subjectKeyIdentifier
467
B.3.16. subjectKeyIdentifier
The Subject Key Identifier extension identifies the public key certified by this certificate. This extension
provides a way of distinguishing public keys if more than one is available for a given subject name.
The value of this extension should be calculated by performing a SHA-1 hash of the certificate's DER-
encoded
subjectPublicKey
, as recommended by PKIX. The Subject Key Identifier extension is
used in conjunction with the Authority Key Identifier extension for CA certificates. If the CA certificate
has a Subject Key Identifier extension, the key identifier in the Authority Key Identifier extension of the
certificate being verified should match the key identifier of the CA's Subject Key Identifier extension. It
is not necessary for the verifier to recompute the key identifier in this case.
PKIX Part 1 requires this extension for all CA certificates and recommends it for all other certificates.
OID
2.5.29.14
Criticality
This extension is always noncritical.
B.4. CRL Extensions
B.4.1. About CRL Extensions
Since its initial publication, the X.509 standard for CRL formats has been amended to include
additional information within a CRL. This information is added through CRL extensions.
The extensions defined by ANSI X9 and ISO/IEC/ITU for X.509 CRLs [X.509] [X9.55] allow additional
attributes to be associated with CRLs. The
Internet X.509 Public Key Infrastructure Certificate and
CRL Profile
, available at
RFC 5280
4
, recommends a set of extensions to be used in CRLs. These
extensions are called
standard CRL extensions
.
The standard also allows custom extensions to be created and included in CRLs. These extensions
are called
private
,
proprietary
, or
custom
CRL extensions and carry information unique to an
organization or business. Applications may not able to validate CRLs that contain private critical
extensions, so it is not recommended that custom extensions be used in a general context.
NOTE
Abstract Syntax Notation One (ASN.1) and Distinguished Encoding Rules (DER)
standards are specified in the CCITT Recommendations X.208 and X.209. For a quick
summary of ASN.1 and DER, see
A Layman's Guide to a Subset of ASN.1, BER, and
DER
, which is available at RSA Laboratories' web site,
http://www.rsa.com
.
B.4.1.1. Structure of CRL Extensions
A CRL extension consists of the following parts:
4
http://www.ietf.org/rfc/rfc5280.txt
Содержание CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Страница 1: ...Red Hat Certificate System 8 0 Admin Guide Publication date July 22 2009 updated on March 25 2010 ...
Страница 42: ...20 ...
Страница 43: ...Part I Setting up Certificate Services ...
Страница 44: ......
Страница 190: ...168 ...
Страница 208: ...186 ...
Страница 223: ...Part II Additional Configuration to Manage CA Services ...
Страница 224: ......
Страница 256: ...234 ...
Страница 270: ...248 ...
Страница 280: ...258 ...
Страница 292: ...270 ...
Страница 293: ...Part III Managing the Subsystem Instances ...
Страница 294: ......
Страница 363: ...Managing RA Users 341 5 The user details page shows the person s UID full name email address and user SSL certificate ...
Страница 408: ...386 ...
Страница 438: ...416 ...
Страница 439: ...Part IV References ...
Страница 440: ......
Страница 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Страница 504: ...482 ...
Страница 556: ...534 ...
Страница 564: ...542 ...