📄 draft-ietf-pkix-ldap-pmi-schema-00.txt
字号:
The syntax definition of 1.2.36.79672281.1.5.1 (NULL) is given in [3].6 PMI Object ClassesThe definitions of the PMI directory object classes can be found in section 17.1 of [9]. They are repeated here for the convenience of the reader.pmiUser OBJECT-CLASS ::= { -- a privilege holder SUBCLASS OF {top} KIND auxiliary MAY CONTAIN {attributeCertificateAttribute} ID { joint-iso-ccitt(2) ds(5) objectClass(6) pmiUser (24) } }pmiAA OBJECT-CLASS ::= { -- an attribute authority SUBCLASS OF {top} KIND auxiliary MAY CONTAIN {aACertificate | attributeCertificateRevocationList | attributeAuthorityRevocationList} ID { joint-iso-ccitt(2) ds(5) objectClass(6) pmiAA (25) } }pmiSOA OBJECT-CLASS ::= { -- a PMI Source of Authority SUBCLASS OF {top} KIND auxiliary MAY CONTAIN {attributeCertificateRevocationList | attributeAuthorityRevocationList | attributeDescriptorCertificate} ID { joint-iso-ccitt(2) ds(5) objectClass(6) pmiSOA (26) } }attCertCRLDistributionPt OBJECT-CLASS ::= { -- an AC CRL distribution point SUBCLASS OF {top} KIND auxiliary MAY CONTAIN { attributeCertificateRevocationList | attributeAuthorityRevocationList } ID { joint-iso-ccitt(2) ds(5) objectClass(6) attCertCRLDistributionPts (27) } }pmiDelegationPath OBJECT-CLASS ::= {-- an object that may contain a delegation path SUBCLASS OF {top} KIND auxiliary MAY CONTAIN { delegationPath }ID { joint-iso-ccitt(2) ds(5) objectClass(6) delegationPath (33) } }privilegePolicy OBJECT-CLASS ::= {-- an object that may contain privilege policy information SUBCLASS OF {top} KIND auxiliary MAY CONTAIN {privPolicy }ID { joint-iso-ccitt(2) ds(5) objectClass(6) privilegePolicy (32) } }7. Filter ExamplesThe following examples are written using the string representation of Search filters defined in [14]. Line-breaks have been added as an aid to readability.i) To exactly match one attribute certificate using equalityMatch with attributeCertificateExactMatch and GSERAttributeCertificateExactAssertion (attributeCertificateAttribute={serialNumber 12345 , issuer { issuerName { directoryName rdnSequence:"O=truetrust ltd, C=GB" })ii) To exactly match one attribute certificate using equalityMatch with attributeCertificateExactMatch and SimpleCertificateExactAssertion (attributeCertificateAttribute=12345$O=truetrust ltd, C=GB)iii) To match on the serial number of an attribute certificate using extensibleMatch with component matching [13](attributeCertificateAttribute:componentFilterMatch:= item:{ component "serialNumber", rule integerMatch, value 12345 })iv) To exactly match one attribute certificate using extensibleMatch with component matching(attributeCertificateAttribute:componentFilterMatch:=and:{item:{ component "serialNumber", rule integerMatch, value 12345 }item:{ component "issuer.issuerName.directoryName.rdnSequence", rule distinguishedNameMatch, value "O=truetrust ltd, C=GB" } })v) To match attribute certificates containing a certain roleTo Be Worked Out Later#8. Security ConsiderationsThis [Internet Draft/Standard] describes the schema for the storageand matching of PMI attributes (attribute certificates, revocation lists etc.) in an LDAP directory server. It does not address the protocol for the retrieval of this information.LDAP servers SHOULD use authentication and access control methods to protect this information during its storage from unauthorised modification and retrieval. In addition, clients MAY choose toencrypt the attributes in the attribute certificates before storingthem in an LDAP server to ensure their confidentiality.9. ReferencesNormative[1] Bradner, S. The Internet Standards Process -- Revision 3. RFC2026 October 1996.[2] Chadwick, D.W., Legg, S. "Internet X.509 Public Key InfrastructureLDAP Schema and Syntaxes for PKIs" <draft-pkix-ldap-pki-schema-00.txt>, June 2002[3] S. Legg, "Generic String Encoding Rules", <draft-legg-ldap-gser-XX.txt>, March 2002, a work in progress[4] J. Sermersheim "Lightweight Directory Access Protocol (v3)" <draft-ietf-ldapbis-protocol-02.txt> July 2001[5] S.Bradner. "Key words for use in RFCs to Indicate RequirementLevels", RFC 2119, March 1997.[6] S. Legg, "Common Elements of GSER Encodings", <draft-legg-ldap-gser-abnf-XX.txt>, March 2002, a work in progress[7] ITU-T Rec. X.520(2000) The Directory: Selected Attribute Types[9] ITU-T Rec. X.509(2000) The Directory: AuthenticationFramework[10] D. Crocker, P. Overell, "Augmented BNF for SyntaxSpecifications: ABNF", RFC 2234, November 1997Informative[13] S. Legg, "LDAP & X.500 Component Matching Rules", <draft-legg-ldapext-component-matching-04.txt>, November 2001, a work in progress[14] Howes, T. "The String Representation of LDAP Search Filters". RFC 2254, December 1997. 10. Intellectual Property NoticeThe IETF takes no position regarding the validity or scope of anyintellectual property or other rights that might be claimed topertain to the implementation or use of the technology described inthis document or the extent to which any license under such rightsmight or might not be available; neither does it represent that it hasmade any effort to identify any such rights.Information on theIETF's procedures with respect to rights in standards-track andstandards-related documentation can be found in BCP-11. [BCP-11]Copies of claims of rights made available for publication and anyassurances of licenses to be made available, or the result of anattempt made to obtain a general license or permission for the use ofsuch proprietary rights by implementors or users of this specificationcan be obtained from the IETF Secretariat.The IETF invites any interested party to bring to its attention anycopyrights, patents or patent applications, or other proprietaryrights which may cover technology that may be required to practicethis standard.Please address the information to the IETF ExecutiveDirector.11. CopyrightCopyright (C) The Internet Society (2002). All Rights Reserved.This document and translations of it may be copied and furnished toothers, and derivative works that comment on or otherwise explain itor assist in its implementation may be prepared, copied, publishedand distributed, in whole or in part, without restriction of anykind, provided that the above copyright notice and this paragraph areincluded on all such copies and derivative works. However, thisdocument itself may not be modified in any way, such as by removingthe copyright notice or references to the Internet Society or otherInternet organizations, except as needed for the purpose ofdeveloping Internet standards in which case the procedures forcopyrights defined in the Internet Standards process must befollowed, or as required to translate it into languages other thanEnglish.The limited permissions granted above are perpetual and will not berevoked by the Internet Society or its successors or assigns.This document and the information contained herein is provided on an"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERINGTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDINGBUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATIONHEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OFMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.12. Authors' AddressesDavid ChadwickIS InstituteUniversity of SalfordSalfordEnglandM5 4WTEmail: d.w.chadwick@salford.ac.ukSteven LeggAdacel Technologies Ltd.405-409 Ferntree Gully Road,Mount Waverley,Victoria, 3149AustraliaEmail: steven.legg@adacel.com.au13. Changes >From Version 00i) Added ABNF notation for all of the syntaxes.ii) Removed the restriction on the syntax of Distribution Point Names.iii) Removed constraints on IssuerSerial.iv) Bug detected in X.509 AttributeCertificateExactMatch that will needresolving.v) Changed the string encodings for non-exact matches to keywords for each component instead of $ separators.>From Version 01i) Added and corrected all X.509 PKI schema definitions, since these have been removed from RFC2252-bis.ii) Changed assertion syntaxes to use the syntax defined by Component Matching Rulesiii) Included all the matching rules for AC extensions>From Version 02 of <draft-pkix-ldap-schema-02.txt>i) PKI and PMI schema has been split into separate IDsii) Example have been addediii) Text has been added to mandate that servers must store and retrieve syntaxes containing digital signatures exactly as given.iv) Text has been removed concerning the use of the ;binary encoding option, as per the decision of the LDAPBIS group.14. Outstanding Issuesi. There is still a bug in the X.509 AttributeCertificateExactAssertion. It reads:AttributeCertificateExactAssertion ::= SEQUENCE { serialNumber CertificateSerialNumber OPTIONAL, issuer IssuerSerial }OPTIONAL should be removed from the serialNumber. IssuerSerial should be replaced by AttCertIssuer. This ID has assumed that the change will be made.ii. Should the AttributeType in Attribute Certificate Match allow the LDAP <descr> encoding option for describing attribute type OIDs (i.e. user friendly names instead of object identifiers)? Note that attribute names are not guaranteed to be unique, whereas OIDs are.iii. The Source of Authority Match is not defined in X.509. Do we prefer compatibility with X.509 and remove it, or get X.509 to add it.15. Table of Contents1. Introduction 12. Subschema Publishing 23. PMI Attributes and Syntaxes 23.1 Attribute Certificate Attribute 23.2 Attribute Authority Certificate Attribute 23.3 Attribute Descriptor Certificate Attribute 33.4 Attribute Certificate Syntax 33.5 Attribute Certificate Revocation List Attribute 33.6 Attribute Authority Certificate Revocation List Attribute 43.7 Delegation Path Attribute 43.8 Delegation Path Syntax 44 PMI Matching Rules 54.1 Attribute Certificate Exact Match 54.2 Attribute Certificate Match 95 AC Extensions Matching Rules 105.1 Holder Issuer Match 105.2 Delegation Path Match 105.3 Authority Attribute Identifier Match 115.4 Role Specification Certificate Identifier Match 115.5 Basic Attribute Constraints Match 125.6 Delegated Name Constraints Match 125.7 Time Specification Match 135.8 Acceptable Certificate Policies Match 165.9 Attribute Descriptor Match 165.10 Source of Authority Match 176 PMI Object Classes 187. Filter Examples 198. Security Considerations 199. References 20Normative 20Informative 2010. Intellectual Property Notice 2011. Copyright 2112. Authors' Addresses 2113. Changes 2214. Outstanding Issues 2215. Table of Contents 23
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -