Attendees
Phil Benchoff
Susan Brooker-Gross
Al Cooper
Mary Dunker
Frank Galligan
Kevin Rooney
Greg Kroll
Randy Marchany
Ismael Alaoui
Agenda
- Continue viewing the eProv presentation, answering questions where possible.
- Discuss invitations to users to participate in focus group meetings.
- Background Questions 6, 12, 17, 20, 24 are pending or unanswered.
Meeting Notes
- Continue viewing the eProv presentation, answering questions where possible.
- key pair = key set
- will have one key pair but may have multiple certificates associated with that key pair
- Renewal: we may want to consider a time limit beyond which you cannot renew an expired certificate unless:
- renewal is done using face-to-face registration
- if remote renewal is used the user will need a new key pair
- Recover: e.g., forgot password; private key was lost because erased from computer
- Revoke: e.g., compromised key pair; user revoking their own key pair
- Out of Band: we need policy & procedures to handle
- Departmental key pairs & certificates are out of scope form this project. This project is for personal digital certificates.
- Someone gets hit by a bus scenario & discussion
- This is handled out of band.
- Basically the process would be (1) recover keys, (2) decrypt, (3) issue new key pair to someone if necessary.
- Ish explained that this would be a manual process and would probably play out like this. Recover the key pair. The new user submits a CSR via another process to generate a new certificate in their name with their personal information. The result is a new certificate using the old key pair.
- We need to get Internal Audit opinion on this.
- From a departmental standpoint they want to keep their business processes going without major disruption.
- How will someone get the recipients public key in order to send them an encrypted e-mail or file?
- Can/Should we publish the public key to the Enterprise Directory? Registry? We could publish the keys to the Enterprise Directory as a future enhancement, as that functionality adds complexity to the project, and it is possible to encrypt e-mail by asking the recipient to send their certificate (containing public key) to the sender.
- InCommon Silver Profile
- See Mary's comment on the home page.
- Also see Mary's comment below on this page.
- Very desirable.
- If we go for this it will influence application design and implementation.
- We may not be able to use EJBCA for the end-user interface because of the requirements for InCommon Silver.
- We need to begin discussing requirements for face-to-face registration.
- Need usage scenarios.
- Other stakeholders that need to be brought in soon are (1) Internal Audit, and (2) Jerry Palmer from Records Retention.