1. How much does the expected benefit of this project depend on having the CA certificate signed by a commonly trusted CA?
  2. Ignoring cost, are there other benefits provided by using our own CA?
  3. Is it in scope to discuss the possible creation of ad hoc CAs (with their own root) to serve various user needs, i.e. operating the CA infrastructure as a service to another university entity? Example: A department wants to authenticate access to a web service with certificates. The department takes care of I&A to their satisfaction and requests a cert be issued signed by the department's root cert.
  4. Is an element of this issuing certs to non-affiliated users who someone at the university wants to have a certificate? Example: Department wants some vendors they deal with to have a cert.
  5. Who can get a soft PDC? (IA) 
  6. How many active soft PDCs can a user have? Question should really be, "How many active key pairs can a user have?" 
  7. Issue separate signing and encryption certificates? (IA) 
  8. Issue multiple certificates? Multiple certificates OK, but only one active key pair.  
  9. Role certificates (e.g. departmental cert as an alternative to escrow or for role accounts)?
  10. Certificates for devices?
  11. Will there be a face to face enrollment requirement or will there be a remote web based enrollment process? (IA) 
  12. What information will be required to validate the identity of users who enroll for a soft PDC? (IA) 
  13. Will it be setup as self service or will approval (by supervisor or some other authority) be required to get a soft PDC? (.IA - describe self-service request for cert and in-person approval
  14. Can soft PDCs be renewed? (IA - describe for IA) 
  15. What will the validity period be for soft PDCs? (IA) 
  16. How do soft PDCs fit into the VT Digital Identity LOA standards under development?  (IA)
  17. Should soft PDCs be included in a Root Key Signed Trust chain? (having our cert signed by an external provider) (IA) 
  18. Sign PGP keys, or provide external signature for key file?
  19. Will soft PDC support encryption and if so will keys be escrowed? (IA) 
  20. How will users retrieve their keys from key escrow? Is the process the same as when users request a soft PDC? (IA) 
  21. Will administrators be allowed to retrieve keys? How will administrators retrieve keys that have been escrowed? (IA)  
  22. Voluntary escrow as a service or mandatory as a disincentive to use our CA? Phil: there is a group on campus that will not use keys if they are escrowed.*
  23. Would we have the option to exclude key escrow for future profiles that would not include encryption. (IA - if we issue other certificates that do not include encryption, may we forego escrowing keys for those certificates.) 
  24. Suggestion that employees be required to obtain soft PDC as part of orientation. Should this be required?
  25. Should we publish certificates to ED and AD? Should we do it at initial rollout?
  1. Face to Face Id Proofing? (IA) 
  2. Root Key Signed Trust Chain?
  3. Publication to VT Directories/Registry?
  4. Policy and procedures to request out of band key recovery by someone other than the owner of the keys? (IA: procedures /legal - policy)