![Red Hat CERTIFICATE 7.1 ADMINISTRATOR Скачать руководство пользователя страница 734](http://html.mh-extra.com/html/red-hat/certificate-7-1-administrator/certificate-7-1-administrator_administrators-manual_1427416734.webp)
Standard X.509 v3 Certificate Extensions
734
Red Hat Certificate System Administrator’s Guide • September 2005
Criticality
PKIX recommends that this extension be marked noncritical and that it be supported for all
certificates.
Discussion
This extension defines how CRL information for this certificate is to be obtained. It should
be used if the system is configured to use CRL issuing points.
If the extension contains a
DistributionPointName
of type URI, the URI is assumed to
be a pointer to the current CRL for the associated reasons and will be issued by the
associated
cRLIssuer
. The expected values for the URI are those defined for the
subjectAltName
extension. If the
distributionPoint
omits reasons, the CRL must
include revocations for all reasons. If the
distributionPoint
omits
cRLIssuer
, the
CRL must be issued by the CA that issued the certificate.
PKIX recommends that this extension be supported by CAs and applications.
CS Version Support
Supported since CS 4.1. Refer to “CRLDistributionPointsExt” on page 501.
extKeyUsage
OID
2.5.29.37
Criticality
If this extension is marked critical, the certificate must be used for one of the indicated
purposes only. If it is not marked critical, it is treated as an advisory field that may be used
to identify keys but does not restrict the use of the certificate to the indicated purposes.
Discussion
The Extended Key Usage extension indicates one or more purposes for which the certified
public key may be used. These purposes may be in addition to or in place of the basic
purposes indicated in the key usage extension.
The Extended Key Usage extension must include OCSP Signing in an OCSP responder’s
certificate (unless the CA signing key that signed the certificates validated by the responder
is also the OCSP signing key). The OCSP responder’s certificate must be issued directly by
the CA that signs certificates the responder will validate.
The Key Usage, Extended Key Usage, and Basic Constraints extensions act together to
define the purposes for which the certificate is intended to be used. Applications can use
these extensions to disallow the use of a certificate in inappropriate contexts.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...