87:
Because individuals act as certifiers in a web of trust, individual CPS documents are sometimes used. For example, in a PGP WoT, the CPS might state that the certifying entity checked two forms of legal government ID before signing the person's public key.
102:
When verifying digital signatures, it's necessary to review the CPS so as to determine the meaning of the issuance of the certificate by the certifying entity.
55:
By detailing the practice of issuance, revocation and renewal, a CPS aids entities in judging the relative reliability of a given certificate authority.
174:
143:
220:
189:
156:
120:"Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework"
215:
29:
64:
21:
8:
70:
170:
139:
97:
194:
190:
Microsoft.com "Creating
Certificate Policies and Certificate Practice Statements"
209:
119:
82:
25:
69:
In a certificate authority, the CPS should derive from the organization's
200:
157:"Creating Certificate Policies and Certificate Practice Statements"
169:
American Bar
Association Digital Signature Guidelines 1996,
138:
American Bar
Association Digital Signature Guidelines 1996,
124:
35:
Some elements of a CPS include documenting practices of:
28:
which describes their practice for issuing and managing
207:
73:and may be referenced in issued certificates.
58:
208:
128:. November 2003. p. 15. RFC 3647.
201:http://www.grep.be/gpg/cert-policy-v2
199:Example of a CPS for a Web of Trust:
91:
13:
14:
232:
183:
18:Certification Practice Statement
76:
163:
149:
132:
112:
1:
105:
7:
20:(CPS) is a document from a
10:
237:
95:
80:
62:
221:Public-key cryptography
59:Certificate authorities
30:public key certificates
65:Certificate authority
22:certificate authority
92:Digital signatures
71:certificate policy
98:Digital signature
24:or a member of a
228:
177:
167:
161:
160:
153:
147:
136:
130:
129:
116:
236:
235:
231:
230:
229:
227:
226:
225:
206:
205:
195:Security policy
186:
181:
180:
168:
164:
155:
154:
150:
146:(section 1.8.1)
137:
133:
118:
117:
113:
108:
100:
94:
85:
79:
67:
61:
12:
11:
5:
234:
224:
223:
218:
216:Key management
204:
203:
197:
192:
185:
184:External links
182:
179:
178:
162:
148:
131:
110:
109:
107:
104:
96:Main article:
93:
90:
81:Main article:
78:
75:
63:Main article:
60:
57:
53:
52:
49:
46:
43:
40:
9:
6:
4:
3:
2:
233:
222:
219:
217:
214:
213:
211:
202:
198:
196:
193:
191:
188:
187:
176:
175:1-57073-250-7
172:
166:
158:
152:
145:
144:1-57073-250-7
141:
135:
127:
126:
121:
115:
111:
103:
99:
89:
84:
74:
72:
66:
56:
50:
47:
44:
41:
38:
37:
36:
33:
31:
27:
23:
19:
165:
151:
134:
123:
114:
101:
86:
83:Web of trust
77:Web of trust
68:
54:
34:
26:web of trust
17:
15:
42:publication
210:Categories
106:References
48:revocation
45:archiving
39:issuance
51:renewal
173:
142:
171:ISBN
140:ISBN
125:IETF
212::
122:.
32:.
16:A
159:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.