⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rfc2527.txt

📁 RFC 的详细文档!
💻 TXT
📖 第 1 页 / 共 5 页
字号:

      * Revocation Request.








Chokhani & Ford              Informational                     [Page 18]

RFC 2527                          PKIX                        March 1999


4.3.1  Initial Registration

   This subcomponent includes the following elements regarding
   identification and authentication procedures during entity
   registration or certificate issuance:

      * Types of names assigned to the subject (7);

      * Whether names have to be meaningful or not (8);

      * Rules for interpreting various name forms;

      * Whether names have to be unique;

      * How name claim disputes are resolved;

      * Recognition, authentication, and role of trademarks;

      * If and how the subject must prove possession of the companion
        private key for the public key being registered (9);

      * Authentication requirements for organizational identity of
        subject (CA, RA, or end entity) (10);

      * Authentication requirements for a person acting on behalf of a
        subject (CA, RA, or end entity) (11), including:

         * Number of pieces of identification required;
         * How a CA or RA validates the pieces of identification
           provided;
         * If the individual must present personally to the
           authenticating CA or RA;
         * How an individual as an organizational person is
           authenticated (12).

4.3.2 Routine Rekey

   This subcomponent describes the identification and authentication
   procedures for routine rekey for each subject type (CA, RA, and end
   entity). (13)

4.3.3 Rekey After Revocation -- No Key Compromise

   This subcomponent describes the identification and authentication
   procedures for rekey for each subject type (CA, RA, and end entity)
   after the subject certificate has been revoked.  (14)





Chokhani & Ford              Informational                     [Page 19]

RFC 2527                          PKIX                        March 1999


4.3.4 Revocation Request

   This subcomponent describes the identification and authentication
   procedures for a revocation request by each subject type (CA, RA, and
   end entity). (16)

4.4 OPERATIONAL REQUIREMENTS

   This component is used to specify requirements imposed upon issuing
   CA, subject CAs, RAs, or end entities with respect to various
   operational activities.

   This component consists of the following subcomponents:

      * Certificate Application;

      * Certificate Issuance;

      * Certificate Acceptance;

      * Certificate Suspension and Revocation;

      * Security Audit Procedures;

      * Records Archival;

      * Key Changeover;

      * Compromise and Disaster Recovery; and

      * CA Termination.

   Within each subcomponent, separate consideration may need to be given
   to issuing CA, repository, subject CAs, RAs, and end entities.

4.4.1 Certificate Application

   This subcomponent is used to state requirements regarding subject
   enrollment and request for certificate issuance.

4.4.2 Certificate Issuance

   This subcomponent is used to state requirements regarding issuance of
   a certificate and notification to the applicant of such issuance.







Chokhani & Ford              Informational                     [Page 20]

RFC 2527                          PKIX                        March 1999


4.4.3 Certificate Acceptance

   This subcomponent is used to state requirements regarding acceptance
   of an issued certificate and for consequent publication of
   certificates.

4.4.4 Certificate Suspension and Revocation

   This subcomponent addresses the following:

      * Circumstances under which a certificate may be revoked;

      * Who can request the revocation of the entity certificate;

      * Procedures used for certificate revocation request;

      * Revocation request grace period available to the subject;

      * Circumstances under which a certificate may be suspended;

      * Who can request the suspension of a certificate;

      * Procedures to request certificate suspension;

      * How long the suspension may last;

      * If a CRL mechanism is used, the issuance frequency;

      * Requirements on relying parties to check CRLs;

      * On-line revocation/status checking availability;

      * Requirements on relying parties to perform on-line
        revocation/status checks;

      * Other forms of revocation advertisements available; and

      * Requirements on relying parties to check other forms of
        revocation advertisements.

      * Any variations on the above stipulations when the suspension or
        revocation is the result of private key compromise (as opposed
        to other reasons for suspension or revocation).








Chokhani & Ford              Informational                     [Page 21]

RFC 2527                          PKIX                        March 1999


4.4.5  Security Audit Procedures

   This subcomponent is used to describe event logging and audit
   systems, implemented for the purpose of maintaining a secure
   environment.  Elements include the following:

      * Types of events recorded; (28)

      * Frequency with which audit logs are processed or audited;

      * Period for which audit logs are kept;

      * Protection of audit logs:

         - Who can view audit logs;
         - Protection against modification of audit log; and
         - Protection against deletion of audit log.

      * Audit log back up procedures;

      * Whether the audit log accumulation system is internal or
        external to the entity;

      * Whether the subject who caused an audit event to occur is
        notified of the audit action; and

      * Vulnerability assessments.

4.4.6  Records Archival

   This subcomponent is used to describe general records archival (or
   records retention) policies, including the following:

      * Types of events recorded; (29)

      * Retention period for archive;

      * Protection of archive:

         - Who can view the archive;
         - Protection against modification of archive; and
         - Protection against deletion of archive.

      * Archive backup procedures;

      * Requirements for time-stamping of records;

      * Whether the archive collection system is internal or external;



Chokhani & Ford              Informational                     [Page 22]

RFC 2527                          PKIX                        March 1999


        and

      * Procedures to obtain and verify archive information.

4.4.7  Key Changeover

   This subcomponent describes the procedures to provide a new public
   key to a CA's users.

4.4.8  Compromise and Disaster Recovery

   This subcomponent describes requirements relating to notification and
   recovery procedures in the event of compromise or disaster.  Each of
   the following circumstances may need to be addressed separately:

      * The recovery procedures used if computing resources, software,
        and/or data are corrupted or suspected to be corrupted.  These
        procedures describe how a secure environment is reestablished,

        which certificates are revoked, whether the entity key is
        revoked, how the new entity public key is provided to the users,
        and how the subjects are recertified.

      * The recovery procedures used if the entity public key is
        revoked.  These procedures describe how a secure environment is
        reestablished, how the new entity public key is provided to the
        users, and how the subjects are recertified.

      * The recovery procedures used if the entity key is compromised.
        These procedures describe how a secure environment is
        reestablished, how the new entity public key is provided to the
        users, and how the subjects are recertified.

      * The CA's procedures for securing its facility during the period
        of time following a natural or other disaster and before a
        secure environment is reestablished either at the original site
        or a remote hot-site.  For example, procedures to protect
        against theft of sensitive materials from an earthquake-damaged
        site.

4.4.9 CA Termination

   This subcomponent describes requirements relating to procedures for
   termination and for termination notification of a CA or RA, including
   the identity of the custodian of CA and RA archival records.






Chokhani & Ford              Informational                     [Page 23]

RFC 2527                          PKIX                        March 1999


4.5 PHYSICAL, PROCEDURAL, AND PERSONNEL SECURITY CONTROLS

   This component describes non-technical security controls (that is,
   physical, procedural, and personnel controls) used by the issuing CA
   to perform securely the functions of key generation, subject
   authentication, certificate issuance, certificate revocation, audit,
   and archival.

   This component can also be used to define non-technical security
   controls on repository, subject CAs, RAs, and end entities.  The non
   technical security controls for the subject CAs, RAs, and end
   entities could be the same, similar, or very different.

   These non-technical security controls are critical to trusting the
   certificates since lack of security may compromise CA operations
   resulting, for example, in the creation of certificates or CRLs with
   erroneous information or the compromise of the CA private key.

   This component consists of three subcomponents:

      * Physical Security Controls;

      * Procedural Controls; and

      * Personnel Security Controls.

   Within each subcomponent, separate consideration will, in general,
   need to be given to each entity type, that is, issuing CA,
   repository, subject CAs, RAs, and end entities.

4.5.1 Physical Security Controls

   In this subcomponent, the physical controls on the facility housing
   the entity systems are described.(21) Topics addressed may include:

      * Site location and construction;

      * Physical access;

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -