ISO/IEC 9594-8:2014
(Main)Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks
Information technology — Open Systems Interconnection — The Directory — Part 8: Public-key and attribute certificate frameworks
ISO/IEC 9594 has been produced to facilitate the interconnection of information processing systems to provide directory services. A set of such systems, together with the directory information that they hold, can be viewed as an integrated whole, called the Directory. The information held by the Directory, collectively known as the Directory Information Base (DIB), is typically used to facilitate communication between, with or about objects such as application entities, people, terminals and distribution lists. ISO/IEC 9594-8:2014 defines a framework for public-key certificates. This framework includes the specification of data objects used to represent the certificates themselves, as well as revocation notices for issued certificates that should no longer be trusted. The public-key certificate framework defined in ISO/IEC 9594-8:2014, while it defines some critical components of a public-key infrastructure (PKI), it does not define a PKI in its entirety. However, it provides the foundation upon which full PKIs and their specifications would be built. Similarly, ISO/IEC 9594-8:2014 defines a framework for attribute certificates. That framework includes the specification of data objects used to represent the certificates themselves, as well as revocation notices for issued certificates that should no longer be trusted. The attribute certificate framework defined in ISO/IEC 9594-8:2014, while it defines some critical components of a Privilege Management Infrastructure (PMI), it does not define a PMI in its entirety. However, it provides the foundation upon which full PMIs and their specifications would be built. Information objects for holding PKI and PMI objects in the Directory and for comparing presented values with stored values are also defined. ISO/IEC 9594-8:2014 also defines a framework for the provision of authentication services by the Directory to its users.
Technologies de l'information — Interconnexion de systèmes ouverts (OSI) — L'annuaire — Partie 8: Cadre général des certificats de clé publique et d'attribut
General Information
Relations
Standards Content (Sample)
INTERNATIONAL ISO/IEC
STANDARD 9594-8
Seventh edition
2014-03-01
Information technology — Open Systems
Interconnection — The Directory —
Part 8:
Public-key and attribute certificate
frameworks
Technologies de l'information — Interconnexion de systèmes ouverts
(OSI) — L'annuaire
Partie 8: Cadre général des certificats de clé publique et d'attribut
Reference number
ISO/IEC 9594-8:2014(E)
©
ISO/IEC 2014
.
---------------------- Page: 1 ----------------------
ISO/IEC 9594-8:2014(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2014
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized otherwise in any form or by any
means, electronic or mechanical, including photocopying, or posting on the internet or an intranet, without prior written permission.
Permission can be requested from either ISO at the address below or ISO’s member body in the country of the requester.
ISO copyright office
Case postale 56 CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO/IEC 2014 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC 9594-8:2014(E)
Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are members of
ISO or IEC participate in the development of International Standards through technical committees
established by the respective organization to deal with particular fields of technical activity. ISO and IEC
technical committees collaborate in fields of mutual interest. Other international organizations, governmental
and non-governmental, in liaison with ISO and IEC, also take part in the work. In the field of information
technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of the joint technical committee is to prepare International Standards. Draft International
Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as
an International Standard requires approval by at least 75 % of the national bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
ISO/IEC 9594-8 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 6, Telecommunications and information exchange between systems, in collaboration with
ITU-T. The identical text is published as Rec. ITU-T X.509 (10/2012).
This seventh edition cancels and replaces the sixth edition (ISO/IEC 9594-8:2008), which has been
technically revised. It also incorporates the Technical Corrigenda ISO/IEC 9594-8:2008/Cor.1:2011,
ISO/IEC 9594-8:2008/Cor.2:2012 and ISO/IEC 9594-8:2008/Cor.3:2013.
ISO/IEC 9594 consists of the following parts, under the general title Information technology — Open Systems
Interconnection — The Directory:
— Part 1: Overview of concepts, models and services
— Part 2: Models
— Part 3: Abstract service definition
— Part 4: Procedures for distributed operation
— Part 5: Protocol specifications
— Part 6: Selected attribute types
— Part 7: Selected object classes
— Part 8: Public-key and attribute certificate frameworks
— Part 9: Replication
© ISO/IEC 2014 – All rights reserved
---------------------- Page: 3 ----------------------
CONTENTS
Page
1 Scope . 1
2 Normative references . 2
2.1 Identical Recommendations | International Standards . 2
2.2 Paired Recommendations | International Standards equivalent in technical content . 3
2.3 Recommendations . 3
2.4 Other references . 3
3 Definitions . 3
3.1 OSI Reference Model security architecture definitions . 3
3.2 Baseline identity management terms and definitions . 3
3.3 Directory model definitions . 4
3.4 Access control framework definitions . 4
3.5 Public-key and attribute certificate definitions . 4
4 Abbreviations . 7
5 Conventions . 8
6 Frameworks overview . 8
6.1 Digital signatures . 9
6.2 Formal definitions for public-key cryptography . 10
6.3 Distinguished encoding of Basic Encoding Rules . 10
6.4 Applying distinguished encoding . 11
7 Public-keys and public-key certificates . 11
7.1 Introduction . 11
7.2 Public-key certificate . 12
7.3 Public-key certificate extensions . 14
7.4 Types of public-key certificates . 15
7.5 Trust anchor . 15
7.6 Entity relationship . 16
7.7 Certification path . 16
7.8 Generation of key pairs . 18
7.9 Public-key certificate creation . 18
7.10 Certificate revocation list . 18
7.11 Repudiation of a digital signing . 21
8 Public-key certificate and CRL extensions . 22
8.1 Policy handling. 22
8.2 Key and policy information extensions . 25
8.3 Subject and issuer information extensions . 31
8.4 Certification path constraint extensions . 33
8.5 Basic CRL extensions . 37
8.6 CRL distribution points and delta-CRL extensions . 46
9 Delta CRL relationship to base . 52
10 Certification path processing procedure . 53
10.1 Path processing inputs . 53
10.2 Path processing outputs . 54
10.3 Path processing variables . 54
10.4 Initialization step . 55
10.5 Certificate processing . 55
11 PKI directory schema . 57
11.1 PKI directory object classes and name forms . 57
11.2 PKI directory attributes . 59
11.3 PKI directory matching rules . 61
11.4 PKI directory syntax definitions . 66
Rec. ITU-T X.509 (10/2012) iii
---------------------- Page: 4 ----------------------
Page
12 Attribute Certificates . 68
12.1 Attribute certificate structure . 69
12.2 Attribute certification paths . 71
13 Attribute Authority, SOA and Certification Authority relationship . 71
13.1 Privilege in attribute certificates . 73
13.2 Privilege in public-key certificates . 73
14 PMI models . 73
14.1 General model . 73
14.2 Control model . 75
14.3 Delegation model . 76
14.4 Group assignment model . 76
14.5 Roles model . 77
14.6 Recognition of Authority Model . 78
14.7 XML privilege information attribute . 82
14.8 Permission attribute and matching rule . 83
15 Privilege management certificate extensions . 83
15.1 Basic privilege management extensions . 84
15.2 Privilege revocation extensions . 87
15.3 Source of Authority extensions . 87
15.4 Role extensions . 90
15.5 Delegation extensions . 91
15.6 Recognition of Authority Extensions . 95
16 Privilege path processing procedure . 98
16.1 Basic processing procedure . 98
16.2 Role processing procedure . 99
16.3 Delegation processing procedure . 99
17 PMI directory schema . 102
17.1 PMI directory object classes . 102
17.2 PMI Directory attributes. 103
17.3 PMI general directory matching rules . 105
18 Directory authentication . 107
18.1 Simple authentication procedure . 107
18.2 Password policy . 109
18.3 Strong Authentication . 119
19 Access control . 122
20 Protection of Directory operations . 122
Annex A – Public-Key and Attribute Certificate Frameworks . 123
Annex B – Reference definition of algorithm object identifiers . 153
Annex C – CRL generation and processing rules . 154
C.1 Introduction . 154
C.2 Determine parameters for CRLs . 155
C.3 Determine CRLs required . 156
C.4 Obtain CRLs . 157
C.5 Process CRLs . 157
Annex D – Examples of delta CRL issuance . 161
Annex E – Privilege policy and privilege attribute definition examples . 163
E.1 Introduction . 163
E.2 Sample syntaxes . 163
E.3 Privilege attribute example . 167
2)
Annex F – An introduction to public key cryptography . 168
Annex G – Examples of use of certification path constraints . 170
iv Rec. ITU-T X.509 (10/2012)
---------------------- Page: 5 ----------------------
Page
G.1 Example 1: Use of basic constraints. 170
G.2 Example 2: Use of policy mapping and policy constraints . 170
G.3 Use of Name Constraints Extension . 170
Annex H – Guidance on determining for which policies a certification path is valid . 179
H.1 Certification path valid for a user-specified policy required . 179
H.2 Certification path valid for any policy required . 180
H.3 Certification path valid regardless of policy . 180
H.4 Certification path valid for a user-specific policy desired, but not required . 180
Annex I – Key usage certificate extension issues . 181
Annex J – External ASN.1 modules . 182
Annex K – Use of Protected Passwords for Bind operations . 190
Annex L – Examples of password hashing algorithms . 191
L.1 Null Hashing method . 191
L.2 MD5 method . 191
L.3 SHA-1 method . 191
Annex M – Alphabetical list of information item definitions . 192
Annex N – Amendments and corrigenda . 195
Rec. ITU-T X.509 (10/2012) v
---------------------- Page: 6 ----------------------
Introduction
This Recommendation | International Standard, together with other Recommendations | International Standards, has
been produced to facilitate the interconnection of information processing systems to provide directory services. A set of
such systems, together with the directory information which they hold, can be viewed as an integrated whole, called the
Directory. The information held by the Directory, collectively known as the Directory Information Base (DIB), is
typically used to facilitate communication between, with or about objects such as application-entities, people, terminals
and distribution lists.
The Directory plays a significant role in Open Systems Interconnection, whose aim is to allow, with a minimum of
technical agreement outside of the interconnection standards themselves, the interconnection of information processing
systems:
– from different manufacturers;
– under different managements;
– of different levels of complexity; and
– of different ages.
Many applications have requirements for security to protect against threats to the communication of information.
Virtually all security services are dependent upon the identities of the communicating parties being reliably known, i.e.,
authentication.
This Recommendation | International Standard defines a framework for public-key certificates. This framework
includes the specification of data objects used to represent the certificates themselves, as well as revocation notices for
issued certificates that should no longer be trusted. The public-key certificate framework defined in this
Recommendation | International Standard, while it defines some critical components of a public-key infrastructure
(PKI), it does not define a PKI in its entirety. However, this Recommendation | International Standard provides the
foundation upon which full PKIs and their specifications would be built.
Similarly, this Recommendation | International Standard defines a framework for attribute certificates. That framework
includes the specification of data objects used to represent the certificates themselves, as well as revocation notices for
issued certificates that should no longer be trusted. The attribute certificate framework defined in this
Recommendation | International Standard, while it defines some critical components of a Privilege Management
Infrastructure (PMI), it does not define a PMI in its entirety. However, this Recommendation | International Standard
provides the foundation upon which full PMIs and their specifications would be built.
Information objects for holding PKI and PMI objects in the Directory and for comparing presented values with stored
values are also defined.
This Recommendation | International Standard also defines a framework for the provision of authentication services by
the Directory to its users.
This Recommendation | International Standard provides the foundation frameworks upon which industry profiles can be
defined by other standards groups and industry forums. Many of the features defined as optional in these frameworks
may be mandated for use in certain environments through profiles. This seventh edition technically revises and
enhances the sixth edition of this Recommendation | International Standard.
This seventh edition specifies versions 1, 2 and 3 of public-key certificates and versions 1 and 2 of certificate revocation
lists. This edition also specifies version 2 of attribute certificates.
The extensibility function was added in an earlier edition with version 3 of the public-key certificate and with version 2
of the certificate revocation list and was incorporated into the attribute certificate from its initial inception. This
function is specified in clause 7. It is anticipated that any enhancements to this edition can be accommodated using this
function and avoid the need to create new versions.
Annex A, which is an integral part of this Recommendation | International Standard, provides the ASN.1 modules
which contain all of the definitions associated with the frameworks.
Annex B, which is an integral part of this Recommendation | International Standard, defines object identifiers assigned
to authentication and encryption algorithms, in the absence of a formal register.
Annex C, which is an integral part of this Recommendation | International Standard, provides rules for generating and
processing Certificate Revocation Lists.
Annex D, which is not an integral part of this Recommendation | International Standard, provides examples of delta-
CRL issuance.
vi Rec. ITU-T X.509 (10/2012)
---------------------- Page: 7 ----------------------
Annex E, which is not an integral part of this Recommendation | International Standard, provides examples of privilege
policy syntaxes and privilege attributes.
Annex F, which is not an integral part of this Recommendation | International Standard, is an introduction to public-key
cryptography.
Annex G, which is not an integral part of this Recommendation | International Standard, contains examples of the use of
certification path constraints.
Annex H, which is not an integral part of this Recommendation | International Standard, provides guidance for PKI
enabled applications on the processing of certificate policy while in the certification path validation process.
Annex I, which is not an integral part of this Recommendation | International Standard, provides guidance on the use of
the contentCommitment bit in the keyUsage certificate extension.
Annex J, which is not an integral part of this Recommendation | International Standard, includes extracts of external
ASN.1 modules referenced by this Recommendation | International Standard.
Annex K, which is not an integral part of this Recommendation | International Standard, provides a suggested technique
for a Bind protected password.
Annex L, which is not an integral part of this Recommendation | International Standard, gives some examples of
password hashing algorithms.
Annex M, which is not an integral part of this Recommendation | International Standard, contains an alphabetical list of
information item definitions in this Recommendation | International Standard.
Annex N, which is not an integral part of this Recommendation | International Standard, lists the amendments and
defect reports that have been incorporated to form this edition of this Recommendation | International Standard.
Rec. ITU-T X.509 (10/2012) vii
---------------------- Page: 8 ----------------------
ISO/IEC 9594-8:2014 (E)
INTERNATIONAL STANDARD
RECOMMENDATION ITU-T
Information technology – Open Systems Interconnection –
The Directory: Public-key and attribute certificate frameworks
SECTION 1 – GENERAL
1 Scope
This Recommendation | International Standard addresses some of the security requirements in the areas of
authentication and other security services through the provision of a set of frameworks upon which full services can be
based. Specifically, this Recommendation | International Standard defines frameworks for:
– public-key certificates;
– attribute certificates; and
– authentication services.
The public-key certificate framework defined in this Recommendation | International Standard includes a definition of
the information objects for a public-key infrastructure (PKI), including public-key certificates and Certificate
Revocation Lists (CRLs). The attribute certificate framework includes a definition of the information objects for a
Privilege Management Infrastructure (PMI), including attribute certificates, and Attribute Certificate Revocation Lists
(ACRLs). This Recommendation | International Standard also provides the framework for issuing, managing, using and
revoking certificates. An extensibility mechanism is included in the defined formats for both certificate types and for all
revocation list schemes. This Recommendation | International Standard also includes a set of standard extensions for
each, which is expected to be
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.