⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 draft-ietf-pkix-ldap-pmi-schema-00.txt

📁 PKIX的RFC英文文档
💻 TXT
📖 第 1 页 / 共 4 页
字号:
The syntax definition of 1.2.36.79672281.1.5.1 (NULL) is given in [3].6 PMI Object ClassesThe definitions of the PMI directory object classes can be found in section 17.1 of [9]. They are repeated here for the convenience of the reader.pmiUser OBJECT-CLASS ::= { -- a privilege holder	SUBCLASS OF	{top}	KIND		auxiliary	MAY CONTAIN	{attributeCertificateAttribute}	ID { joint-iso-ccitt(2) ds(5) objectClass(6) pmiUser (24) } }pmiAA OBJECT-CLASS ::= { -- an attribute authority	SUBCLASS OF	{top}	KIND		auxiliary	MAY CONTAIN	{aACertificate |			attributeCertificateRevocationList |			attributeAuthorityRevocationList}  	ID { joint-iso-ccitt(2) ds(5) objectClass(6) pmiAA (25) } }pmiSOA OBJECT-CLASS ::= { -- a PMI Source of Authority	SUBCLASS OF	{top}	KIND		auxiliary	MAY CONTAIN	{attributeCertificateRevocationList |			attributeAuthorityRevocationList |			attributeDescriptorCertificate}  	ID { joint-iso-ccitt(2) ds(5) objectClass(6) pmiSOA (26) } }attCertCRLDistributionPt	OBJECT-CLASS ::= {  -- an AC CRL distribution point   SUBCLASS OF  	{top}   KIND         	auxiliary   MAY CONTAIN  	{ attributeCertificateRevocationList |                		attributeAuthorityRevocationList }   ID { joint-iso-ccitt(2) ds(5) objectClass(6) attCertCRLDistributionPts (27) } }pmiDelegationPath   OBJECT-CLASS	::= {-- an object that may contain a delegation path	SUBCLASS OF	{top}	KIND			auxiliary	MAY CONTAIN	{ delegationPath }ID { joint-iso-ccitt(2) ds(5) objectClass(6) delegationPath (33) } }privilegePolicy	OBJECT-CLASS	::= {-- an object that may contain privilege policy information	SUBCLASS OF	{top}	KIND			auxiliary	MAY CONTAIN	{privPolicy }ID { joint-iso-ccitt(2) ds(5) objectClass(6) privilegePolicy (32) } }7. Filter ExamplesThe following examples are written using the string representation of Search filters defined in [14]. Line-breaks have been added as an aid to readability.i) To exactly match one attribute certificate using equalityMatch with attributeCertificateExactMatch and GSERAttributeCertificateExactAssertion      (attributeCertificateAttribute={serialNumber 12345 , issuer { issuerName { directoryName rdnSequence:"O=truetrust ltd, C=GB" })ii) To exactly match one attribute certificate using equalityMatch with attributeCertificateExactMatch and SimpleCertificateExactAssertion      (attributeCertificateAttribute=12345$O=truetrust ltd, C=GB)iii) To match on the serial number of an attribute certificate using extensibleMatch with component matching [13](attributeCertificateAttribute:componentFilterMatch:=       item:{ component "serialNumber", rule integerMatch, value 12345 })iv) To exactly match one attribute certificate using extensibleMatch with component matching(attributeCertificateAttribute:componentFilterMatch:=and:{item:{ component "serialNumber", rule integerMatch, value 12345 }item:{ component "issuer.issuerName.directoryName.rdnSequence", rule distinguishedNameMatch, value "O=truetrust ltd, C=GB"  } })v) To match attribute certificates containing a certain roleTo Be Worked Out Later#8. Security ConsiderationsThis [Internet Draft/Standard] describes the schema for the storageand matching of PMI attributes (attribute certificates, revocation lists etc.) in an LDAP directory server. It does not address the protocol for the retrieval of this information.LDAP servers SHOULD use authentication and access control methods to protect this information during its storage from unauthorised modification and retrieval. In addition, clients MAY choose toencrypt the attributes in the attribute certificates before storingthem in an LDAP server to ensure their confidentiality.9. ReferencesNormative[1] Bradner, S. The Internet Standards Process -- Revision 3. RFC2026  October 1996.[2] Chadwick, D.W., Legg, S. "Internet X.509 Public Key InfrastructureLDAP Schema and Syntaxes for PKIs" <draft-pkix-ldap-pki-schema-00.txt>, June 2002[3] S. Legg, "Generic String Encoding Rules", <draft-legg-ldap-gser-XX.txt>, March 2002, a work in progress[4] J. Sermersheim "Lightweight Directory Access Protocol (v3)" <draft-ietf-ldapbis-protocol-02.txt> July 2001[5] S.Bradner. "Key words for use in RFCs to Indicate RequirementLevels", RFC 2119, March 1997.[6] S. Legg, "Common Elements of GSER Encodings", <draft-legg-ldap-gser-abnf-XX.txt>, March 2002, a work in progress[7] ITU-T Rec. X.520(2000) The  Directory: Selected Attribute Types[9] ITU-T Rec. X.509(2000) The  Directory:  AuthenticationFramework[10] D. Crocker, P. Overell, "Augmented BNF for SyntaxSpecifications: ABNF", RFC 2234, November 1997Informative[13] S. Legg, "LDAP & X.500 Component Matching Rules", <draft-legg-ldapext-component-matching-04.txt>, November 2001, a work in progress[14] Howes, T. "The String Representation of LDAP Search Filters". RFC 2254, December 1997. 10. Intellectual Property NoticeThe IETF takes no position regarding the validity or scope of anyintellectual property or other rights that might be claimed topertain to the implementation or use of the technology described inthis document or the extent to which any license under such rightsmight or might not be available; neither does it represent that it hasmade any effort to identify any such rights.Information on theIETF's procedures with respect to rights in standards-track andstandards-related documentation can be found in BCP-11. [BCP-11]Copies of claims of rights made available for publication and anyassurances of licenses to be made available, or the result of anattempt made to obtain a general license or permission for the use ofsuch proprietary rights by implementors or users of this specificationcan be obtained from the IETF Secretariat.The IETF invites any interested party to bring to its attention anycopyrights, patents or patent applications, or other proprietaryrights which may cover technology that may be required to practicethis standard.Please address the information to the IETF ExecutiveDirector.11. CopyrightCopyright (C) The Internet Society (2002). All Rights Reserved.This document and translations of it may be copied and furnished toothers, and derivative works that comment on or otherwise explain itor assist in its implementation may be prepared, copied, publishedand distributed, in whole or in part, without restriction of anykind, provided that the above copyright notice and this paragraph areincluded on all such copies and derivative works. However, thisdocument itself may not be modified in any way, such as by removingthe copyright notice or references to the Internet Society or otherInternet organizations, except as needed for the purpose ofdeveloping Internet standards in which case the procedures forcopyrights defined in the Internet Standards process must befollowed, or as required to translate it into languages other thanEnglish.The limited permissions granted above are perpetual and will not berevoked by the Internet Society or its successors or assigns.This document and the information contained herein is provided on an"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERINGTASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDINGBUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATIONHEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OFMERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.12. Authors' AddressesDavid ChadwickIS InstituteUniversity of SalfordSalfordEnglandM5 4WTEmail: d.w.chadwick@salford.ac.ukSteven LeggAdacel Technologies Ltd.405-409 Ferntree Gully Road,Mount Waverley,Victoria, 3149AustraliaEmail: steven.legg@adacel.com.au13. Changes >From Version 00i) Added ABNF notation for all of the syntaxes.ii) Removed the restriction on the syntax of Distribution Point Names.iii) Removed constraints on IssuerSerial.iv) Bug detected in X.509 AttributeCertificateExactMatch that will needresolving.v) Changed the string encodings for non-exact matches to keywords for each component instead of $ separators.>From Version 01i)	Added and corrected all X.509 PKI schema definitions, since these have been removed from RFC2252-bis.ii)	Changed assertion syntaxes to use the syntax defined by Component Matching Rulesiii)	Included all the matching rules for AC extensions>From Version 02 of <draft-pkix-ldap-schema-02.txt>i)	PKI and PMI schema has been split into separate IDsii)	Example have been addediii)	Text has been added to mandate that servers must store and retrieve syntaxes containing digital signatures exactly as given.iv)	Text has been removed concerning the use of the ;binary encoding option, as per the decision of the LDAPBIS group.14. Outstanding Issuesi.	There is still a bug in the X.509 AttributeCertificateExactAssertion. It reads:AttributeCertificateExactAssertion ::= SEQUENCE {	serialNumber	CertificateSerialNumber OPTIONAL,	issuer		IssuerSerial }OPTIONAL should be removed from the serialNumber. IssuerSerial should be replaced by AttCertIssuer. This ID has assumed that the change will be made.ii.	Should the AttributeType in Attribute Certificate Match allow the LDAP <descr> encoding option for describing attribute type OIDs (i.e. user friendly names instead of object identifiers)? Note that attribute names are not guaranteed to be unique, whereas OIDs are.iii.	The Source of Authority Match is not defined in X.509. Do we prefer compatibility with X.509 and remove it, or get X.509 to add it.15. Table of Contents1. Introduction	12. Subschema Publishing	23. PMI Attributes and Syntaxes	23.1 Attribute Certificate Attribute	23.2 Attribute Authority Certificate Attribute	23.3 Attribute Descriptor Certificate Attribute	33.4 Attribute  Certificate Syntax	33.5 Attribute Certificate Revocation List Attribute	33.6 Attribute Authority Certificate Revocation List Attribute	43.7 Delegation Path Attribute	43.8 Delegation Path Syntax	44 PMI Matching Rules	54.1 Attribute Certificate Exact Match	54.2 Attribute Certificate Match	95 AC Extensions Matching Rules	105.1 Holder Issuer Match	105.2 Delegation Path Match	105.3 Authority Attribute Identifier Match	115.4 Role Specification Certificate Identifier Match	115.5	Basic Attribute Constraints Match	125.6	Delegated Name Constraints Match	125.7  Time Specification Match	135.8	Acceptable Certificate Policies Match	165.9 Attribute Descriptor Match	165.10 Source of Authority Match	176 PMI Object Classes	187. Filter Examples	198. Security Considerations	199. References	20Normative	20Informative	2010. Intellectual Property Notice	2011. Copyright	2112. Authors' Addresses	2113. Changes	2214. Outstanding Issues	2215. Table of Contents	23

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -