Knowledge

Certification Practice Statement

Source 📝

87:
Because individuals act as certifiers in a web of trust, individual CPS documents are sometimes used. For example, in a PGP WoT, the CPS might state that the certifying entity checked two forms of legal government ID before signing the person's public key.
102:
When verifying digital signatures, it's necessary to review the CPS so as to determine the meaning of the issuance of the certificate by the certifying entity.
55:
By detailing the practice of issuance, revocation and renewal, a CPS aids entities in judging the relative reliability of a given certificate authority.
174: 143: 220: 189: 156: 120:"Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework" 215: 29: 64: 21: 8: 70: 170: 139: 97: 194: 190:
Microsoft.com "Creating Certificate Policies and Certificate Practice Statements"
209: 119: 82: 25: 69:
In a certificate authority, the CPS should derive from the organization's
200: 157:"Creating Certificate Policies and Certificate Practice Statements" 169:
American Bar Association Digital Signature Guidelines 1996,
138:
American Bar Association Digital Signature Guidelines 1996,
124: 35:
Some elements of a CPS include documenting practices of:
28:
which describes their practice for issuing and managing
207: 73:and may be referenced in issued certificates. 58: 208: 128:. November 2003. p. 15. RFC 3647. 201:http://www.grep.be/gpg/cert-policy-v2 199:Example of a CPS for a Web of Trust: 91: 13: 14: 232: 183: 18:Certification Practice Statement 76: 163: 149: 132: 112: 1: 105: 7: 20:(CPS) is a document from a 10: 237: 95: 80: 62: 221:Public-key cryptography 59:Certificate authorities 30:public key certificates 65:Certificate authority 22:certificate authority 92:Digital signatures 71:certificate policy 98:Digital signature 24:or a member of a 228: 177: 167: 161: 160: 153: 147: 136: 130: 129: 116: 236: 235: 231: 230: 229: 227: 226: 225: 206: 205: 195:Security policy 186: 181: 180: 168: 164: 155: 154: 150: 146:(section 1.8.1) 137: 133: 118: 117: 113: 108: 100: 94: 85: 79: 67: 61: 12: 11: 5: 234: 224: 223: 218: 216:Key management 204: 203: 197: 192: 185: 184:External links 182: 179: 178: 162: 148: 131: 110: 109: 107: 104: 96:Main article: 93: 90: 81:Main article: 78: 75: 63:Main article: 60: 57: 53: 52: 49: 46: 43: 40: 9: 6: 4: 3: 2: 233: 222: 219: 217: 214: 213: 211: 202: 198: 196: 193: 191: 188: 187: 176: 175:1-57073-250-7 172: 166: 158: 152: 145: 144:1-57073-250-7 141: 135: 127: 126: 121: 115: 111: 103: 99: 89: 84: 74: 72: 66: 56: 50: 47: 44: 41: 38: 37: 36: 33: 31: 27: 23: 19: 165: 151: 134: 123: 114: 101: 86: 83:Web of trust 77:Web of trust 68: 54: 34: 26:web of trust 17: 15: 42:publication 210:Categories 106:References 48:revocation 45:archiving 39:issuance 51:renewal 173:  142:  171:ISBN 140:ISBN 125:IETF 212:: 122:. 32:. 16:A 159:.

Index

certificate authority
web of trust
public key certificates
Certificate authority
certificate policy
Web of trust
Digital signature
"Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework"
IETF
ISBN
1-57073-250-7
"Creating Certificate Policies and Certificate Practice Statements"
ISBN
1-57073-250-7
Microsoft.com "Creating Certificate Policies and Certificate Practice Statements"
Security policy
http://www.grep.be/gpg/cert-policy-v2
Categories
Key management
Public-key cryptography

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.