
Standard X.509 v3 Certificate Extensions
736
Red Hat Certificate System Administrator’s Guide • September 2005
Criticality
PKIX Part 1 recommends that this extension be marked noncritical.
Discussion
The Issuer Alternative Name extension is used to associate Internet-style identities with the
certificate issuer. Names must use the forms defined for subjectAltName.
CS Version Support
Supported since CS 4.2. Refer to “IssuerAltNameExt” on page 510.
keyUsage
OID
2.5.29.15
Criticality
This extension may be critical or noncritical. PKIX Part 1 recommends that it should be
marked critical if it is used.
Discussion
The Key Usage extension defines the purpose of the key contained in the certificate. The
Key Usage, Extended Key Usage, Basic Constraints, and
Netscape
Certificate Type
extensions act together to specify the purposes for which a certificate can be used. For more
information on interactions between these extensions in CA certificates, see “CA
Certificates and Extension Interactions” on page 749.
If this extension is included at all, set the bits as follows:
•
digitalSignature
(
0
) for SSL client certificates, S/MIME signing certificates, and
object-signing certificates.
•
nonRepudiation
(
1
) for some S/MIME signing certificates and object-signing
certificates. Note, however, that the use of this bit is controversial. You should
carefully consider the legal consequences of its use before setting it for any certificate.
•
keyEncipherment
(
2
) for SSL server certificates and S/MIME encryption
certificates.
•
dataEncipherment
(
3
) when the subjects’s public key is used to encipher user data
(as opposed to key material).
•
keyAgreement
(
4
) whenever the subject’s public key is used for key agreement.
•
keyCertSign
(
5
) for all CA signing certificates
•
cRLSign
(
6
) for CA signing certificates that are used to sign CRLs
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...