{"id":353226,"date":"2024-10-20T00:56:49","date_gmt":"2024-10-20T00:56:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-82017\/"},"modified":"2024-10-26T01:02:34","modified_gmt":"2024-10-26T01:02:34","slug":"bs-iso-iec-9594-82017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-82017\/","title":{"rendered":"BS ISO\/IEC 9594-8:2017"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 1 Scope 2 Normative references 2.1 Identical Recommendations | International Standards <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 2.2 Paired Recommendations | International Standards equivalent in technical content 2.3 Recommendations 2.4 Other references 3 Definitions 3.1 OSI Reference Model security architecture definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 3.2 Baseline identity management terms and definitions 3.3 Directory model definitions 3.4 Access control framework definitions 3.5 Public-key and attribute certificate definitions <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 4 Abbreviations <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5 Conventions 6 Frameworks overview <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.1 Digital signatures <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 6.2 Public-key cryptography and cryptographic algorithms 6.2.1 Formal specification of public-key cryptography 6.2.2 Formal definitions of cryptographic algorithms <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 6.3 Distinguished encoding of basic encoding rules <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6.4 Applying distinguished encoding 6.5 Using repositories <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 7 Public keys and public-key certificates 7.1 Introduction 7.2 Public-key certificate <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 7.3 Public-key certificate extensions <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 7.4 Types of public-key certificates 7.5 Trust anchor <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 7.6 Entity relationship <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 7.7 Certification path <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 7.8 Generation of key pairs 7.9 Public-key certificate creation <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 7.10 Certificate revocation list 7.10.1 Certificate revocation list principles <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 7.10.2 Certificate revocation list syntax <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 7.11 Uniqueness of names 7.12 Indirect CRLs 7.12.1 Introduction <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 7.12.2 Indirect CRL contents <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 7.13 Repudiation of a digital signing 8 Trust models 8.1 Three-cornered trust model <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 8.2 Four cornered trust model <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 9 Public-key certificate and CRL extensions 9.1 Policy handling 9.1.1 Certificate policy <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 9.1.2 Cross-certificates and policy handling 9.1.3 Policy mapping <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 9.1.4 Certification path processing 9.1.5 Self-issued certificates <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 9.2 Key and policy information extensions 9.2.1 Requirements 9.2.2 Public-key certificate and CRL extensions <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 9.2.2.1 Authority key identifier extension 9.2.2.2 Subject key identifier extension 9.2.2.3 Key usage extension <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 9.2.2.4 Extended key usage extension 9.2.2.5 Private key usage period extension <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 9.2.2.6 Certificate policies extension <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 9.2.2.7 Policy mappings extension <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 9.2.2.8 Authorization and validation extension 9.3 Subject and issuer information extensions 9.3.1 Requirements 9.3.2 Certificate and CRL extensions 9.3.2.1 Subject alternative name extension <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 9.3.2.2 Issuer alternative name extension <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 9.3.2.3 Subject directory attributes extension 9.4 Certification path constraint extensions 9.4.1 Requirements <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 9.4.2 Public-key certificate extensions 9.4.2.1 Basic constraints extension <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 9.4.2.2 Name constraints extension <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 9.4.2.3 Policy constraints extension <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 9.4.2.4 Inhibit any policy extension 9.5 Basic CRL extensions 9.5.1 Requirements <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 9.5.2 CRL extensions 9.5.2.1 CRL number extension 9.5.2.2 Status referral extension <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 9.5.2.3 CRL stream identifier extension 9.5.2.4 Ordered list extension 9.5.2.5 Delta Information extension 9.5.2.6 To be revoked extension <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 9.5.2.7 Revoked group of certificates extension <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 9.5.2.8 Expired certificates on CRL extension 9.5.3 CRL entry extension 9.5.3.1 Reason code extension <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 9.5.3.2 Hold instruction code extension 9.5.3.3 Invalidity date extension <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 9.6 CRL distribution points and delta CRL extensions 9.6.1 Requirements 9.6.2 CRL distribution point and delta CRL extensions <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 9.6.2.1 CRL distribution points extension <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 9.6.2.2 Issuing distribution point extension <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 9.6.2.3 Certificate issuer extension <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 9.6.2.4 Delta CRL indicator extension 9.6.2.5 Base update time extension 9.6.2.6 Freshest CRL extension 10 Delta CRL relationship to base <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 11 Authorization and validation lists 11.1 Authorization and validation list concept 11.2 The authorizer 11.3 Authorization and validation list syntax <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 11.4 Authorization and validation restrictions 11.4.3 Protocol restrictions 12 Certification path processing procedure 12.1 Path processing inputs <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | 12.2 Path processing outputs <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 12.3 Path processing variables 12.4 Initialization step 12.5 Public-key certificate processing 12.5.1 Basic public-key certificate checks <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 12.5.2 Processing intermediate certificates <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 12.5.3 Explicit policy indicator processing 12.5.4 Final processing <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 13 PKI directory schema 13.1 PKI directory object classes and name forms 13.1.1 PKI user object class 13.1.2 PKI CA object class 13.1.3 CRL distribution points object class and name form 13.1.4 Delta CRL object class <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 13.1.5 Certificate Policy and CPS object class 13.1.6 PKI certification path object class 13.2 PKI directory attributes 13.2.1 User certificate attribute 13.2.2 CA certificate attribute 13.2.3 Cross-certificate pair attribute type <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 13.2.4 Public-key certificate revocation list attribute type 13.2.5 End-entity public-key certificate revocation list attribute type 13.2.6 CA revocation list attribute type 13.2.7 Delta revocation list attribute <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 13.2.7 Supported algorithms attribute 13.2.8 Certification practice statement attribute 13.2.9 Certificate policy attribute <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 13.2.10 PKI path attribute 13.3 PKI directory matching rules 13.3.1 Certificate exact match 13.3.2 Certificate match <\/td>\n<\/tr>\n | ||||||
80<\/td>\n | 13.3.3 Certificate pair exact match 13.3.4 Certificate pair match 13.3.5 Certificate list exact match 13.3.6 Certificate list match <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 13.3.7 Algorithm identifier match 13.3.8 Policy match 13.3.9 PKI path match <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 13.3.10 Enhanced certificate match <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 13.4 PKI directory syntax definitions 13.4.1 X.509 Certificate syntax 13.4.2 X.509 Certificate List syntax 13.4.3 X.509 Certificate Pair syntax 13.4.4 X.509 Supported Algorithm 13.4.5 X.509 Certificate Exact Assertion <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 13.4.6 X.509 Certificate Assertion 13.4.7 X.509 Certificate Pair Exact Assertion 13.4.8 X.509 Certificate Pair Assertion 13.4.9 X.509 Certificate List Exact Assertion syntax 13.4.10 X.509 Certificate List Assertion syntax 13.4.11 X.509 Algorithm Identifier syntax <\/td>\n<\/tr>\n | ||||||
85<\/td>\n | 14 Attribute certificates 14.1 Attribute certificate structure <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 14.2 Delegation paths 14.3 Attribute certificate revocation lists 14.3.1 Attribute certificate revocation list principles <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 14.3.2 Attribute certificate revocation list syntax 15 Attribute authority, source of authority and certification authority relationship <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 15.1 Privilege in attribute certificates 15.2 Privilege in public-key certificates 16 PMI models 16.1 General model <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 16.1.1 PMI in access control context <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 16.1.2 PMI in a non-repudiation context 16.2 Control model 16.3 Delegation model <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 16.4 Group assignment model 16.4.1 Direct group naming <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 16.4.2 Group role naming 16.5 Roles model 16.5.1 Role attribute type <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 16.6 Recognition of Authority Model <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 16.7 XML privilege information attribute <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 16.8 Permission attribute and matching rule 16.8.1 Permission attribute 16.8.2 Dual string matching rule 17 Attribute certificate and attribute certificate revocation list extensions <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 17.1 Basic privilege management extensions 17.1.1 Requirements 17.1.2 Basic privilege management extension 17.1.2.1 Time specification extension 17.1.2.1.1 Time specification extension definition <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 17.1.2.1.2 Time specification matching rule 17.1.2.2 Targeting information extension 17.1.2.3 User notice extension <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 17.1.2.4 Acceptable privilege policies extension 17.1.2.5 Single use extension <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 17.1.2.6 Group attribute certificate extension 17.1.2.7 Authority key identifier extension 17.2 Privilege revocation extensions 17.2.1 Requirements 17.2.2 Privilege revocation extensions 17.2.2.1 Use of CRL distribution points extension 17.2.2.2 AA issuing distribution point extension <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 17.2.2.3 Use of certificate issuer extension <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 17.2.2.4 Use of delta CRL indicator extension 17.2.2.5 Use of base update extension 17.2.2.6 Use of freshest CRL extension 17.2.2.7 No revocation information available extension 17.3 Source of authority extensions 17.3.1 Requirements 17.3.2 SOA extensions 17.3.2.1 SOA identifier extension 17.3.2.1.1 SOA identifier extension definition <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 17.3.2.1.2 SOA identifier matching rule 17.3.2.2 Attribute descriptor extension 17.3.2.2.1 Attribute descriptor extension definition <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 17.3.2.2.2 Attribute descriptor matching rule 17.4 Role extensions 17.4.1 Requirements 17.4.2 Role extensions 17.4.2.1 Role specification certificate identifier extension 17.4.2.1.1 Role specification certificate identifier extension definition <\/td>\n<\/tr>\n | ||||||
110<\/td>\n | 17.4.2.1.2 Role specification certificate ID matching rule 17.5 Delegation extensions 17.5.1 Requirements <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 17.5.2 Delegation extensions 17.5.2.1 Basic attribute constraints extension 17.5.2.1.1 Basic attribute constraints extension definition <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | 17.5.2.1.2 Basic attribute constraints matching rule 17.5.2.2 Delegated name constraints extension 17.5.2.2.1 Delegated name constraints extension definition 17.5.2.2.2 Delegated name constraints matching rule <\/td>\n<\/tr>\n | ||||||
113<\/td>\n | 17.5.2.3 Acceptable certificate policies extension 17.5.2.3.1 Acceptable certificate policies extension definition 17.5.2.3.2 Acceptable certificate policies matching rule 17.5.2.4 Authority attribute identifier extension 17.5.2.4.1 Authority attribute identifier extension definition <\/td>\n<\/tr>\n | ||||||
114<\/td>\n | 17.5.2.4.2 AA identifier matching rule 17.5.2.5 Indirect issuer extension 17.5.2.6 Issued on behalf of extension 17.5.2.7 No assertion extension <\/td>\n<\/tr>\n | ||||||
115<\/td>\n | 17.6 Recognition of authority extensions 17.6.1 Requirements 17.6.2 RoA extensions 17.6.2.1 Allowed attribute assignments extension 17.6.2.2 Attribute mappings extension <\/td>\n<\/tr>\n | ||||||
116<\/td>\n | 17.6.2.3 Holder name constraints extension <\/td>\n<\/tr>\n | ||||||
117<\/td>\n | 17.6.2.4 Relationship of delegated name constraints to holder name constraints 17.7 Use of basic CRL extension for ACRLs 17.7.1 Requirements 17.7.2 Use of CRL extensions 17.7.2.1 Use of CRL number extension for ACRL 17.7.2.2 Use of status referral extension for ACRL <\/td>\n<\/tr>\n | ||||||
118<\/td>\n | 17.7.2.3 Use of CRL stream identifier for ACRL 17.7.2.4 Use of order list extension for ACRL 17.7.2.5 Use of delta information extension for ACRL 17.7.2.6 Use of to be revoked extension for ACRL <\/td>\n<\/tr>\n | ||||||
119<\/td>\n | 17.7.2.7 Use of revoked group of certificates extension <\/td>\n<\/tr>\n | ||||||
120<\/td>\n | 17.7.2.8 Use of expired certificates on ACRL extension 17.7.3 Use of CRL entry extensions 17.7.3.1 Use of reason code extension <\/td>\n<\/tr>\n | ||||||
121<\/td>\n | 17.7.3.2 Use of hold instruction code extension 18 Delegation path processing procedure 18.1 Basic processing procedure <\/td>\n<\/tr>\n | ||||||
122<\/td>\n | 18.2 Role processing procedure 18.3 Delegation processing procedure <\/td>\n<\/tr>\n | ||||||
123<\/td>\n | 18.3.1 Verify integrity of domination rule 18.3.2 Establish valid delegation path 18.3.2.1 Use of authority information access extension <\/td>\n<\/tr>\n | ||||||
124<\/td>\n | 18.3.2.2 Use of authority key identifier 18.3.3 Verify privilege delegation 18.3.4 Pass\/fail determination 19 PMI directory schema <\/td>\n<\/tr>\n | ||||||
125<\/td>\n | 19.1 PMI directory object classes 19.1.1 PMI user object class 19.1.2 PMI AA object class 19.1.3 PMI SOA object class 19.1.4 Attribute certificate CRL distribution point object class 19.1.5 PMI delegation path object class <\/td>\n<\/tr>\n | ||||||
126<\/td>\n | 19.1.6 Privilege policy object class 19.1.7 Protected privilege policy object class 19.2 PMI directory attributes 19.2.1 Attribute certificate attribute 19.2.2 AA certificate attribute 19.2.3 Attribute descriptor certificate attribute 19.2.4 Attribute certificate revocation list attribute 19.2.5 End-entity attribute certificate revocation list attribute type <\/td>\n<\/tr>\n | ||||||
127<\/td>\n | 19.2.6 AA certificate revocation list attribute 19.2.7 Delegation path attribute 19.2.8 Privilege policy attribute 19.2.9 Protected privilege policy attribute 19.2.10 XML Protected privilege policy attribute <\/td>\n<\/tr>\n | ||||||
128<\/td>\n | 19.3 PMI general directory matching rules 19.3.1 Attribute certificate exact match 19.3.2 Attribute certificate match 19.3.3 Holder issuer match <\/td>\n<\/tr>\n | ||||||
129<\/td>\n | 19.3.4 Delegation path match 19.3.5 Extension presence match <\/td>\n<\/tr>\n | ||||||
130<\/td>\n | 20 Protocol support for public-key and privilege management infrastructures 20.1 General syntax 20.2 Wrapping of non-encrypted protocol data units <\/td>\n<\/tr>\n | ||||||
131<\/td>\n | 20.3 Wrapping of encrypted protocol data unit 20.3.1 Use of the Diffie-Hellman key agreement method 20.3.2 Encryption information syntax 20.3.3 Key agreement specification <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | 20.3.4 Generation of keying material <\/td>\n<\/tr>\n | ||||||
133<\/td>\n | 20.3.5 Encryption encoding 20.4 Check of PKI-PMI-Wrapper protocol elements 20.4.1 General checking 20.4.2 Specific checking when not encrypting the wrapped PDU <\/td>\n<\/tr>\n | ||||||
134<\/td>\n | 20.4.3 Specific checking when encrypting the wrapped PDU 20.4.3.1 Checking of the key agreement specification 20.4.3.2 Checking of the encrypted PDU information 20.5 PKI-PMI-Wrapper error codes <\/td>\n<\/tr>\n | ||||||
135<\/td>\n | 21 Authorization and validation list management 21.1 General 21.2 Defined protocol data unit (PDU) types 21.3 Checking of received PDU <\/td>\n<\/tr>\n | ||||||
136<\/td>\n | 21.4 Authorization and validation management protocol 21.4.1 Authorization validation management introduction 21.4.2 Authorization and validation management protocol common components 21.4.3 Public-key certificate management <\/td>\n<\/tr>\n | ||||||
137<\/td>\n | 21.4.4 Add authorization and validation list <\/td>\n<\/tr>\n | ||||||
139<\/td>\n | 21.4.4 Replace authorization and validation list 21.4.5 Delete authorization and validation list <\/td>\n<\/tr>\n | ||||||
140<\/td>\n | 21.4.6 Authorization and validation list reject <\/td>\n<\/tr>\n | ||||||
141<\/td>\n | 21.4.7 Authorization and validation list error codes <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | 21.5 Certification authority subscription protocol 21.5.1 Certification authority subscription introduction 21.5.2 Certification authority subscription common components <\/td>\n<\/tr>\n | ||||||
143<\/td>\n | 21.5.3 Public-key certificate subscription <\/td>\n<\/tr>\n | ||||||
144<\/td>\n | 21.5.4 Public-key certificate un-subscription <\/td>\n<\/tr>\n | ||||||
146<\/td>\n | 21.5.5 Public-key certificate replacements <\/td>\n<\/tr>\n | ||||||
147<\/td>\n | 21.5.6 End-entity public-key certificate updates <\/td>\n<\/tr>\n | ||||||
148<\/td>\n | 21.5.7 Certification authority subscription reject <\/td>\n<\/tr>\n | ||||||
149<\/td>\n | 21.5.8 Certification authority subscription error codes 22 Trust broker protocol <\/td>\n<\/tr>\n | ||||||
194<\/td>\n | C.1 Certificate extension attribute concept C.2 Formal specification for certificate extension attribute types <\/td>\n<\/tr>\n | ||||||
211<\/td>\n | E.1 Introduction E.1.1 CRL types <\/td>\n<\/tr>\n | ||||||
212<\/td>\n | E.1.2 CRL processing E.2 Determine parameters for CRLs <\/td>\n<\/tr>\n | ||||||
213<\/td>\n | E.3 Determine CRLs required E.3.1 End-entity public-key certificate with critical CRL distribution point extension E.3.2 End-entity public-key certificate with no critical CRL distribution point extension E.3.3 CA with critical CRL DP <\/td>\n<\/tr>\n | ||||||
214<\/td>\n | E.3.4 CA with no critical CRL DP E.4 Obtain CRLs E.5 Process CRLs E.5.1 Validate base CRL scope E.5.1.1 Complete CRL <\/td>\n<\/tr>\n | ||||||
215<\/td>\n | E.5.1.2 Complete EPRL E.5.1.3 Complete CARL E.5.1.4 Distribution point based CRL\/EPRL\/CARL <\/td>\n<\/tr>\n | ||||||
216<\/td>\n | E.5.2 Validate delta CRL scope <\/td>\n<\/tr>\n | ||||||
217<\/td>\n | E.5.3 Validity and currency checks on the base CRL E.5.4 Validity and checks on the delta CRL <\/td>\n<\/tr>\n | ||||||
220<\/td>\n | G.1 Introduction G.2 Sample syntaxes G.2.1 First example <\/td>\n<\/tr>\n | ||||||
222<\/td>\n | G.2.2 Second example <\/td>\n<\/tr>\n | ||||||
224<\/td>\n | G.3 Privilege attribute example <\/td>\n<\/tr>\n | ||||||
227<\/td>\n | I.1 Example 1: Use of basic constraints I.2 Example 2: Use of policy mapping and policy constraints I.3 Use of name constraints extension I.3.1 Examples of public-key certificate format with name constraints extension <\/td>\n<\/tr>\n | ||||||
228<\/td>\n | I.3.1.1 Examples of permittedsubtrees <\/td>\n<\/tr>\n | ||||||
229<\/td>\n | I.3.1.2 Examples of excludedsubtrees <\/td>\n<\/tr>\n | ||||||
230<\/td>\n | I.3.1.3 Examples of permittedsubtrees and excludedsubtrees I.3.2 Examples of certificate handling with name constraints extension I.3.2.1 Name spaces constraints by permitted-subtrees indistinguished name form <\/td>\n<\/tr>\n | ||||||
232<\/td>\n | I.3.2.2 Name spaces constraints by excluded-subtrees in distinguished name form <\/td>\n<\/tr>\n | ||||||
233<\/td>\n | I.3.2.3 Name spaces constraints by permitted-subtrees in multiple name forms <\/td>\n<\/tr>\n | ||||||
234<\/td>\n | I.3.2.4 Name spaces constraints by excluded-subtrees in multiple name forms I.3.3 Examples where multiple cross-certificates with name constraints extension are needed <\/td>\n<\/tr>\n | ||||||
235<\/td>\n | I.3.3.1 Conflicting name space constraints requirements I.3.3.2 Disjunctive evaluation of name space constraints <\/td>\n<\/tr>\n | ||||||
236<\/td>\n | J.1 Certification path valid for a user-specified policy required <\/td>\n<\/tr>\n | ||||||
237<\/td>\n | J.2 Certification path valid for any policy required J.3 Certification path valid regardless of policy J.4 Certification path valid for a user-specific policy desired, but not required <\/td>\n<\/tr>\n | ||||||
239<\/td>\n | L.1 CRL scope extension <\/td>\n<\/tr>\n | ||||||
242<\/td>\n | M.1 Scope M.2 Basic directory concepts M.3 Directory schema <\/td>\n<\/tr>\n | ||||||
243<\/td>\n | M.4 Directory distinguished names M.5 Subtrees <\/td>\n<\/tr>\n | ||||||
244<\/td>\n | N.1 Introduction <\/td>\n<\/tr>\n | ||||||
245<\/td>\n | N.2 One-way authentication N.3 Two-way authentication <\/td>\n<\/tr>\n | ||||||
246<\/td>\n | N.4 Three-way authentication <\/td>\n<\/tr>\n | ||||||
247<\/td>\n | N.5 Five-way authentication (initiated by A) <\/td>\n<\/tr>\n | ||||||
248<\/td>\n | N.6 Five-way authentication (initiated by B) <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Open Systems Interconnection. The Directory – Public-key and attribute certificate frameworks<\/b><\/p>\n |