Cover Page |
---|
X.509 Certification Practice Statement for the Middleware Certification Authority |
X.509 Certification Practice Statement for the Middleware Certification Authority |
RECORD OF CHANGES |
---|
|
Add all changes for Migration Project here! |
1.1.1 Certificate Policy (CP) |
---|
The VTCA Root CA has digitally signed a copy of the VTCA CP, using SHA-1 with RSA encryption and its primary PKC signing key http://www.pki.vt.edu/rootca/cp/index.html. The digitally signed copy of this MCA CPS is available online at http://www.pki.vt.edu/vtmw/cps/. |
The MCA has a copy of the VTCA CP and CPS which has been digitally signed by the chairman of the VTPKI-PMA who has the primary responsibility for approving policies/standards of the Virginia Tech Public Key Infrastructure (PKI) and the related Certificate Authorities operating within it.
|
1.3 COMMUNITY AND APPLICABILITY |
---|
The MCA serves two primary communities: |
The MCA serves two primary communities: |
1.3.2 Registration Authorities |
---|
Information Resource Management is the Registration Authority for the MCA. |
Identity Management Services is the Registration Authority for the MCA. |
1.3.4 Applicability |
---|
A PKC issued by the MCA to Middleware Services Server community members is used to identify the server to both server and client community member entities and to ensure data confidentiality and integrity during transport to server and client community members. |
A PKC issued by the MCA to Middleware Services Server community members is used to identify the server to both server and client community member entities and to ensure data confidentiality and integrity during transport to server and client community members. |
1.4 CONTACT DETAILS |
---|
Questions about interpretation of this CPS are directed in writing to Information Resource Management. Concerns about possible abuse of this CPS, are directed in writing to the Virginia Tech Public Key Infrastructure Policy Management Authority (VTPKI PMA). |
Questions about interpretation of this CPS are directed in writing to Identity Management Services. Concerns about possible abuse of this CPS, are directed in writing to the Virginia Tech Public Key Infrastructure Policy Management Authority (VTPKI PMA). |
2.1.3 Subscriber Obligations |
In addition to the obligations stipulated in the VTCA CP a Subscriber MUST: |
In addition to the obligations stipulated in the VTCA CP a Subscriber MUST: |
2.4 INTERPRETATION AND ENFORCEMENT |
---|
Interpretation of this CPS is the responsibility of the PMA and Information Resource Management. |
Interpretation of this CPS is the responsibility of the PMA and Identity Management Services. |
3.1.2 Need for Names to be Meaningful |
The CN component of a Subject name in a PKC issued by the MCA is directly representative of the application or natural person to which the PKC is issued. |
The CN component of a Subject name in a PKC issued by the MCA is directly representative of the application to which the PKC is issued. |
3.1.3 Rules for Interpreting Various Name Forms |
---|
The Subject name for a Digital Processing Entity PKC must be in the following format: |
The Subject name for a Digital Processing Entity PKC must be in the following format: |
3.1.4 Uniqueness of Names |
---|
The Subject name in a PKC refers to a unique and identifiable digital processing entity or person. Including the serial number that is assigned by the CA ensures the uniqueness of the Subject name. A unique Subject name is not reused. |
The Subject name in a PKC refers to a unique and identifiable digital processing entity. The accuracy of the DN details is checked by the registration authority using identification information provided during the enrollment process. A subscriber's DN must be unique and must not be assigned to different subscribers. Only when a subscriber possesses a number of certificates with different key uses can a DN appear several times, although the respective serial numbers of the issuing CA always remain unique. |
3.1.9 Authentication of Individual Identity |
---|
IRM will verify that the person listed as department head is the head of department, as claimed. IRM confirms any designations with the department head. Once signatures are on file, IRM will verify signatures associated with requests. |
IMS will verify that the person listed as department head is the head of department, as claimed. IMS confirms any designations with the department head. Once signatures are on file, IMS will verify signatures associated with requests. |
4.4 CERTIFICATE SUSPENSION AND REVOCATION |
---|
|
|
4.4.2 Who Can Request Revocation of a Certificate |
---|
Certificate Revocation Requests are accepted from any one of the following: |
Certificate Revocation Requests are accepted from any one of the following: |
4.4.3 Procedure for Revocation Request |
---|
A Certificate Revocation Request is initiated through: |
A Certificate Revocation Request is initiated through:
|
4.4.11 Online Revocation / Status Checking Availability |
---|
Online Revocation/Status Checking is not available. |
Online Revocation/Status Checking is available. |
4.5.2 Frequency of Processing Data |
The audit logs are consolidated and reviewed on a regular basis by IRM. |
The audit logs are consolidated and reviewed on a regular basis by IMS. |
4.5.4 Protection of Security Audit Data |
---|
Access to audit logs is controlled by IRM, and access is restricted to authorized employees only. |
Access to audit logs is controlled by IMS, and access is restricted to authorized employees only. |
4.5.5 Security Audit Data Backup Procedures |
---|
The MCA audit log is backed up on the same schedule as the rest of the data on the MCA host using a backup utility (vtBackup) which was developed at Virginia Tech. Backup audit logs of the MCA are protected against unauthorized viewing, modification, or deletion by encrypting the backup and storing it in a separate secure physical location offsite from the MCA host. |
The MCA audit log is backed up on the same schedule as the rest of the data on VTCA servers using VT Information Systems and Computing network backup service providing:
|
4.6.3 Protection of Archive |
---|
Archived records are protected against unauthorized viewing, modification, and deletion by using cryptographic protection and offsite storage in a physically secure and trustworthy location. The cryptographic protection is implemented using a 512 bit DES3 symmetric key that is unique to each backup instance. The DES3 symmetric key is then encrypted using 4096 bit RSA public key encryption. |
Archived records are protected against unauthorized viewing, modification, and deletion by using offsite storage in a physically secure and trustworthy location. The offsite backup location provides the following key features:
|
4.6.4 Archive Backup Procedures |
---|
Daily backups created with vtBackup serve as archives for the Middleware CA application. The backups created with Legato Networker serve as archives for the Middleware RA application. |
Daily backups created using the network backup service provided by Information Systems and Computing serve as archives for the Middleware CA application. |
4.6.7 Procedures to Obtain and Verify Archive Information |
---|
|
|
5.1.5 Media Storage |
---|
The encrypted backup media of the MCA are stored in an offsite physically secure and |
The backup media of the MCA are stored in an offsite physically secure and trustworthy location. |
5.1.7 Offsite Backup |
---|
|
In the event of a system failure there are sufficient backups that can be used to restore the MCA system. Full monthly, weekly differential, and daily incremental backups are created durinng normal daily scheduled backups by the Information Systems and Computing network backup service. The backup media of the MCA are stored in an offsite physically secure and trustworthy location. |
5.2.1.1 Certification Authority Administrator |
---|
The Middleware Certification Authority Administrator (CAA) role is appointed by the Office of the Vice President for Information Technology. The CAA's responsibilities are: |
The Certification Authority Administrator (CAA) role is appointed by the Office of the Vice President for Information Technology. Primarily, a CAA's responsibilities are: |
5.2.1.2 Registration Authority Administrator (RAA) |
---|
The Registration Authority Administrator (RAA) role is constituted by IRM. The RAA's responsibilities are: |
The Registration Authority Administrator (RAA) role is constituted by IMS. The RAA's responsibilities are: |
7.1.2 Certificate Extensions |
---|
Standard extensions, when populated, are described in an appropriate Certificate Profile. |
Standard extensions, when populated, are described in Certificate Profiles published at:http://www.pki.vt.edu/vtmw/cps |
7.2.2 CARL and CRL Entry Extensions |
No additional stipulations. |
Add section 7.2.2 above - this section is missing from the CPS. |
7.2.3 OCSP Services |
---|
OCSP is supported but not currently implemented. |
An OCSP (Online Certificate Status Protocol)responder service is available. |
3 Comments
Mary Dunker
Jun 23, 2009In section 4.6.4, change "Information Systems and Computing" to "Information Technology"
William Dougherty II
Jul 07, 2009Also 4.5.5. Either cite the full and correct unit name (Storage Management Team of the Systems Support Dept.) or follow Mary's suggestion of replacing IS&C with Information Technology.
Mary Dunker
Dec 23, 2009In order to support issuing Middleware Client certificates to non-VT subscribers, for use with an ED-Id service, review the following sections in the Middleware CA CPS:
Review/remove reference to "natural person" in section 1.3.3.
Review 5.3.7