{"id":353226,"date":"2024-10-20T00:56:49","date_gmt":"2024-10-20T00:56:49","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-9594-82017\/"},"modified":"2024-10-26T01:02:34","modified_gmt":"2024-10-26T01:02:34","slug":"bs-iso-iec-9594-82017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-9594-82017\/","title":{"rendered":"BS ISO\/IEC 9594-8:2017"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
13<\/td>\n1 Scope
2 Normative references
2.1 Identical Recommendations | International Standards <\/td>\n<\/tr>\n
14<\/td>\n2.2 Paired Recommendations | International Standards equivalent in technical content
2.3 Recommendations
2.4 Other references
3 Definitions
3.1 OSI Reference Model security architecture definitions <\/td>\n<\/tr>\n
15<\/td>\n3.2 Baseline identity management terms and definitions
3.3 Directory model definitions
3.4 Access control framework definitions
3.5 Public-key and attribute certificate definitions <\/td>\n<\/tr>\n
19<\/td>\n4 Abbreviations <\/td>\n<\/tr>\n
20<\/td>\n5 Conventions
6 Frameworks overview <\/td>\n<\/tr>\n
21<\/td>\n6.1 Digital signatures <\/td>\n<\/tr>\n
22<\/td>\n6.2 Public-key cryptography and cryptographic algorithms
6.2.1 Formal specification of public-key cryptography
6.2.2 Formal definitions of cryptographic algorithms <\/td>\n<\/tr>\n
23<\/td>\n6.3 Distinguished encoding of basic encoding rules <\/td>\n<\/tr>\n
24<\/td>\n6.4 Applying distinguished encoding
6.5 Using repositories <\/td>\n<\/tr>\n
25<\/td>\n7 Public keys and public-key certificates
7.1 Introduction
7.2 Public-key certificate <\/td>\n<\/tr>\n
27<\/td>\n7.3 Public-key certificate extensions <\/td>\n<\/tr>\n
28<\/td>\n7.4 Types of public-key certificates
7.5 Trust anchor <\/td>\n<\/tr>\n
29<\/td>\n7.6 Entity relationship <\/td>\n<\/tr>\n
30<\/td>\n7.7 Certification path <\/td>\n<\/tr>\n
31<\/td>\n7.8 Generation of key pairs
7.9 Public-key certificate creation <\/td>\n<\/tr>\n
32<\/td>\n7.10 Certificate revocation list
7.10.1 Certificate revocation list principles <\/td>\n<\/tr>\n
33<\/td>\n7.10.2 Certificate revocation list syntax <\/td>\n<\/tr>\n
34<\/td>\n7.11 Uniqueness of names
7.12 Indirect CRLs
7.12.1 Introduction <\/td>\n<\/tr>\n
35<\/td>\n7.12.2 Indirect CRL contents <\/td>\n<\/tr>\n
36<\/td>\n7.13 Repudiation of a digital signing
8 Trust models
8.1 Three-cornered trust model <\/td>\n<\/tr>\n
37<\/td>\n8.2 Four cornered trust model <\/td>\n<\/tr>\n
38<\/td>\n9 Public-key certificate and CRL extensions
9.1 Policy handling
9.1.1 Certificate policy <\/td>\n<\/tr>\n
39<\/td>\n9.1.2 Cross-certificates and policy handling
9.1.3 Policy mapping <\/td>\n<\/tr>\n
40<\/td>\n9.1.4 Certification path processing
9.1.5 Self-issued certificates <\/td>\n<\/tr>\n
41<\/td>\n9.2 Key and policy information extensions
9.2.1 Requirements
9.2.2 Public-key certificate and CRL extensions <\/td>\n<\/tr>\n
42<\/td>\n9.2.2.1 Authority key identifier extension
9.2.2.2 Subject key identifier extension
9.2.2.3 Key usage extension <\/td>\n<\/tr>\n
44<\/td>\n9.2.2.4 Extended key usage extension
9.2.2.5 Private key usage period extension <\/td>\n<\/tr>\n
45<\/td>\n9.2.2.6 Certificate policies extension <\/td>\n<\/tr>\n
46<\/td>\n9.2.2.7 Policy mappings extension <\/td>\n<\/tr>\n
47<\/td>\n9.2.2.8 Authorization and validation extension
9.3 Subject and issuer information extensions
9.3.1 Requirements
9.3.2 Certificate and CRL extensions
9.3.2.1 Subject alternative name extension <\/td>\n<\/tr>\n
48<\/td>\n9.3.2.2 Issuer alternative name extension <\/td>\n<\/tr>\n
49<\/td>\n9.3.2.3 Subject directory attributes extension
9.4 Certification path constraint extensions
9.4.1 Requirements <\/td>\n<\/tr>\n
50<\/td>\n9.4.2 Public-key certificate extensions
9.4.2.1 Basic constraints extension <\/td>\n<\/tr>\n
51<\/td>\n9.4.2.2 Name constraints extension <\/td>\n<\/tr>\n
52<\/td>\n9.4.2.3 Policy constraints extension <\/td>\n<\/tr>\n
53<\/td>\n9.4.2.4 Inhibit any policy extension
9.5 Basic CRL extensions
9.5.1 Requirements <\/td>\n<\/tr>\n
54<\/td>\n9.5.2 CRL extensions
9.5.2.1 CRL number extension
9.5.2.2 Status referral extension <\/td>\n<\/tr>\n
56<\/td>\n9.5.2.3 CRL stream identifier extension
9.5.2.4 Ordered list extension
9.5.2.5 Delta Information extension
9.5.2.6 To be revoked extension <\/td>\n<\/tr>\n
58<\/td>\n9.5.2.7 Revoked group of certificates extension <\/td>\n<\/tr>\n
59<\/td>\n9.5.2.8 Expired certificates on CRL extension
9.5.3 CRL entry extension
9.5.3.1 Reason code extension <\/td>\n<\/tr>\n
60<\/td>\n9.5.3.2 Hold instruction code extension
9.5.3.3 Invalidity date extension <\/td>\n<\/tr>\n
61<\/td>\n9.6 CRL distribution points and delta CRL extensions
9.6.1 Requirements
9.6.2 CRL distribution point and delta CRL extensions <\/td>\n<\/tr>\n
62<\/td>\n9.6.2.1 CRL distribution points extension <\/td>\n<\/tr>\n
63<\/td>\n9.6.2.2 Issuing distribution point extension <\/td>\n<\/tr>\n
64<\/td>\n9.6.2.3 Certificate issuer extension <\/td>\n<\/tr>\n
65<\/td>\n9.6.2.4 Delta CRL indicator extension
9.6.2.5 Base update time extension
9.6.2.6 Freshest CRL extension
10 Delta CRL relationship to base <\/td>\n<\/tr>\n
67<\/td>\n11 Authorization and validation lists
11.1 Authorization and validation list concept
11.2 The authorizer
11.3 Authorization and validation list syntax <\/td>\n<\/tr>\n
69<\/td>\n11.4 Authorization and validation restrictions
11.4.3 Protocol restrictions
12 Certification path processing procedure
12.1 Path processing inputs <\/td>\n<\/tr>\n
70<\/td>\n12.2 Path processing outputs <\/td>\n<\/tr>\n
71<\/td>\n12.3 Path processing variables
12.4 Initialization step
12.5 Public-key certificate processing
12.5.1 Basic public-key certificate checks <\/td>\n<\/tr>\n
72<\/td>\n12.5.2 Processing intermediate certificates <\/td>\n<\/tr>\n
73<\/td>\n12.5.3 Explicit policy indicator processing
12.5.4 Final processing <\/td>\n<\/tr>\n
74<\/td>\n13 PKI directory schema
13.1 PKI directory object classes and name forms
13.1.1 PKI user object class
13.1.2 PKI CA object class
13.1.3 CRL distribution points object class and name form
13.1.4 Delta CRL object class <\/td>\n<\/tr>\n
75<\/td>\n13.1.5 Certificate Policy and CPS object class
13.1.6 PKI certification path object class
13.2 PKI directory attributes
13.2.1 User certificate attribute
13.2.2 CA certificate attribute
13.2.3 Cross-certificate pair attribute type <\/td>\n<\/tr>\n
76<\/td>\n13.2.4 Public-key certificate revocation list attribute type
13.2.5 End-entity public-key certificate revocation list attribute type
13.2.6 CA revocation list attribute type
13.2.7 Delta revocation list attribute <\/td>\n<\/tr>\n
77<\/td>\n13.2.7 Supported algorithms attribute
13.2.8 Certification practice statement attribute
13.2.9 Certificate policy attribute <\/td>\n<\/tr>\n
78<\/td>\n13.2.10 PKI path attribute
13.3 PKI directory matching rules
13.3.1 Certificate exact match
13.3.2 Certificate match <\/td>\n<\/tr>\n
80<\/td>\n13.3.3 Certificate pair exact match
13.3.4 Certificate pair match
13.3.5 Certificate list exact match
13.3.6 Certificate list match <\/td>\n<\/tr>\n
81<\/td>\n13.3.7 Algorithm identifier match
13.3.8 Policy match
13.3.9 PKI path match <\/td>\n<\/tr>\n
82<\/td>\n13.3.10 Enhanced certificate match <\/td>\n<\/tr>\n
83<\/td>\n13.4 PKI directory syntax definitions
13.4.1 X.509 Certificate syntax
13.4.2 X.509 Certificate List syntax
13.4.3 X.509 Certificate Pair syntax
13.4.4 X.509 Supported Algorithm
13.4.5 X.509 Certificate Exact Assertion <\/td>\n<\/tr>\n
84<\/td>\n13.4.6 X.509 Certificate Assertion
13.4.7 X.509 Certificate Pair Exact Assertion
13.4.8 X.509 Certificate Pair Assertion
13.4.9 X.509 Certificate List Exact Assertion syntax
13.4.10 X.509 Certificate List Assertion syntax
13.4.11 X.509 Algorithm Identifier syntax <\/td>\n<\/tr>\n
85<\/td>\n14 Attribute certificates
14.1 Attribute certificate structure <\/td>\n<\/tr>\n
88<\/td>\n14.2 Delegation paths
14.3 Attribute certificate revocation lists
14.3.1 Attribute certificate revocation list principles <\/td>\n<\/tr>\n
89<\/td>\n14.3.2 Attribute certificate revocation list syntax
15 Attribute authority, source of authority and certification authority relationship <\/td>\n<\/tr>\n
91<\/td>\n15.1 Privilege in attribute certificates
15.2 Privilege in public-key certificates
16 PMI models
16.1 General model <\/td>\n<\/tr>\n
92<\/td>\n16.1.1 PMI in access control context <\/td>\n<\/tr>\n
93<\/td>\n16.1.2 PMI in a non-repudiation context
16.2 Control model
16.3 Delegation model <\/td>\n<\/tr>\n
94<\/td>\n16.4 Group assignment model
16.4.1 Direct group naming <\/td>\n<\/tr>\n
95<\/td>\n16.4.2 Group role naming
16.5 Roles model
16.5.1 Role attribute type <\/td>\n<\/tr>\n
96<\/td>\n16.6 Recognition of Authority Model <\/td>\n<\/tr>\n
100<\/td>\n16.7 XML privilege information attribute <\/td>\n<\/tr>\n
101<\/td>\n16.8 Permission attribute and matching rule
16.8.1 Permission attribute
16.8.2 Dual string matching rule
17 Attribute certificate and attribute certificate revocation list extensions <\/td>\n<\/tr>\n
102<\/td>\n17.1 Basic privilege management extensions
17.1.1 Requirements
17.1.2 Basic privilege management extension
17.1.2.1 Time specification extension
17.1.2.1.1 Time specification extension definition <\/td>\n<\/tr>\n
103<\/td>\n17.1.2.1.2 Time specification matching rule
17.1.2.2 Targeting information extension
17.1.2.3 User notice extension <\/td>\n<\/tr>\n
104<\/td>\n17.1.2.4 Acceptable privilege policies extension
17.1.2.5 Single use extension <\/td>\n<\/tr>\n
105<\/td>\n17.1.2.6 Group attribute certificate extension
17.1.2.7 Authority key identifier extension
17.2 Privilege revocation extensions
17.2.1 Requirements
17.2.2 Privilege revocation extensions
17.2.2.1 Use of CRL distribution points extension
17.2.2.2 AA issuing distribution point extension <\/td>\n<\/tr>\n
106<\/td>\n17.2.2.3 Use of certificate issuer extension <\/td>\n<\/tr>\n
107<\/td>\n17.2.2.4 Use of delta CRL indicator extension
17.2.2.5 Use of base update extension
17.2.2.6 Use of freshest CRL extension
17.2.2.7 No revocation information available extension
17.3 Source of authority extensions
17.3.1 Requirements
17.3.2 SOA extensions
17.3.2.1 SOA identifier extension
17.3.2.1.1 SOA identifier extension definition <\/td>\n<\/tr>\n
108<\/td>\n17.3.2.1.2 SOA identifier matching rule
17.3.2.2 Attribute descriptor extension
17.3.2.2.1 Attribute descriptor extension definition <\/td>\n<\/tr>\n
109<\/td>\n17.3.2.2.2 Attribute descriptor matching rule
17.4 Role extensions
17.4.1 Requirements
17.4.2 Role extensions
17.4.2.1 Role specification certificate identifier extension
17.4.2.1.1 Role specification certificate identifier extension definition <\/td>\n<\/tr>\n
110<\/td>\n17.4.2.1.2 Role specification certificate ID matching rule
17.5 Delegation extensions
17.5.1 Requirements <\/td>\n<\/tr>\n
111<\/td>\n17.5.2 Delegation extensions
17.5.2.1 Basic attribute constraints extension
17.5.2.1.1 Basic attribute constraints extension definition <\/td>\n<\/tr>\n
112<\/td>\n17.5.2.1.2 Basic attribute constraints matching rule
17.5.2.2 Delegated name constraints extension
17.5.2.2.1 Delegated name constraints extension definition
17.5.2.2.2 Delegated name constraints matching rule <\/td>\n<\/tr>\n
113<\/td>\n17.5.2.3 Acceptable certificate policies extension
17.5.2.3.1 Acceptable certificate policies extension definition
17.5.2.3.2 Acceptable certificate policies matching rule
17.5.2.4 Authority attribute identifier extension
17.5.2.4.1 Authority attribute identifier extension definition <\/td>\n<\/tr>\n
114<\/td>\n17.5.2.4.2 AA identifier matching rule
17.5.2.5 Indirect issuer extension
17.5.2.6 Issued on behalf of extension
17.5.2.7 No assertion extension <\/td>\n<\/tr>\n
115<\/td>\n17.6 Recognition of authority extensions
17.6.1 Requirements
17.6.2 RoA extensions
17.6.2.1 Allowed attribute assignments extension
17.6.2.2 Attribute mappings extension <\/td>\n<\/tr>\n
116<\/td>\n17.6.2.3 Holder name constraints extension <\/td>\n<\/tr>\n
117<\/td>\n17.6.2.4 Relationship of delegated name constraints to holder name constraints
17.7 Use of basic CRL extension for ACRLs
17.7.1 Requirements
17.7.2 Use of CRL extensions
17.7.2.1 Use of CRL number extension for ACRL
17.7.2.2 Use of status referral extension for ACRL <\/td>\n<\/tr>\n
118<\/td>\n17.7.2.3 Use of CRL stream identifier for ACRL
17.7.2.4 Use of order list extension for ACRL
17.7.2.5 Use of delta information extension for ACRL
17.7.2.6 Use of to be revoked extension for ACRL <\/td>\n<\/tr>\n
119<\/td>\n17.7.2.7 Use of revoked group of certificates extension <\/td>\n<\/tr>\n
120<\/td>\n17.7.2.8 Use of expired certificates on ACRL extension
17.7.3 Use of CRL entry extensions
17.7.3.1 Use of reason code extension <\/td>\n<\/tr>\n
121<\/td>\n17.7.3.2 Use of hold instruction code extension
18 Delegation path processing procedure
18.1 Basic processing procedure <\/td>\n<\/tr>\n
122<\/td>\n18.2 Role processing procedure
18.3 Delegation processing procedure <\/td>\n<\/tr>\n
123<\/td>\n18.3.1 Verify integrity of domination rule
18.3.2 Establish valid delegation path
18.3.2.1 Use of authority information access extension <\/td>\n<\/tr>\n
124<\/td>\n18.3.2.2 Use of authority key identifier
18.3.3 Verify privilege delegation
18.3.4 Pass\/fail determination
19 PMI directory schema <\/td>\n<\/tr>\n
125<\/td>\n19.1 PMI directory object classes
19.1.1 PMI user object class
19.1.2 PMI AA object class
19.1.3 PMI SOA object class
19.1.4 Attribute certificate CRL distribution point object class
19.1.5 PMI delegation path object class <\/td>\n<\/tr>\n
126<\/td>\n19.1.6 Privilege policy object class
19.1.7 Protected privilege policy object class
19.2 PMI directory attributes
19.2.1 Attribute certificate attribute
19.2.2 AA certificate attribute
19.2.3 Attribute descriptor certificate attribute
19.2.4 Attribute certificate revocation list attribute
19.2.5 End-entity attribute certificate revocation list attribute type <\/td>\n<\/tr>\n
127<\/td>\n19.2.6 AA certificate revocation list attribute
19.2.7 Delegation path attribute
19.2.8 Privilege policy attribute
19.2.9 Protected privilege policy attribute
19.2.10 XML Protected privilege policy attribute <\/td>\n<\/tr>\n
128<\/td>\n19.3 PMI general directory matching rules
19.3.1 Attribute certificate exact match
19.3.2 Attribute certificate match
19.3.3 Holder issuer match <\/td>\n<\/tr>\n
129<\/td>\n19.3.4 Delegation path match
19.3.5 Extension presence match <\/td>\n<\/tr>\n
130<\/td>\n20 Protocol support for public-key and privilege management infrastructures
20.1 General syntax
20.2 Wrapping of non-encrypted protocol data units <\/td>\n<\/tr>\n
131<\/td>\n20.3 Wrapping of encrypted protocol data unit
20.3.1 Use of the Diffie-Hellman key agreement method
20.3.2 Encryption information syntax
20.3.3 Key agreement specification <\/td>\n<\/tr>\n
132<\/td>\n20.3.4 Generation of keying material <\/td>\n<\/tr>\n
133<\/td>\n20.3.5 Encryption encoding
20.4 Check of PKI-PMI-Wrapper protocol elements
20.4.1 General checking
20.4.2 Specific checking when not encrypting the wrapped PDU <\/td>\n<\/tr>\n
134<\/td>\n20.4.3 Specific checking when encrypting the wrapped PDU
20.4.3.1 Checking of the key agreement specification
20.4.3.2 Checking of the encrypted PDU information
20.5 PKI-PMI-Wrapper error codes <\/td>\n<\/tr>\n
135<\/td>\n21 Authorization and validation list management
21.1 General
21.2 Defined protocol data unit (PDU) types
21.3 Checking of received PDU <\/td>\n<\/tr>\n
136<\/td>\n21.4 Authorization and validation management protocol
21.4.1 Authorization validation management introduction
21.4.2 Authorization and validation management protocol common components
21.4.3 Public-key certificate management <\/td>\n<\/tr>\n
137<\/td>\n21.4.4 Add authorization and validation list <\/td>\n<\/tr>\n
139<\/td>\n21.4.4 Replace authorization and validation list
21.4.5 Delete authorization and validation list <\/td>\n<\/tr>\n
140<\/td>\n21.4.6 Authorization and validation list reject <\/td>\n<\/tr>\n
141<\/td>\n21.4.7 Authorization and validation list error codes <\/td>\n<\/tr>\n
142<\/td>\n21.5 Certification authority subscription protocol
21.5.1 Certification authority subscription introduction
21.5.2 Certification authority subscription common components <\/td>\n<\/tr>\n
143<\/td>\n21.5.3 Public-key certificate subscription <\/td>\n<\/tr>\n
144<\/td>\n21.5.4 Public-key certificate un-subscription <\/td>\n<\/tr>\n
146<\/td>\n21.5.5 Public-key certificate replacements <\/td>\n<\/tr>\n
147<\/td>\n21.5.6 End-entity public-key certificate updates <\/td>\n<\/tr>\n
148<\/td>\n21.5.7 Certification authority subscription reject <\/td>\n<\/tr>\n
149<\/td>\n21.5.8 Certification authority subscription error codes
22 Trust broker protocol <\/td>\n<\/tr>\n
194<\/td>\nC.1 Certificate extension attribute concept
C.2 Formal specification for certificate extension attribute types <\/td>\n<\/tr>\n
211<\/td>\nE.1 Introduction
E.1.1 CRL types <\/td>\n<\/tr>\n
212<\/td>\nE.1.2 CRL processing
E.2 Determine parameters for CRLs <\/td>\n<\/tr>\n
213<\/td>\nE.3 Determine CRLs required
E.3.1 End-entity public-key certificate with critical CRL distribution point extension
E.3.2 End-entity public-key certificate with no critical CRL distribution point extension
E.3.3 CA with critical CRL DP <\/td>\n<\/tr>\n
214<\/td>\nE.3.4 CA with no critical CRL DP
E.4 Obtain CRLs
E.5 Process CRLs
E.5.1 Validate base CRL scope
E.5.1.1 Complete CRL <\/td>\n<\/tr>\n
215<\/td>\nE.5.1.2 Complete EPRL
E.5.1.3 Complete CARL
E.5.1.4 Distribution point based CRL\/EPRL\/CARL <\/td>\n<\/tr>\n
216<\/td>\nE.5.2 Validate delta CRL scope <\/td>\n<\/tr>\n
217<\/td>\nE.5.3 Validity and currency checks on the base CRL
E.5.4 Validity and checks on the delta CRL <\/td>\n<\/tr>\n
220<\/td>\nG.1 Introduction
G.2 Sample syntaxes
G.2.1 First example <\/td>\n<\/tr>\n
222<\/td>\nG.2.2 Second example <\/td>\n<\/tr>\n
224<\/td>\nG.3 Privilege attribute example <\/td>\n<\/tr>\n
227<\/td>\nI.1 Example 1: Use of basic constraints
I.2 Example 2: Use of policy mapping and policy constraints
I.3 Use of name constraints extension
I.3.1 Examples of public-key certificate format with name constraints extension <\/td>\n<\/tr>\n
228<\/td>\nI.3.1.1 Examples of permittedsubtrees <\/td>\n<\/tr>\n
229<\/td>\nI.3.1.2 Examples of excludedsubtrees <\/td>\n<\/tr>\n
230<\/td>\nI.3.1.3 Examples of permittedsubtrees and excludedsubtrees
I.3.2 Examples of certificate handling with name constraints extension
I.3.2.1 Name spaces constraints by permitted-subtrees indistinguished name form <\/td>\n<\/tr>\n
232<\/td>\nI.3.2.2 Name spaces constraints by excluded-subtrees in distinguished name form <\/td>\n<\/tr>\n
233<\/td>\nI.3.2.3 Name spaces constraints by permitted-subtrees in multiple name forms <\/td>\n<\/tr>\n
234<\/td>\nI.3.2.4 Name spaces constraints by excluded-subtrees in multiple name forms
I.3.3 Examples where multiple cross-certificates with name constraints extension are needed <\/td>\n<\/tr>\n
235<\/td>\nI.3.3.1 Conflicting name space constraints requirements
I.3.3.2 Disjunctive evaluation of name space constraints <\/td>\n<\/tr>\n
236<\/td>\nJ.1 Certification path valid for a user-specified policy required <\/td>\n<\/tr>\n
237<\/td>\nJ.2 Certification path valid for any policy required
J.3 Certification path valid regardless of policy
J.4 Certification path valid for a user-specific policy desired, but not required <\/td>\n<\/tr>\n
239<\/td>\nL.1 CRL scope extension <\/td>\n<\/tr>\n
242<\/td>\nM.1 Scope
M.2 Basic directory concepts
M.3 Directory schema <\/td>\n<\/tr>\n
243<\/td>\nM.4 Directory distinguished names
M.5 Subtrees <\/td>\n<\/tr>\n
244<\/td>\nN.1 Introduction <\/td>\n<\/tr>\n
245<\/td>\nN.2 One-way authentication
N.3 Two-way authentication <\/td>\n<\/tr>\n
246<\/td>\nN.4 Three-way authentication <\/td>\n<\/tr>\n
247<\/td>\nN.5 Five-way authentication (initiated by A) <\/td>\n<\/tr>\n
248<\/td>\nN.6 Five-way authentication (initiated by B) <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Information technology. Open Systems Interconnection. The Directory – Public-key and attribute certificate frameworks<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n258<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":353231,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[675,2641],"product_tag":[],"class_list":{"0":"post-353226","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-35-100-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/353226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/353231"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=353226"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=353226"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=353226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}