Extension-Specific Policy Module Reference
526
Netscape Certificate Management System Administrator’s Guide • February 2003
Note that the
OCSPSigningExt
policy rule must remain enabled if your PKI setup
includes a CA-delegated OCSP responder and you want to issue an OCSP
responder certificate to that server; the rule adds the extended key usage extension
to an OCSP responder certificate indicating that the associated key can be used for
signing OCSP responses.
Table 11-23
ExtendedKeyUsageExt Configuration Parameters
Parameter
Description
enable
Specifies whether the rule is enabled or disabled. Select to enable, deselect to disable.
predicate
Specifies the predicate expression for this rule. If you want this rule to be applied to
all certificate requests, leave the field blank (default). To form a predicate expression,
see “Using Predicates in Policy Rules” on page 485.
critical
Specifies whether the extension should be marked critical or noncritical. Select to
mark critical (default), deselect to mark noncritical (default).
numIds
Specifies the total number of key-usage purposes to be contained or allowed in the
extension. Can be set to either
0
specifying that no key-usage purposes can be
contained in the extension or
n
specifies the total number of key-usage purposes to be
included in the extension; it must be an integer greater than zero. The default value is
10
.
Note that for any number other than O in this field, a id-<n> field will be created for
each key-usage purpose, you must specify a valid OID; otherwise the policy rule will
return an error. Configuration parameters for each key-usage purposes is
distinguished by
<n>
, which is an integer derived from the value you assign in this
field. For example, if you set the
numIds
parameter to 2,
<n>
would be
0
and
1
.
id<n>
Specifies the OID that identifies a key-usage purpose.
Permissible values: A unique, valid OID specified in the dot-separated numeric
component notation. Depending on the key-usage purposes, you may choose to use
the OIDs designated by PKIX (listed in Table 11-22 on page 525) or define your own
OIDs. If you’re defining your own OID, it should be in the registered subtree of IDs
reserved for your company’s use. Although you can invent your own OIDs for the
purposes of evaluating and testing this server, in a production environment, you
should comply with the ISO rules for defining OIDs and for registering subtrees of
IDs. See
Appendix H, “Object Identifiers”
for information on allocating private
OIDs.
Example:
2.16.840.1.113730.1.99
Содержание Certificate Management System 6.1
Страница 1: ...Administrator s Guide Netscape Certificate Management System Version6 1 February 2003...
Страница 28: ...Documentation 28 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 68: ...Support for Open Standards 68 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 82: ...Uninstalling CMS 82 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 166: ...How a Registration Manager Works 166 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 382: ...ACL Reference 382 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 566: ...Managing Policy Plug in Modules 566 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 710: ...1 3 Organization Security Policies 710 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 716: ...Object Identifiers 716 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 762: ...DNs in Certificate Management System 762 Netscape Certificate Management System Administrator s Guide February 2003...
Страница 794: ...Managing Certificates 794 Managing Servers with Netscape Console December 2001...
Страница 810: ...The SSL Handshake 810 Managing Servers with Netscape Console December 2001...
Страница 828: ...828 Netscape Certificate Management System Administrator s Guide February 2003...