Cover Page |
---|
X.509 Certificate Policy |
X.509 Certificate Policy |
Identification and Validation of this Policy |
---|
A copy of this document SHALL be digitally signed using SHA-1 with RSA encryption and the private key associated with the authority certificate of a VTCA operating under this policy. |
A copy of this document SHALL be digitally signed by the chairman of the VTPKI-PMA who has the primary responsibility for approving policies/standards of the Virginia Tech Public Key Infrastructure (PKI) and the related Certificate Authorities operating within it. |
RECORD OF CHANGES |
---|
1. Section 6.7Change made 9/19/06Removed: "The Virginia Tech Root and Subordinate CA equipment SHALL be implemented using a stand-alone (offline) configuration." |
Add all changes for Migration Project here! |
1.1 OVERVIEW |
---|
Any PKC issued by a VTCA MUST contain a valid reference to the applicable CP. This CP may be referenced only if a VTCA is in compliance with all aspects of this CP. |
Any authority PKC issued by a VTCA MUST contain a valid reference to the applicable CP. This CP may be referenced only if a VTCA is in compliance with all aspects of this CP. |
1.2 IDENTIFICATION |
---|
Each PKC issued by a VTCA MUST reference an Object Identifier (OID) that identifies this CP document. The PKC MUST also include an OID indicating the Level of Assurance (LOA) that applies to that PKC. How this is to be achieved is described in the remainder of this section with further detail provided in the associated CPS document |
Each authority PKC issued by a VTCA MUST reference an Object Identifier (OID) that identifies this CP document. End entity PKCs SHOULD include an OID indicating the Level of Assurance (LOA) that applies to that PKC. How this is to be achieved is described in the remainder of this section with further detail provided in the associated CPS document |
|
No Stipulation. |
The Virginia Tech Root CA may interoperate with CAs external to this policy domain for the sole purpose of having the |
1.4.1 Specification Administration Organization |
---|
The Policy Management Authority (PMA) for this CP MUST be identified by postal address, office location, and other contact information in the applicable CPS. The Policy Management Authority (PMA) is appointed by the Vice President for Information Technology who reports to the President. |
The Policy Management Authority (PMA) for this CP MUST be identified by postal address, office location, and other contact information in the applicable CPS. The Policy Management Authority (PMA) is appointed by the Vice President for Information Technology/Chief Information Officer (VPIT/CIO) who reports to the President. |
1.4.2 Contact Person |
---|
Questions about interpretation of this CP should be directed to Information Resource Management. Concerns about possible abuse of this CP, should be directed in writing to the Virginia Tech Public Key Infrastructure Policy Management Authority (VTPKI PMA). |
Questions about interpretation of this CP should be directed to Identity Management Services. Concerns about possible abuse of this CP, should be directed in writing to the Virginia Tech Public Key Infrastructure Policy Management Authority (VTPKI PMA). |
2.1.1 CA Obligations |
A VTCA SHALL NOT issue any PKC with a Level of Assurance higher than that in its authority PKC.
|
Delete this sentence: "A VTCA SHALL NOT issue any PKC with a Level of Assurance higher than that in its authority PKC." The specifics of LOA implemenatation are defined in the associated CPS documents. |
3.3 OBTAINING A NEW CERTIFICATE AFTER REVOCATION |
---|
A public key with an associated PKC which has been revoked for private key compromise MUST NOT be recertified. The public key MAY be recertified if the PKC was merely suspended. In the latter case, identification of the Subject MAY be accomplished with the same procedure indicated in section 3.1 for initial registration, or by using a digitally signed request using the suspended PKC. Such a request MUST be sent to a VTCA during the period of validity of the PKC to be restored. |
A public key with an associated PKC which has been revoked for private key compromise MUST NOT be recertified. The Subscriber is responsible for rekeying when submitting a new certificate signing request to insure that when the new PKC is created, it has a new, different public key (corresponding to a new, different private key) and a different serial number is assigned by the CA. |
|
---|
A VTCA MUST accept as a revocation request an appropriate message digitally signed with the PKC to be revoked as long as it is still valid and not already revoked or suspended. The same procedures adopted for Subject identity during initial registration MAY also be used. Alternative procedures MAY be supported but MUST be detailed in the relevant CPS. |
A VTCA MUST accept as appropriate, a revocation request sent as a digitally signed message which specifies the PKC to be revoked. The same procedures adopted for Subject identity during initial registration MAY also be used. Alternative procedures MAY be supported but MUST be detailed in the relevant CPS. |
4.2 CERTIFICATE ISSUANCE |
---|
Upon receiving the request, a VTCA SHALL: |
Upon receiving the request, a VTCA SHALL: |
5.2.1.1 Certification Authority Administrator (CAA) |
The Certification Authority Administrator (CAA) role and the corresponding procedures a CAA will follow shall be defined in detail in the applicable CPS. Primarily, a CAA's responsibilities are: |
The Certification Authority Administrator (CAA) role and the corresponding procedures a CAA will follow shall be defined in detail in the applicable CPS. Primarily, a CAA's responsibilities are:
|
5.2.1.2 Registration Authority Administrator (RAA) |
---|
The Registration Authority Administrator (RAA) role and the corresponding procedures a RAA will follow shall be defined in detail in the applicable CPS. Primarily, an RAA's responsibilities are: |
The Registration Authority Administrator (RAA) role and the corresponding procedures a RAA will follow shall be defined in detail in the applicable CPS. Primarily, an RAA's responsibilities are: |
|
---|
A VTCA SHALL, in its CPS, define other trusted roles to which shall be allocated responsibilities that ensure the proper, safe, and secure operation of a VTCA's equipment and procedures. These responsibilities include: |
A VTCA SHALL, in its CPS, define other trusted roles to which shall be allocated responsibilities that ensure the proper, safe, and secure operation of a VTCA's equipment and procedures. These responsibilities include: |
3 Comments
Mary Dunker
Mar 20, 2009I still need to re-read the existing CP document, but I think I understand the recommended changes except for the following. Where possible, I think we should avoid being too specific to the EJBCA in our policies.
Questions:
2.1.1 - Is the fact that the EJBCA does not check to see if a public key s being reused present any security problems?
3.3 Will the subscriber have the ability to ensure that the new PKC has a different public key and different serial number? If the public key is the same, what, if anything, should be said about the private key?
4.2 Consistent with my thoughts of not being too specific to the EJBCA, do we really need to specify what the RAA should do as opposed to using the general term VTCA? Specific RAA duties are outlined elsewhere so could we use the more general reference to the VTCA in section 4.2?
5.2.1.1 Who is the CA administrator for the EJBCA? (Currently, IMS is CA Admin for Class 1 Server & Middleware CA. Not sure for Root CA.) Is it appropriate for the CAA to install and configure new CA software releases? I need some help clarifying roles.
5.2.1.3 Why is the CAA removed from the restrictions described for other roles?
Mary Dunker
Apr 10, 2009These changes appear consistent with our discussion on March 31, 2009.
William Dougherty II
Jul 07, 2009We should be consistent with the use of the word(s) ensure. Two forms are used for the same purpose as in section 3.3 and section 5.2.1.3. I think "ensure" is proper in both places.