Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
1Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
Table of Contents 1. Introduction................................................................................................1 1.1. Overview.......................................................................................................1 1.2. Document Name

Table of Contents 1. Introduction................................................................................................1 1.1. Overview.......................................................................................................1 1.2. Document Name

Ratings: (0)|Views: 21 |Likes:
Published by api-14681266

More info:

Published by: api-14681266 on Aug 10, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

05/11/2014

pdf

text

original

 
TABLE OF CONTENTS1. INTRODUCTION................................................................................................1
1.1. Overview.......................................................................................................11.2. Document Name and Identification..............................................................21.3. PKI Participants............................................................................................31.3.1. Certification Authorities..........................................................................31.3.2. Registration Authorities..........................................................................51.3.3. Subscribers (End Entities).....................................................................61.3.4. Relying Parties.......................................................................................71.3.5. Other Participants..................................................................................71.4. Certificate Usage..........................................................................................81.4.1. Appropriate Certificate Uses..................................................................81.4.2. Prohibited Certificate Uses....................................................................81.5. Policy Administration....................................................................................81.5.1. Organization Administering the Document............................................91.5.2. Contact Person......................................................................................91.5.3. Person Determining CPS Suitability for the Policy..............................101.5.4. CPS Approval Procedures...................................................................101.6. Definitions and Acronyms...........................................................................101.6.1. Definitions............................................................................................141.6.2. Acronyms.............................................................................................14
2. PUBLICATION AND REPOSITORY RESPONSIBILITIES..............................15
2.1. Repositories...............................................................................................152.2. Publication of Certification Information......................................................162.3. Time or Frequency of Publication..............................................................162.4. Access Controls on Repositories...............................................................16
3.IDENTIFICATION AND AUTHENTICATION.....................................................17
3.1.Naming........................................................................................................173.1.1.Types of Names....................................................................................173.1.2.Need for Names to be Meaningful........................................................173.1.3.Anonymity or Pseudonymity of Subscribers.........................................183.1.4.Rules for Interpreting Various Name Forms.........................................183.1.5.Uniqueness of Names..........................................................................183.1.6.Recognition, Authentication, and Role of Trademarks.........................183.2.Initial Identity Validation...............................................................................183.2.1.Method to Prove Possession of Private Key........................................183.2.2.Authentication of Organization Identity.................................................193.2.3.Authentication of Individual Identity .....................................................193.2.4.Non-Verified Subscriber Information....................................................203.2.5.Validation of Authority...........................................................................203.2.6.Criteria for Interoperation......................................................................203.3.Identification and Authentication for Re-key Requests...............................203.3.1.Identification and Authentication for Routine Re-key...........................203.3.2.Identification and Authentication for Re-key after Revocation.............213.4.Identification and Authentication for Revocation Request..........................21
4.CERTIFICATE LIFE-CYCLE OPERATIONAL REQUIREMENTS ...................23
DOEGrids CA Certificate Policy and Certification Practice Statement v3.1ii
 
4.1.Certificate Application..................................................................................234.1.1.Who Can Submit a Certificate Application...........................................234.1.2.Enrollment Process and Responsibilities.............................................234.2.Certificate Application Processing...............................................................244.2.1.Performing Identification and Authentication Functions.......................244.2.2.Approval or Rejection of Certificate Applications.................................244.2.3.Time to Process Certificate Applications..............................................244.3.Certificate Issuance.....................................................................................244.3.1.CA Actions during Certificate Issuance................................................244.3.2.Notification to Subscriber by the CA of Issuance of Certificate............254.4.Certificate Acceptance................................................................................254.4.1.Conduct Constituting Certificate Acceptance.......................................254.4.2.Publication of the Certificate by the CA................................................254.4.3.Notification of Certificate Issuance by the CA to Other Entities...........254.5.Key Pair and Certificate Usage...................................................................254.5.1.Subscriber Private Key and Certificate Usage.....................................254.5.2.Relying Party Public Key and Certificate Usage..................................264.6.Certificate Renewal.....................................................................................264.6.1.Circumstance for Certificate Renewal..................................................264.6.2.Who May Request Renewal.................................................................264.6.3.Processing Certificate Renewal Requests...........................................274.6.4.Notification of New Certificate Issuance to Subscriber........................274.6.5.Conduct Constituting Acceptance of a Renewal Certificate.................274.6.6.Publication of the Renewal Certificate by the CA.................................274.6.7.Notification of Certificate Issuance by the CA to Other Entities...........274.7.Certificate Re-key........................................................................................274.7.1.Circumstance for Certificate Re-key.....................................................274.7.2.Who May Request Certification of a New Public Key..........................284.7.3.Processing Certificate Re-keying Requests.........................................284.7.4.Notification of New Certificate Issuance to Subscriber........................284.7.5.Conduct Constituting Acceptance of a Re-keyed Certificate...............284.7.6.Publication of the Re-keyed Certificate by the CA...............................284.7.7.Notification of Certificate Issuance by the CA to Other Entities...........284.8.Certificate Modification................................................................................284.8.1.Circumstances for Certificate Modification...........................................284.8.2.Who May Request Certificate Modification..........................................284.8.3.Processing Certificate Modification Requests......................................294.8.4.Notification of New Certificate Issuance to Subscriber........................294.8.5.Conduct Constituting Acceptance of Modified Certificate....................294.8.6.Publication of the Modified Certificate by the CA.................................294.8.7.Notification of Certificate Issuance by the CA to Other Entities...........294.9.Certificate Revocation and Suspension......................................................294.9.1.Circumstances for Revocation.............................................................294.9.2.Who Can Request Revocation.............................................................304.9.3.Procedure for Revocation Request......................................................304.9.4.Revocation Request Grace Period.......................................................31DOEGrids CA Certificate Policy and Certification Practice Statement v3.1iii

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->