
CA/Browser Forum Baseline Requirements Certificate Policy for the Issuance and Management of Publicly-Trusted Certificates CA/Browser Forum. Version 1.4.2 January 7, 2017 cabforum.org Copyright 2017 CA/Browser Forum This work is licensed under the Creative Commons Attribution 4.0 International license. TABLE OF CONTENTS 1. Introduction ............................................................................................................................................ 1 1.1. Overview ...................................................................................................................................... 1 1.2. Document name and Identification ............................................................................................... 1 1.2.1. Revisions ............................................................................................................................ 2 1.2.2. Relevant Dates ................................................................................................................... 3 1.3. PKI Participants ........................................................................................................................... 3 1.3.1. Certification Authorities....................................................................................................... 3 1.3.2. Registration Authorities ...................................................................................................... 3 1.3.3. Subscribers ........................................................................................................................ 4 1.3.4. Relying Parties ................................................................................................................... 4 1.3.5. Other Participants ............................................................................................................... 4 1.4. Certificate Usage ......................................................................................................................... 4 1.4.1. Appropriate Certificate Uses ............................................................................................... 4 1.4.2. Prohibited Certificate Uses ................................................................................................. 4 1.5. Policy administration .................................................................................................................... 4 1.5.1. Organization administering the document .......................................................................... 4 1.5.2. Contact person ................................................................................................................... 5 1.5.3. Person determining CPS suitability for the policy ............................................................... 5 1.5.4. CPS approval procedures .................................................................................................. 5 1.6. Definitions and acronyms ............................................................................................................. 5 1.6.1. Definitions ........................................................................................................................... 5 1.6.2. Acronyms ......................................................................................................................... 10 1.6.3. References ....................................................................................................................... 11 1.6.4. Conventions ..................................................................................................................... 12 2. PUBLICATION AND REPOSITORY RESPONSIBILITIES .................................................................. 12 2.1. Repositories ............................................................................................................................... 12 2.2. Publication of information ........................................................................................................... 12 2.3. Time or frequency of publication ................................................................................................ 13 2.4. Access controls on repositories ................................................................................................. 13 3. IDENTIFICATION AND AUTHENTICATION ....................................................................................... 13 3.1. Naming ...................................................................................................................................... 13 3.1.1. Types of names ................................................................................................................ 13 3.1.2. Need for names to be meaningful .................................................................................... 13 3.1.3. Anonymity or pseudonymity of subscribers ...................................................................... 13 3.1.4. Rules for interpreting various name forms ........................................................................ 13 3.1.5. Uniqueness of names ....................................................................................................... 13 3.1.6. Recognition, authentication, and role of trademarks ........................................................ 13 3.2. Initial identity validation .............................................................................................................. 13 3.2.1. Method to Prove Possession of Private Key ..................................................................... 13 3.2.2. Authentication of Organization and Domain Identity ......................................................... 13 3.2.3. Authentication of Individual Identity .................................................................................. 17 3.2.4. Non-verified Subscriber Information ................................................................................. 17 3.2.5. Validation of Authority ...................................................................................................... 17 3.2.6. Criteria for Interoperation or Certification.......................................................................... 17 3.3. Identification and authentication for re-key requests .................................................................. 17 3.3.1. Identification and Authentication for Routine Re-key ........................................................ 17 3.3.2. Identification and Authentication for Re-key After Revocation .......................................... 17 3.4. Identification and authentication for revocation request ............................................................. 17 4. CERTIFICATE LIFE-CYCLE OPERATIONAL REQUIREMENTS ....................................................... 18 4.1. Certificate Application ................................................................................................................ 18 4.1.1. Who Can Submit a Certificate Application ........................................................................ 18 4.1.2. Enrollment Process and Responsibilities.......................................................................... 18 4.2. Certificate application processing .............................................................................................. 18 4.2.1. Performing Identification and Authentication Functions .................................................... 18 4.2.2. Approval or Rejection of Certificate Applications .............................................................. 19 4.2.3. Time to Process Certificate Applications .......................................................................... 19 4.3. Certificate issuance .................................................................................................................... 19 4.3.1. CA Actions during Certificate Issuance ............................................................................ 19 4.3.2. Notification of Certificate Issuance ................................................................................... 19 Baseline Requirements, v. 1.4.2 ii 4.4. Certificate acceptance ............................................................................................................... 19 4.4.1. Conduct constituting certificate acceptance ..................................................................... 19 4.4.2. Publication of the certificate by the CA ............................................................................. 19 4.4.3. Notification of certificate issuance by the CA to other entities .......................................... 19 4.5. Key pair and certificate usage .................................................................................................... 20 4.5.1. Subscriber private key and certificate usage .................................................................... 20 4.5.2. Relying party public key and certificate usage .................................................................. 20 4.6. Certificate renewal ..................................................................................................................... 20 4.6.1. Circumstance for certificate renewal ................................................................................ 20 4.6.2. Who may request renewal ................................................................................................ 20 4.6.3. Processing certificate
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages58 Page
-
File Size-