![Netscape Certificate Management System 6.2 Administrator'S Manual Download Page 525](http://html1.mh-extra.com/html/netscape/certificate-management-system-6-2/certificate-management-system-6-2_administrators-manual_1674697525.webp)
Extension-Specific Policy Module Reference
Chapter
11
Policies
525
GenericASN1Ext
The
GenericASN1Ext
plug-in module enables you to add custom extensions to
certificates. Using this policy, you can add as many ASN.1 type based-extensions
as required without having to write any code. Further, it eliminates the
dependency on the command-line tools for generating base-64 encoded standard
extensions from the x.509 extension classes.
The generic extension policy in CMS accepts custom extensions in the form of
object identifiers (OIDs) and values as DER-encoded extension values. That is, for
the server to add a custom extension to certificates it issues, you need to first define
the extension and then configure the server with extension details.
Similar to a standard extension, you define a custom extension by defining an OID
and a ASN.1 structure.
•
The OID must be specified in the dot-separated numeric component notation
(for example, 2.5.29.35). Although you can invent your own OIDs for the
purposes of evaluating and testing the server, in a production environment,
you should comply with the ISO rules for defining OIDs and for registering
subtrees of IDs. See Appendix H, “Object Identifiers” for information on
allocating private OIDs.
•
The ASN.1 structure must be constructed from a sequence of DER-encoded
extension values.
The resulting extension would look similar to the way a standard extension
appears in certificates (as defined in RFC 2459):
Extension ::= SEQUENCE {
extnID OBJECT IDENTIFIER,
critical BOOLEAN DEFAULT FALSE,
extnValue OCTET STRING }
In the policy configuration, the
extnID
field is defined by the
oid
parameter, the
critical
field is defined by the
critical
parameter, and the
extnValue
field is
defined by evaluating the expression in the
pattern
parameter, which in turn is
defined by the
attribute
parameters. See Table 11-24 on page 527 for details on
individual parameters.
Typically, the application receiving the certificate checks the extension ID to
determine if it can recognize the ID. If it can, it uses the extension ID to determine
the type of value used. When adding your custom extension to certificates, keep in
mind that if the extension exists in a certificate and if it is marked critical, the
Summary of Contents for Certificate Management System 6.2
Page 1: ...Administrator s Guide Netscape Certificate Management System Version6 2 June 2003...
Page 22: ...22 Netscape Certificate Management System Administrator s Guide June 2003...
Page 30: ...Documentation 30 Netscape Certificate Management System Administrator s Guide June 2003...
Page 84: ...Uninstalling CMS 84 Netscape Certificate Management System Administrator s Guide June 2003...
Page 380: ...ACL Reference 380 Netscape Certificate Management System Administrator s Guide June 2003...
Page 750: ...Object Identifiers 750 Netscape Certificate Management System Administrator s Guide June 2003...
Page 828: ...Managing Certificates 828 Netscape Certificate Manager System Administrator s Guide June 2003...
Page 844: ...The SSL Handshake 844 Netscape Certificate Manager System Administrator s Guide June 2003...
Page 862: ...862 Netscape Certificate Management System Administrator s Guide June 2003...