Policy Constraints Extension Default
441
The following constraints can be defined with this default:
• Extension Constraint; see
Section B.2.3, “Extension Constraint”
.
• No Constraints; see
Section B.2.6, “No Constraint”
.
Parameter
Description
critical
Select
true
to mark this extension critical; select
false
to mark the extension noncritical.
Table B.11. OCSP No Check Extension Default Configuration Parameters
B.1.14. Policy Constraints Extension Default
This default attaches a Policy Constraints extension to the certificate. The extension, which can be
used in CA certificates only, constrains path validation in two ways: either to prohibit policy mapping or
to require that each certificate in a path contain an acceptable policy identifier. The default can specify
both
ReqExplicitPolicy
and
InhibitPolicyMapping
. PKIX standard requires that, if present
in the certificate, the extension must never consist of a null sequence. At least one of the two specified
fields must be present.
For general information about this extension, see
Section B.3.11, “policyConstraints”
.
The following constraints can be defined with this default:
• Extension Constraint; see
Section B.2.3, “Extension Constraint”
.
• No Constraints; see
Section B.2.6, “No Constraint”
.
Parameter
Description
critical
Select
true
to mark this extension critical; select
false
to mark the extension noncritical.
reqExplicitPolicy
Specifies the total number of certificates
permitted in the path before an explicit policy is
required. This is the number of CA certificates
that can be chained below the subordinate
CA certificate before an acceptable policy is
required.
•
-1
specifies that the field should not be set in
the extension.
•
0
specifies that no subordinate CA certificates
are permitted in the path before an explicit
policy is required.
•
n
must be an integer that is greater than
zero. It specifies the maximum number of
subordinate CA certificates allowed in the path
before an explicit policy is required.
This number affects the number of CA
certificates to be used during certificate
validation. The chain starts with the end-entity
Содержание CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Страница 1: ...Red Hat Certificate System 8 0 Admin Guide Publication date July 22 2009 updated on March 25 2010 ...
Страница 42: ...20 ...
Страница 43: ...Part I Setting up Certificate Services ...
Страница 44: ......
Страница 190: ...168 ...
Страница 208: ...186 ...
Страница 223: ...Part II Additional Configuration to Manage CA Services ...
Страница 224: ......
Страница 256: ...234 ...
Страница 270: ...248 ...
Страница 280: ...258 ...
Страница 292: ...270 ...
Страница 293: ...Part III Managing the Subsystem Instances ...
Страница 294: ......
Страница 363: ...Managing RA Users 341 5 The user details page shows the person s UID full name email address and user SSL certificate ...
Страница 408: ...386 ...
Страница 438: ...416 ...
Страница 439: ...Part IV References ...
Страница 440: ......
Страница 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Страница 504: ...482 ...
Страница 556: ...534 ...
Страница 564: ...542 ...