p><ul style="display: flex;"><li style="flex:1">December 15, 2020 </li><li style="flex:1">Daniel Wood </li></ul><p>Daniel Wood on CA roles </p><p>Removed the “offline” </p><p>requirement on OLT Root CAs in section 1.3.1.2 of <br>Addendum 1. <br>Added Addendum 2 – Implementation of PKI Certificates on Treasury <br>Systems <br>To allow for remote administration on an OLT Root CA, and to define implementation policies on <br>March 29, 2021 <br>SSL/TLS certificates for HTTPS </p><p>3</p><p><strong>UNCLASSIFIED </strong></p><p><strong>Table of Contents </strong></p><p><strong>1. INTRODUCTION...........................................................................................................................................................11 </strong></p><p><strong>1.1 </strong></p><p><strong>OVERVIEW................................................................................................................................................................................12 </strong></p><p>1.1.1 Certificate Policy...............................................................................................................................................................................12 1.1.2 Relationships between Treasury PKI CP & Treasury PKI CA CPSs.....................................................................................................12 1.1.3 Scope ................................................................................................................................................................................................12 1.1.4 Relationships between Treasury PKI CP, the FBCA and Other Entity CPs ........................................................................................13 1.1.5 Interaction with PKIs External to the Federal Government .............................................................................................................14 </p><p><strong>1.2 DOCUMENT IDENTIFICATION ..........................................................................................................................................................14 1.3 PKI ENTITIES....................................................................................................................................................................................15 </strong></p><p>1.3.1 Treasury PKI Program Team .............................................................................................................................................................15 1.3.2 Registration Authority ......................................................................................................................................................................18 </p><p>1.3.3 Subscribers.......................................................................................................................................................................................19 </p><p>1.3.4 Relying Parties ..................................................................................................................................................................................19 1.3.5 Other Participants ............................................................................................................................................................................20 </p><p><strong>1.4 CERTIFICATE USAGE ........................................................................................................................................................................20 </strong></p><p>1.4.1 Appropriate Certificate Uses ............................................................................................................................................................20 1.4.2 Prohibited Certificate Uses...............................................................................................................................................................22 </p><p><strong>1.5 POLICY ADMINISTRATION ...............................................................................................................................................................22 </strong></p><p>1.5.1 Organization administering the document ......................................................................................................................................22 1.5.2 Contact Person .................................................................................................................................................................................22 1.5.3 Person Determining CPS Suitability for the Policy............................................................................................................................23 1.5.4 CPS Approval Procedures .................................................................................................................................................................23 </p><p><strong>1.6 DEFINITIONS AND ACRONYMS........................................................................................................................................................23 </strong></p><p><strong>2. PUBLICATION & REPOSITORY RESPONSIBILITIES .........................................................................................24 </strong></p><p><strong>2.1 REPOSITORIES .................................................................................................................................................................................24 2.2 PUBLICATION OF CERTIFICATION INFORMATION ............................................................................................................................24 </strong></p><p>2.2.1 Publication of certificates and Certificate Status .............................................................................................................................24 2.2.2 Publication of CA Information ..........................................................................................................................................................25 2.2.3 Interoperability.................................................................................................................................................................................25 </p><p><strong>2.3 FREQUENCY OF PUBLICATION .........................................................................................................................................................25 2.4 ACCESS CONTROLS ON REPOSITORIES.............................................................................................................................................25 </strong></p><p><strong>3. IDENTIFICATION & AUTHENTICATION...............................................................................................................26 </strong></p><p><strong>3.1 NAMING..........................................................................................................................................................................................26 </strong></p><p>3.1.1 Types of Names ................................................................................................................................................................................26 3.1.2 Need for Names to Be Meaningful...................................................................................................................................................30 3.1.3 Anonymity or Pseudonymity of Subscribers ....................................................................................................................................30 3.1.4 Rules for Interpreting Various Name Forms.....................................................................................................................................31 </p><p>4</p><p><strong>UNCLASSIFIED </strong></p><p>3.1.5 Uniqueness of Names.......................................................................................................................................................................31 3.1.6 Recognition, Authentication, & Role of Trademarks........................................................................................................................31 </p><p><strong>3.2 INITIAL IDENTITY VALIDATION ........................................................................................................................................................31 </strong></p><p>3.2.1 Method to Prove Possession of Private Key.....................................................................................................................................32 3.2.2 Authentication of Organization Identity ..........................................................................................................................................32 3.2.3 Authentication of Individual Identity ...............................................................................................................................................33 3.2.4 Non-verified Subscriber Information ...............................................................................................................................................37 3.2.5 Validation of Authority.....................................................................................................................................................................38 3.2.6 Criteria for Interoperation................................................................................................................................................................38 </p><p><strong>3.3 IDENTIFICATION AND AUTHENTICATION FOR RE-KEY REQUESTS ....................................................................................................38 </strong></p><p>3.3.1 Identification and Authentication for Routine Re-key .....................................................................................................................38 3.3.2 Identification and Authentication for Re-key after Revocation .......................................................................................................40 </p><p><strong>3.4 IDENTIFICATION AND AUTHENTICATION FOR REVOCATION REQUEST ............................................................................................40 </strong></p><p><strong>4. CERTIFICATE LIFE-CYCLE ........................................................................................................................................41 </strong></p><p><strong>4.1 APPLICATION ..................................................................................................................................................................................41 </strong></p><p>4.1.1 Submission of Certificate Application ..............................................................................................................................................41 4.1.2 Enrollment Process and Responsibilities..........................................................................................................................................41 </p><p><strong>4.2 CERTIFICATE APPLICATION PROCESSING .........................................................................................................................................41 </strong></p><p>4.2.1 Performing Identification and Authentication Functions.................................................................................................................41 4.2.2 Approval or Rejection of Certificate Applications ............................................................................................................................42 4.2.3 Time to Process Certificate Applications..........................................................................................................................................42 </p><p><strong>4.3 ISSUANCE........................................................................................................................................................................................43 </strong></p><p>4.3.1 CA Actions during Certificate Issuance.............................................................................................................................................43 4.3.2 Notification to Subscriber of Certificate Issuance............................................................................................................................43 </p><p><strong>4.4 ACCEPTANCE...................................................................................................................................................................................43 </strong></p><p>4.4.1 Conduct constituting certificate acceptance....................................................................................................................................43 4.4.2 Publication of the Certificate by the CA ...........................................................................................................................................43 4.4.3 Notification of Certificate Issuance by the CA to other entities.......................................................................................................43 </p><p><strong>4.5 KEY PAIR AND CERTIFICATE USAGE .................................................................................................................................................44 </strong></p><p>4.5.1 Subscriber Private Key and Certificate Usage ..................................................................................................................................44 4.5.2 Relying Party Public key and Certificate Usage ................................................................................................................................44 </p><p><strong>4.6 CERTIFICATE RENEWAL....................................................................................................................................................................44 </strong></p><p>4.6.1 Circumstance for Certificate Renewal ..............................................................................................................................................44 4.6.2 Who may Request Renewal .............................................................................................................................................................45 4.6.3 Processing Certificate Renewal Requests.........................................................................................................................................45 4.6.4 Notification of new certificate issuance to Subscriber.....................................................................................................................45 4.6.5 Conduct constituting acceptance of a Renewal certificate ..............................................................................................................45 4.6.6 Publication of the Renewal certificate by the CA.............................................................................................................................45 4.6.7 Notification of Certificate Issuance by the CA to other entities.......................................................................................................45 </p><p><strong>4.7 CERTIFICATE RE-KEY ........................................................................................................................................................................45 </strong></p><p>4.7.1 Circumstance for Certificate Re-key.................................................................................................................................................46 4.7.2 Who may request certification of a new public key.........................................................................................................................46 4.7.3 Processing certificate Re-keying requests........................................................................................................................................46 </p><p>5</p><p><strong>UNCLASSIFIED </strong></p><p>4.7.4 Notification of new certificate issuance to Subscriber.....................................................................................................................46 4.7.5 Conduct constituting acceptance of a Re-keyed certificate.............................................................................................................46 4.7.6 Publication of the Re-keyed certificate by the CA............................................................................................................................46 4.7.7 Notification of certificate issuance by the CA to other Entities .......................................................................................................46 </p><p><strong>4.8 MODIFICATION ...............................................................................................................................................................................47 </strong></p><p>4.8.1 Circumstance for Certificate Modification .......................................................................................................................................47 4.8.2 Who may request Certificate Modification......................................................................................................................................47 4.8.3 Processing Certificate Modification Requests..................................................................................................................................47 4.8.4 Notification of new certificate issuance to Subscriber.....................................................................................................................48 4.8.5 Conduct constituting acceptance of modified certificate ................................................................................................................48 4.8.6 Publication of the modified certificate by the CA ............................................................................................................................48 4.8.7 Notification of certificate issuance by the CA to other Entities .......................................................................................................48 </p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages151 Page
-
File Size-