ISO/IEC 9594-8
(Main)Technologies de l'information -- Interconnexion de systèmes ouverts (OSI)
General Information
RELATIONS
Buy Standard
Standards Content (sample)
INTERNATIONAL ISO/IEC
STANDARD 9594-8
Ninth edition
Information technology — Open
systems interconnection —
Part 8:
The Directory: Public-key and
attribute certificate frameworks
PROOF/ÉPREUVE
Reference number
ISO/IEC 9594-8:2020(E)
ISO/IEC 2020
---------------------- Page: 1 ----------------------
ISO/IEC 9594-8:2020(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii PROOF/ÉPREUVE © ISO/IEC 2020 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 9594-8:2020(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of document should be noted (see www.iso.org/directives).Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details
of any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC list of patent
declarations received (see http://patents.iec.ch).Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the World
Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT),see www.iso.org/iso/foreword.html.
This document was prepared by ITU-T as ITU-T X.509 (10/2019) and drafted in accordance with its
editorial rules. It was adopted by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 6, Telecommunications and information exchange between systems.A list of all parts in the ISO/IEC 9594 series can be found on the ISO website.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.© ISO/IEC 2020 – All rights reserved iii
---------------------- Page: 3 ----------------------
ISO/IEC 9594-8:2020 (E)
CONTENTS
Page
SECTION 1 – General ............................................................................................................................................... 1
1 Scope .............................................................................................................................................................. 1
2 Normative references...................................................................................................................................... 1
2.1 Identical Recommendations | International Standards ........................................................................ 1
2.2 Paired Recommendations | International Standards equivalent in technical content ........................... 2
2.3 Recommendations ............................................................................................................................... 2
2.4 Other references .................................................................................................................................. 2
3 Definitions ...................................................................................................................................................... 3
3.1 OSI Reference Model security architecture definitions....................................................................... 3
3.2 Baseline identity management terms and definitions .......................................................................... 3
3.3 Directory model definitions ................................................................................................................ 3
3.4 Access control framework definitions ................................................................................................. 3
3.5 Public-key and attribute certificate definitions .................................................................................... 3
4 Abbreviations ................................................................................................................................................. 7
5 Conventions .................................................................................................................................................... 8
6 Frameworks overview .................................................................................................................................... 8
6.1 Digital signatures ................................................................................................................................ 9
6.2 Public-key cryptography and cryptographic algorithms...................................................................... 10
6.3 Distinguished encoding of basic encoding rules ................................................................................. 12
6.4 Applying distinguished encoding ........................................................................................................ 12
6.5 Using repositories ................................................................................................................................ 13
SECTION 2 – PUBLIC-KEY CERTIFICATE FRAMEWORK ............................................................................... 14
7 Public keys and public-key certificates .......................................................................................................... 14
7.1 Introduction ......................................................................................................................................... 14
7.2 Public-key certificate........................................................................................................................... 14
7.3 Public-key certificate extensions ......................................................................................................... 17
7.4 Types of public-key certificates .......................................................................................................... 18
7.5 Trust anchor ........................................................................................................................................ 18
7.6 Entity relationship ............................................................................................................................... 19
7.7 Certification path ................................................................................................................................. 19
7.8 Generation of key pairs ....................................................................................................................... 21
7.9 Public-key certificate creation ............................................................................................................. 21
7.10 Certificate revocation list .................................................................................................................... 22
7.11 Uniqueness of names ........................................................................................................................... 25
7.12 Indirect CRLs ...................................................................................................................................... 25
7.13 Repudiation of a digital signing .......................................................................................................... 26
8 Trust models ................................................................................................................................................... 27
8.1 Three-cornered trust model ................................................................................................................. 27
8.2 Four cornered trust model ................................................................................................................... 27
9 Public-key certificate and CRL extensions ..................................................................................................... 28
9.1 Policy handling .................................................................................................................................... 29
9.2 Key and policy information extensions ............................................................................................... 31
9.3 Subject and issuer information extensions .......................................................................................... 38
9.4 Certification path constraint extensions .............................................................................................. 41
9.5 Basic CRL extensions ......................................................................................................................... 45
9.6 CRL distribution points and delta CRL extensions ............................................................................. 52
9.7 Authorization and validation list extensions ....................................................................................... 57
9.8 Alternative cryptographic algorithms and digital signature extensions ............................................... 58
10 Delta CRL relationship to base ....................................................................................................................... 59
11 Authorization and validation lists ................................................................................................................... 60
11.1 Authorization and validation list concept ............................................................................................ 60
© ISO/IEC 2020 – All rights reservedRec. ITU-T X.509 (10/2019) v
---------------------- Page: 4 ----------------------
ISO/IEC 9594-8:2020 (E)
Page
11.2 The authorizer ..................................................................................................................................... 60
11.3 Authorization and validation list syntax .............................................................................................. 61
11.4 Multiple cryptographic algorithms for authorization and validation list ............................................. 62
12 Certification path processing procedure ......................................................................................................... 63
12.1 Path processing inputs ......................................................................................................................... 63
12.2 Path processing outputs ....................................................................................................................... 63
12.3 Path processing variables .................................................................................................................... 64
12.4 Initialization step ................................................................................................................................. 64
12.5 Public-key certificate processing ......................................................................................................... 65
13 PKI directory schema ..................................................................................................................................... 67
13.1 PKI directory object classes and name forms ...................................................................................... 67
13.2 PKI directory attributes ....................................................................................................................... 68
13.3 PKI directory matching rules .............................................................................................................. 72
13.4 PKI directory syntax definitions.......................................................................................................... 77
SECTION 3 – ATTRIBUTE CERTIFICATE FRAMEWORK ................................................................................ 80
14 Attribute certificates ....................................................................................................................................... 80
14.1 General ................................................................................................................................................ 80
14.2 Attribute certificate syntax .................................................................................................................. 81
14.3 Multiple cryptographic algorithms for attribute certificates ................................................................ 83
14.4 Delegation paths .................................................................................................................................. 83
14.5 Attribute certificate revocation lists .................................................................................................... 84
15 Attribute authority, source of authority and certification authority relationship ............................................ 86
15.1 Privilege in attribute certificates .......................................................................................................... 87
15.2 Privilege in public-key certificates ...................................................................................................... 87
16 PMI models .................................................................................................................................................... 87
16.1 General model ..................................................................................................................................... 87
16.2 Control model...................................................................................................................................... 89
16.3 Delegation model ................................................................................................................................ 90
16.4 Group assignment model ..................................................................................................................... 90
16.5 Roles model ......................................................................................................................................... 91
16.6 Recognition of Authority Model ......................................................................................................... 93
16.7 XML privilege information attribute ................................................................................................... 96
16.8 Permission attribute and matching rule ............................................................................................... 97
17 Attribute certificate and attribute certificate revocation list extensions ......................................................... 97
17.1 Basic privilege management extensions .............................................................................................. 98
17.2 Privilege revocation extensions ........................................................................................................... 101
17.3 Source of authority extensions ............................................................................................................ 107
17.4 Role extensions ................................................................................................................................... 109
17.5 Delegation extensions ......................................................................................................................... 110
17.6 Recognition of authority extensions .................................................................................................... 114
17.7 Use of alternative digital signature algorithm and digital signature extensions .................................. 117
18 Delegation path processing procedure ............................................................................................................ 118
18.1 Basic processing procedure ................................................................................................................. 118
18.2 Role processing procedure .................................................................................................................. 119
18.3 Delegation processing procedure ........................................................................................................ 119
19 PMI directory schema..................................................................................................................................... 121
19.1 PMI directory object classes ............................................................................................................... 121
19.2 PMI directory attributes ...................................................................................................................... 123
19.3 PMI general directory matching rules ................................................................................................. 125
Annex A – Public-key and attribute certificate frameworks ...................................................................................... 127
Annex B – Reference definition of cryptographic algorithms ................................................................................... 155
Annex C Certificate extension attribute types .......................................................................................................... 162
© ISO/IEC 2020 – All rights reservedvi Rec. ITU-T X.509 (10/2019)
---------------------- Page: 5 ----------------------
ISO/IEC 9594-8:2020 (E)
Page
C.1 Certificate extension attribute concept ................................................................................................ 162
C.2 Formal specification for certificate extension attribute types .............................................................. 162
Annex D – External ASN.1 modules ......................................................................................................................... 171
Annex E – CRL generation and processing rules ...................................................................................................... 180
E.1 Introduction ......................................................................................................................................... 180
E.2 Determine parameters for CRLs .......................................................................................................... 181
E.3 Determine CRLs required ................................................................................................................... 182
E.4 Obtain CRLs........................................................................................................................................ 183
E.5 Process CRLs ...................................................................................................................................... 183
Annex F – Examples of delta CRL issuance.............................................................................................................. 187
Annex G – Privilege policy and privilege attribute definition examples ................................................................... 189
G.1 Introduction ......................................................................................................................................... 189
G.2 Sample syntaxes .................................................................................................................................. 189
G.3 Privilege attribute example .................................................................................................................. 193
Annex H – An introduction to public key cryptography ......................................................................................... 194
Annex I – Examples of use of certification path constraints ..................................................................................... 196
I.1 Example 1: Use of basic constraints .................................................................................................... 196
I.2 Example 2: Use of policy mapping and policy constraints ................................................................. 196
I.3 Use of name constraints extension ...................................................................................................... 196
Annex J – Guidance on determining for which policies a certification path is valid ................................................. 205
J.1 Certification path valid for a user-specified policy required ............................................................... 205
J.2 Certification path valid for any policy required .................................................................................. 206
J.3 Certification path valid regardless of policy ....................................................................................... 206
J.4 Certification path valid for a user-specific policy desired, but not required ....................................... 206
Annex K – Key usage certificate extension issues .................................................................................................... 207
Annex L – Deprecated extensions ............................................................................................................................. 208
L.1 CRL scope extension ........................................................................................................................... 208
Annex M – Directory concepts .................................................................................................................................. 211
M.1 Scope ................................................................................................................................................... 211
M.2 The directory attribute concept............................................................................................................ 211
M.3 Basic directory concepts ...................................................................................................................... 211
M.4 Subtrees ............................................................................................................................................... 212
M.5 Directory distinguished names ............................................................................................................ 212
M.6 Directory schema ................................................................................................................................ 213
Annex N – Considerations on strong authentication ................................................................................................. 214
N.1 Introduction ......................................................................................................................................... 214
N.2 One-way authentication ....................................................................................................................... 215
N.3 Two-way authentication ...................................................................................................................... 215
N.4 Three-way authentication .................................................................................................................... 216
N.5 Five-way authentication (initiated by A) ............................................................................................. 217
N.6 Five-way authentication (initiated by B) ............................................................................................. 218
Annex O – Alphabetical list of information item definitions .................................................................................... 220
Annex P – Amendments and corrigenda ................................................................................................................... 223
Bibliography .............................................................................................................................................................. 224
© ISO/IEC 2020 – All rights reservedRec. ITU-T X.509 (10/2019) vii
---------------------- Page: 6 ----------------------
ISO/IEC 9594-8:2020 (E)
Introduction
Many applications have requirements for security to protect against threats to the communication of information. Virtually
all security services are dependent upon the identities of the communicating parties being reliably known, i.e.,
authenticated.This Recommendation | International Standard defines a framework for public-key certificates. This framework includes
the specification of data objects used to represent the public-key certificates themselves, as well as revocation notices for
issued public-key certificates that should no longer be trusted. It defines some critical components of a public-key
infrastructure (PKI), but it does not define a PKI in its entirety. However, this Recommendation | International Standard
provides the foundation upon which full PKIs and their specifications can be built.
Similarly, this Recommendation | International Standard defines a framework for attribute certificates. This framework
includes the specification of data objects used to represent the attribute certificates themselves, as well as revocation
notices for issued attribute certificates that should no longer be trusted. It defines some critical components of a privilege
management infrastructure (PMI), but it does not define a PMI in its entirety. However, this Recommendation |
International Standard provides the foundation upon which full PMIs and their specifications can be built.
Directory schema definitions allow PKI and PMI information to be represented in a directory according to the
specification found in the Directory Specifications (Rec. ITU-T X.500 | ISO/IEC 9594-1, Rec. ITU-T X.501 | ISO/IEC
9594-2, Rec. ITU-T X.511 | ISO/IEC 9594-3, Rec. ITU-T X.518 | ISO/IEC 9594-4, Rec. ITU-T X.519 | ISO/IEC 9594-5,
Rec. ITU-T X.520 | ISO/IEC 9594-6, Rec ITU-T X.521 | ISO/IEC 9594-7 and Rec. ITU-T X.525 | ISO/IEC 9594-9) or
according to the lightweight directory access protocol (LDAP) specification.This Recommendation | International Standard provides the foundation frameworks upon which industry profiles can be
defined by other standards groups and industry forums. Many of the features defined as optional in these frameworks may
be mandated for use in certain environments through profiles. This ninth edition technically revises and enhances the
eighth edition of this Recommendation | International Standard.This ninth edition specifies versions 1, 2 and 3 of public-key certificates, versions 1 and 2 of certificate revocation lists
and version 2 of attribute certificates.The extensibility function was added in an earlier edition with version 3 of the public-key certificate and with version 2
of the certificate revocation list and was incorporated into the attribute certificate from its initial inception.
Annex A, which is an integral part of this Recommendation | International Standard, provides the ASN.1 modules which
contain all of the definitions associated with the frameworks.Annex B, which is not an integral part of this Recommendation | International Standard, lists object identifiers assigned
to cryptographic algorithms defined by other specifications. It is provided for easy reference and import into other ASN.1
modules.Annex C, which is an integral part of this Recommendation | International Standard, provides definitions for how
certificate extension types may be represented by directory attribute types.Annex D, which is not an integral part of this Recommendation | International Standard, includes extracts of external
ASN.1 modules referenced by this Recommendation | International Standard.Annex E, which is an integral part of this Recommendation | Int
...
DRAFT INTERNATIONAL STANDARD
ISO/IEC DIS 9594-8
ISO/IEC JTC 1/SC 6 Secretariat: KATS
Voting begins on: Voting terminates on:
2020-03-30 2020-06-22
Information technology — Open systems
interconnection —
Part 8:
The Directory: Public-key and attribute certificate
frameworks
ICS: 35.100.70
THIS DOCUMENT IS A DRAFT CIRCULATED
FOR COMMENT AND APPROVAL. IT IS
THEREFORE SUBJECT TO CHANGE AND MAY
NOT BE REFERRED TO AS AN INTERNATIONAL
STANDARD UNTIL PUBLISHED AS SUCH.
IN ADDITION TO THEIR EVALUATION AS
BEING ACCEPTABLE FOR INDUSTRIAL,
This document is circulated as received from the committee secretariat.
TECHNOLOGICAL, COMMERCIAL AND
USER PURPOSES, DRAFT INTERNATIONAL
STANDARDS MAY ON OCCASION HAVE TO
BE CONSIDERED IN THE LIGHT OF THEIR
POTENTIAL TO BECOME STANDARDS TO
WHICH REFERENCE MAY BE MADE IN
Reference number
NATIONAL REGULATIONS.
ISO/IEC DIS 9594-8:2020(E)
RECIPIENTS OF THIS DRAFT ARE INVITED
TO SUBMIT, WITH THEIR COMMENTS,
NOTIFICATION OF ANY RELEVANT PATENT
RIGHTS OF WHICH THEY ARE AWARE AND TO
PROVIDE SUPPORTING DOCUMENTATION. ISO/IEC 2020
---------------------- Page: 1 ----------------------
ISO/IEC DIS 9594-8:2020(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2020 – All rights reserved
---------------------- Page: 2 ----------------------
INTERNATIONAL STANDARD ISO/IEC 9594-8
RECOMMENDATION ITU-T X.509
Information technology – Open Systems Interconnection –
The Directory: Public-key and attribute certificate frameworks
Summary
Recommendation ITU-T X.509 | ISO/IEC 9594-8 defines frameworks for public-key infrastructure (PKI) and privilege
management infrastructure (PMI). It introduces the basic concept of asymmetric cryptographic techniques. It specifies the
following data types: public-key certificate, attribute certificate, certificate revocation list (CRL) and attribute certificate
revocation list (ACRL). It also defines several certificates and CRL extensions, and it defines directory schema information
allowing PKI and PMI related data to be stored in a directory. In addition, it defines entity types, such as certification
authority (CA), attribute authority (AA), relying party, privilege verifier, trust broker and trust anchor. It specifies the
principles for certificate validation, validation path, certificate policy, etc. It also includes a specification for authorization
validation lists that allow for fast validation and restrictions on communications.
HistoryEdition Recommendation Approval Study Group Unique ID
1.0 ITU-T X.509 1988-11-25 11.1002/1000/2999
2.0 ITU-T X.509 1993-11-16 7 11.1002/1000/3000
3.0 ITU-T X.509 1997-08-09 7 11.1002/1000/4123
3.1 ITU-T X.509 (1997) Technical Cor. 1 2000-03-31 7 11.1002/1000/5033
3.2 ITU-T X.509 (1997) Technical Cor. 2 2001-02-02 7 11.1002/1000/5311
3.3 ITU-T X.509 (1997) Technical Cor. 3 2001-10-29 7 11.1002/1000/5559
3.4 ITU-T X.509 (1997) Technical Cor. 4 2002-04-13 17 11.1002/1000/6025
3.5 ITU-T X.509 (1997) Technical Cor. 5 2003-02-13 17 11.1002/1000/6236
3.6 ITU-T X.509 (1997) Technical Cor. 6 2004-04-29 17 11.1002/1000/7285
4.0 ITU-T X.509 2000-03-31 7 11.1002/1000/5034
4.1 ITU-T X.509 (2000) Technical Cor. 1 2001-10-29 7 11.1002/1000/5560
4.2 ITU-T X.509 (2000) Technical Cor. 2 2002-04-13 17 11.1002/1000/6026
4.3 ITU-T X.509 (2000) Technical Cor. 3 2004-04-29 17 11.1002/1000/7284
4.4 ITU-T X.509 (2000) Technical Cor. 4 2007-01-13 17 11.1002/1000/8637
5.0 ITU-T X.509 2005-08-29 17 11.1002/1000/8501
5.1 ITU-T X.509 (2005) Cor. 1 2007-01-13 17 11.1002/1000/9051
5.2 ITU-T X.509 (2005) Cor. 2 2008-11-13 17 11.1002/1000/9591
5.3 ITU-T X.509 (2005) Cor. 3 2011-02-13 17 11.1002/1000/11042
5.4 ITU-T X.509 (2005) Cor. 4 2012-04-13 17 11.1002/1000/11577
6.0 ITU-T X.509 2008-11-13 17 11.1002/1000/9590
6.1 ITU-T X.509 (2008) Cor. 1 2011-02-13 17 11.1002/1000/11043
6.2 ITU-T X.509 (2008) Cor. 2 2012-04-13 17 11.1002/1000/11578
6.3 ITU-T X.509 (2008) Cor. 3 2012-10-14 17 11.1002/1000/11736
7.0 ITU-T X.509 2012-10-14 17 11.1002/1000/11735
7.1 ITU-T X.509 (2012) Cor. 1 2015-05-29 17 11.1002/1000/12474
7.2 ITU-T X.509 (2012) Cor. 2 2016-04-29 17 11.1002/1000/12844
7.3 ITU-T X.509 (2012) Cor. 3 2016-10-14 17 11.1002/1000/13032
8.0 ITU-T X.509 2016-10-14 17 11.1002/1000/13031
9.0 ITU-T X.509 2019-10-14 17 11.1002/1000/14033
Keywords
Attribute, attribute authority, certificate, certification authority, distinguished name, PKI, PMI, trust anchor, validation.
____________________To access the Recommendation, type the URL http://handle.itu.int/ in the address field of your web browser, followed by the
Recommendation's unique ID. For example, http://handle.itu.int/11.1002/1000/11830-en.
© ISO 2020 - All rights reserved i---------------------- Page: 3 ----------------------
ISO/IEC DIS 9594-8:2020(E)
FOREWORD
The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of
telecommunications, information and communication technologies (ICTs). The ITU Telecommunication
Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical,
operating and tariff questions and issuing Recommendations on them with a view to standardizing
telecommunications on a worldwide basis.The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes
the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics.
The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1.
In some areas of information technology which fall within ITU-T's purview, the necessary standards are
prepared on a collaborative basis with ISO and IEC.NOTE
In this Recommendation, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain
mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the
Recommendation is achieved when all of these mandatory provisions are met. The words "shall" or some other
obligatory language such as "must" and the negative equivalents are used to express requirements. The use of
such words does not suggest that compliance with the Recommendation is required of any party.
INTELLECTUAL PROPERTY RIGHTSITU draws attention to the possibility that the practice or implementation of this Recommendation may involve
the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or
applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of
the Recommendation development process.As of the date of approval of this Recommendation, ITU had received notice of intellectual property, protected
by patents, which may be required to implement this Recommendation. However, implementers are cautioned
that this may not represent the latest information and are therefore strongly urged to consult the TSB patent
database at http://www.itu.int/ITU-T/ipr/.© ITU 2019
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior
written permission of ITU.ii © ISO 2020 - All rights reserved
---------------------- Page: 4 ----------------------
ISO/IEC DIS 9594-8:2020(E)
CONTENTS
Page
SECTION 1 – General ............................................................................................................................................... 1
1 Scope .............................................................................................................................................................. 1
2 Normative references...................................................................................................................................... 1
2.1 Identical Recommendations | International Standards ........................................................................ 1
2.2 Paired Recommendations | International Standards equivalent in technical content ........................... 2
2.3 Recommendations ............................................................................................................................... 2
2.4 Other references .................................................................................................................................. 2
3 Definitions ...................................................................................................................................................... 3
3.1 OSI Reference Model security architecture definitions....................................................................... 3
3.2 Baseline identity management terms and definitions .......................................................................... 3
3.3 Directory model definitions ................................................................................................................ 3
3.4 Access control framework definitions ................................................................................................. 3
3.5 Public-key and attribute certificate definitions .................................................................................... 3
4 Abbreviations ................................................................................................................................................. 7
5 Conventions .................................................................................................................................................... 8
6 Frameworks overview .................................................................................................................................... 8
6.1 Digital signatures ................................................................................................................................ 9
6.2 Public-key cryptography and cryptographic algorithms...................................................................... 10
6.3 Distinguished encoding of basic encoding rules ................................................................................. 12
6.4 Applying distinguished encoding ........................................................................................................ 12
6.5 Using repositories ................................................................................................................................ 13
SECTION 2 – PUBLIC-KEY CERTIFICATE FRAMEWORK ............................................................................... 14
7 Public keys and public-key certificates .......................................................................................................... 14
7.1 Introduction ......................................................................................................................................... 14
7.2 Public-key certificate........................................................................................................................... 14
7.3 Public-key certificate extensions ......................................................................................................... 17
7.4 Types of public-key certificates .......................................................................................................... 18
7.5 Trust anchor ........................................................................................................................................ 18
7.6 Entity relationship ............................................................................................................................... 19
7.7 Certification path ................................................................................................................................. 19
7.8 Generation of key pairs ....................................................................................................................... 21
7.9 Public-key certificate creation ............................................................................................................. 21
7.10 Certificate revocation list .................................................................................................................... 22
7.11 Uniqueness of names ........................................................................................................................... 25
7.12 Indirect CRLs ...................................................................................................................................... 25
7.13 Repudiation of a digital signing .......................................................................................................... 26
8 Trust models ................................................................................................................................................... 27
8.1 Three-cornered trust model ................................................................................................................. 27
8.2 Four cornered trust model ................................................................................................................... 27
9 Public-key certificate and CRL extensions ..................................................................................................... 28
9.1 Policy handling .................................................................................................................................... 29
9.2 Key and policy information extensions ............................................................................................... 31
9.3 Subject and issuer information extensions .......................................................................................... 38
9.4 Certification path constraint extensions .............................................................................................. 41
9.5 Basic CRL extensions ......................................................................................................................... 45
9.6 CRL distribution points and delta CRL extensions ............................................................................. 52
9.7 Authorization and validation list extensions ....................................................................................... 57
9.8 Alternative cryptographic algorithms and digital signature extensions ............................................... 58
10 Delta CRL relationship to base ....................................................................................................................... 59
11 Authorization and validation lists ................................................................................................................... 60
11.1 Authorization and validation list concept ............................................................................................ 60
© ISO 2020 - All rights reserved iii---------------------- Page: 5 ----------------------
ISO/IEC DIS 9594-8:2020(E)
Page
11.2 The authorizer ..................................................................................................................................... 60
11.3 Authorization and validation list syntax .............................................................................................. 61
11.4 Multiple cryptographic algorithms for authorization and validation list ............................................. 62
12 Certification path processing procedure ......................................................................................................... 63
12.1 Path processing inputs ......................................................................................................................... 63
12.2 Path processing outputs ....................................................................................................................... 63
12.3 Path processing variables .................................................................................................................... 64
12.4 Initialization step ................................................................................................................................. 64
12.5 Public-key certificate processing ......................................................................................................... 65
13 PKI directory schema ..................................................................................................................................... 67
13.1 PKI directory object classes and name forms ...................................................................................... 67
13.2 PKI directory attributes ....................................................................................................................... 68
13.3 PKI directory matching rules .............................................................................................................. 72
13.4 PKI directory syntax definitions.......................................................................................................... 77
SECTION 3 – ATTRIBUTE CERTIFICATE FRAMEWORK ................................................................................ 80
14 Attribute certificates ....................................................................................................................................... 80
14.1 General ................................................................................................................................................ 80
14.2 Attribute certificate syntax .................................................................................................................. 81
14.3 Multiple cryptographic algorithms for attribute certificates ................................................................ 83
14.4 Delegation paths .................................................................................................................................. 83
14.5 Attribute certificate revocation lists .................................................................................................... 84
15 Attribute authority, source of authority and certification authority relationship ............................................ 86
15.1 Privilege in attribute certificates .......................................................................................................... 87
15.2 Privilege in public-key certificates ...................................................................................................... 87
16 PMI models .................................................................................................................................................... 87
16.1 General model ..................................................................................................................................... 87
16.2 Control model...................................................................................................................................... 89
16.3 Delegation model ................................................................................................................................ 90
16.4 Group assignment model ..................................................................................................................... 90
16.5 Roles model ......................................................................................................................................... 91
16.6 Recognition of Authority Model ......................................................................................................... 93
16.7 XML privilege information attribute ................................................................................................... 96
16.8 Permission attribute and matching rule ............................................................................................... 97
17 Attribute certificate and attribute certificate revocation list extensions ......................................................... 97
17.1 Basic privilege management extensions .............................................................................................. 98
17.2 Privilege revocation extensions ........................................................................................................... 101
17.3 Source of authority extensions ............................................................................................................ 107
17.4 Role extensions ................................................................................................................................... 109
17.5 Delegation extensions ......................................................................................................................... 110
17.6 Recognition of authority extensions .................................................................................................... 114
17.7 Use of alternative digital signature algorithm and digital signature extensions .................................. 117
18 Delegation path processing procedure ............................................................................................................ 118
18.1 Basic processing procedure ................................................................................................................. 118
18.2 Role processing procedure .................................................................................................................. 119
18.3 Delegation processing procedure ........................................................................................................ 119
19 PMI directory schema..................................................................................................................................... 121
19.1 PMI directory object classes ............................................................................................................... 121
19.2 PMI directory attributes ...................................................................................................................... 123
19.3 PMI general directory matching rules ................................................................................................. 125
Annex A – Public-key and attribute certificate frameworks ...................................................................................... 127
Annex B – Reference definition of cryptographic algorithms ................................................................................... 155
Annex C Certificate extension attribute types .......................................................................................................... 162
iv © ISO 2020 - All rights reserved---------------------- Page: 6 ----------------------
ISO/IEC DIS 9594-8:2020(E)
Page
C.1 Certificate extension attribute concept ................................................................................................ 162
C.2 Formal specification for certificate extension attribute types .............................................................. 162
Annex D – External ASN.1 modules ......................................................................................................................... 171
Annex E – CRL generation and processing rules ...................................................................................................... 180
E.1 Introduction ......................................................................................................................................... 180
E.2 Determine parameters for CRLs .......................................................................................................... 181
E.3 Determine CRLs required ................................................................................................................... 182
E.4 Obtain CRLs........................................................................................................................................ 183
E.5 Process CRLs ...................................................................................................................................... 183
Annex F – Examples of delta CRL issuance.............................................................................................................. 187
Annex G – Privilege policy and privilege attribute definition examples ................................................................... 189
G.1 Introduction ......................................................................................................................................... 189
G.2 Sample syntaxes .................................................................................................................................. 189
G.3 Privilege attribute example .................................................................................................................. 193
Annex H – An introduction to public key cryptography ......................................................................................... 194
Annex I – Examples of use of certification path constraints ..................................................................................... 196
I.1 Example 1: Use of basic constraints .................................................................................................... 196
I.2 Example 2: Use of policy mapping and policy constraints ................................................................. 196
I.3 Use of name constraints extension ...................................................................................................... 196
Annex J – Guidance on determining for which policies a certification path is valid ................................................. 205
J.1 Certification path valid for a user-specified policy required ............................................................... 205
J.2 Certification path valid for any policy required .................................................................................. 206
J.3 Certification path valid regardless of policy ....................................................................................... 206
J.4 Certification path valid for a user-specific policy desired, but not required ....................................... 206
Annex K – Key usage certificate extension issues .................................................................................................... 207
Annex L – Deprecated extensions ............................................................................................................................. 208
L.1 CRL scope extension ........................................................................................................................... 208
Annex M – Directory concepts .................................................................................................................................. 211
M.1 Scope ................................................................................................................................................... 211
M.2 The directory attribute concept............................................................................................................ 211
M.3 Basic directory concepts ...................................................................................................................... 211
M.4 Subtrees ............................................................................................................................................... 212
M.5 Directory distinguished names ............................................................................................................ 212
M.6 Directory schema ................................................................................................................................ 213
Annex N – Considerations on strong authentication ................................................................................................. 214
N.1 Introduction ......................................................................................................................................... 214
N.2 One-way authentication ....................................................................................................................... 215
N.3 Two-way authentication ...................................................................................................................... 215
N.4 Three-way authentication .................................................................................................................... 216
N.5 Five-way authentication (initiated by A) .........................................................
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.