home *** CD-ROM | disk | FTP | other *** search
-
-
-
-
-
-
- Network Working Group S. Boeyen
- Request for Comments: 2587 Entrust
- Category: Standards Track T. Howes
- Netscape
- P. Richard
- Xcert
- June 1999
-
-
-
- Internet X.509 Public Key Infrastructure
- LDAPv2 Schema
-
- Status of this Memo
-
- This document specifies an Internet standards track protocol for the
- Internet community, and requests discussion and suggestions for
- improvements. Please refer to the current edition of the "Internet
- Official Protocol Standards" (STD 1) for the standardization state
- and status of this protocol. Distribution of this memo is unlimited.
-
- Copyright Notice
-
- Copyright (C) The Internet Society (1999). All Rights Reserved.
-
- 1. Abstract
-
- The schema defined in this document is a minimal schema to support
- PKIX in an LDAPv2 environment, as defined in RFC 2559. Only PKIX-
- specific components are specified here. LDAP servers, acting as PKIX
- repositories should support the auxiliary object classes defined in
- this specification and integrate this schema specification with the
- generic and other application-specific schemas as appropriate,
- depending on the services to be supplied by that server.
-
- The key words 'MUST', 'SHALL', 'REQUIRED', 'SHOULD', 'RECOMMENDED',
- and 'MAY' in this document are to be interpreted as described in RFC
- 2119.
-
- 2. Introduction
-
- This specification is part of a multi-part standard for development
- of a Public Key Infrastructure (PKI) for the Internet. LDAPv2 is one
- mechanism defined for access to a PKI repository. Other mechanisms,
- such as http, are also defined. If an LDAP server, accessed by LDAPv2
- is used to provide a repository, the minimum requirement is that the
- repository support the addition of X.509 certificates to directory
-
-
-
-
- Boeyen, et al. Standards Track [Page 1]
-
- RFC 2587 PKIX LDAPv2 Schema June 1999
-
-
- entries. Certificate Revocation List (CRL)is one mechanism for
- publishing revocation information in a repository. Other mechanisms,
- such as http, are also defined.
-
- This specification defines the attributes and object classes to be
- used by LDAP servers acting as PKIX repositories and to be understood
- by LDAP clients communicating with such repositories to query, add,
- modify and delete PKI information. Some object classes and attributes
- defined in X.509 are duplicated here for completeness. For end
- entities and Certification Authorities (CA), the earlier X.509
- defined object classes mandated inclusion of attributes which are
- optional for PKIX. Also, because of the mandatory attribute
- specification, this would have required dynamic modification of the
- object class attribute should the attributes not always be present in
- entries. For these reasons, alternative object classes are defined in
- this document for use by LDAP servers acting as PKIX repositories.
-
- 3. PKIX Repository Objects
-
- The primary PKIX objects to be represented in a repository are:
-
- - End Entities
- - Certification Authorities (CA)
-
- These objects are defined in RFC 2459.
-
- 3.1. End Entities
-
- For purposes of PKIX schema definition, the role of end entities as
- subjects of certificates is the major aspect relevant to this
- specification. End entities may be human users, or other types of
- entities to which certificates may be issued. In some cases, the
- entry for the end entity may already exist and the PKI-specific
- information is added to the existing entry. In other cases the entry
- may not exist prior to the issuance of a certificate, in which case
- the entity adding the certificate may also need to create the entry.
- Schema elements used to represent the non PKIX aspects of an entry,
- such as the structural object class used to represent organizational
- persons, may vary, depending on the particular environment and set of
- applications served and are outside the scope of this specification.
-
- The following auxiliary object class MAY be used to represent
- certificate subjects:
-
-
-
-
-
-
-
-
- Boeyen, et al. Standards Track [Page 2]
-
- RFC 2587 PKIX LDAPv2 Schema June 1999
-
-
- pkiUser OBJECT-CLASS ::= {
- SUBCLASS OF { top}
- KIND auxiliary
- MAY CONTAIN {userCertificate}
- ID joint-iso-ccitt(2) ds(5) objectClass(6) pkiUser(21)}
-
- userCertificate ATTRIBUTE ::= {
- WITH SYNTAX Certificate
- EQUALITY MATCHING RULE certificateExactMatch
- ID joint-iso-ccitt(2) ds(5) attributeType(4) userCertificate(36) }
-
- An end entity may obtain one or more certificates from one or more
- Certification Authorities. The userCertificate attribute MUST be
- used to represent these certificates in the directory entry
- representing that user.
-
- 3.2. Certification Authorities
-
- As with end entities, Certification Authorities are typically
- represented in directories as auxiliary components of entries
- representing a more generic object, such as organizations,
- organizational units etc. The non PKIX-specific schema elements for
- these entries, such as the structural object class of the object, are
- outside the scope of this specification.
-
- The following auxiliary object class MAY be used to represent
- Certification Authorities:
-
- pkiCA OBJECT-CLASS ::= {
- SUBCLASS OF { top}
- KIND auxiliary
- MAY CONTAIN {cACertificate |
- certificateRevocationList |
- authorityRevocationList |
- crossCertificatePair }
- ID joint-iso-ccitt(2) ds(5) objectClass(6) pkiCA(22)}
-
- cACertificate ATTRIBUTE ::= {
- WITH SYNTAX Certificate
- EQUALITY MATCHING RULE certificateExactMatch
- ID joint-iso-ccitt(2) ds(5) attributeType(4) cACertificate(37) }
-
- crossCertificatePairATTRIBUTE::={
- WITH SYNTAX CertificatePair
- EQUALITY MATCHING RULE certificatePairExactMatch
- ID joint-iso-ccitt(2) ds(5) attributeType(4) crossCertificatePair(40)}
-
-
-
-
-
- Boeyen, et al. Standards Track [Page 3]
-
- RFC 2587 PKIX LDAPv2 Schema June 1999
-
-
- The cACertificate attribute of a CA's directory entry shall be used
- to store self-issued certificates (if any) and certificates issued to
- this CA by CAs in the same realm as this CA.
-
- The forward elements of the crossCertificatePair attribute of a CA's
- directory entry shall be used to store all, except self-issued
- certificates issued to this CA. Optionally, the reverse elements of
- the crossCertificatePair attribute, of a CA's directory entry may
- contain a subset of certificates issued by this CA to other CAs.
- When both the forward and the reverse elements are present in a
- single attribute value, issuer name in one certificate shall match
- the subject name in the other and vice versa, and the subject public
- key in one certificate shall be capable of verifying the digital
- signature on the other certificate and vice versa.
-
- When a reverse element is present, the forward element value and the
- reverse element value need not be stored in the same attribute value;
- in other words, they can be stored in either a single attribute value
- or two attribute values.
-
- In the case of V3 certificates, none of the above CA certificates
- shall include a basicConstraints extension with the cA value set to
- FALSE.
-
- The definition of realm is purely a matter of local policy.
-
- certificateRevocationListATTRIBUTE::={
- WITH SYNTAX CertificateList
- EQUALITY MATCHING RULE certificateListExactMatch
- ID joint-iso-ccitt(2) ds(5) attributeType(4)
- certificateRevocationList(39)}
-
- The certificateRevocationList attribute, if present in a particular
- CA's entry, contains CRL(s) as defined in RFC 2459.
-
- authorityRevocationListATTRIBUTE::={
- WITH SYNTAX CertificateList
- EQUALITY MATCHING RULE certificateListExactMatch
- ID joint-iso-ccitt(2) ds(5) attributeType(4)
- authorityRevocationList(38)}
-
- The authorityRevocationList attribute, if present in a particular
- CA's entry, includes revocation information regarding certificates
- issued to other CAs.
-
-
-
-
-
-
-
- Boeyen, et al. Standards Track [Page 4]
-
- RFC 2587 PKIX LDAPv2 Schema June 1999
-
-
- 3.2.1. CRL distribution points
-
- CRL distribution points are an optional mechanism, specified in RFC
- 2459, which MAY be used to distribute revocation information.
-
- A patent statement regarding CRL distribution points can be found at
- the end of this document.
-
- If a CA elects to use CRL distribution points, the following object
- class is used to represent these.
-
- cRLDistributionPoint OBJECT-CLASS::= {
- SUBCLASS OF { top }
- KIND structural
- MUST CONTAIN { commonName }
- MAY CONTAIN { certificateRevocationList |
- authorityRevocationList |
- deltaRevocationList }
- ID joint-iso-ccitt(2) ds(5) objectClass(6) cRLDistributionPoint(19) }
-
- The certificateRevocationList and authorityRevocationList attributes
- are as defined above.
-
- The commonName attribute and deltaRevocationList attributes, defined
- in X.509, are duplicated below.
-
- commonName ATTRIBUTE::={
- SUBTYPE OF name
- WITH SYNTAX DirectoryString
- ID joint-iso-ccitt(2) ds(5) attributeType(4) commonName(3) }
-
- deltaRevocationList ATTRIBUTE ::= {
- WITH SYNTAX CertificateList
- EQUALITY MATCHING RULE certificateListExactMatch
- ID joint-iso-ccitt(2) ds(5) attributeType(4)
- deltaRevocationList(53) }
-
- 3.2.2. Delta CRLs
-
- Delta CRLs are an optional mechanism, specified in RFC 2459, which
- MAY be used to enhance the distribution of revocation information.
-
- If a CA elects to use delta CRLs, the following object class is used
- to represent these.
-
-
-
-
-
-
-
- Boeyen, et al. Standards Track [Page 5]
-
- RFC 2587 PKIX LDAPv2 Schema June 1999
-
-
- deltaCRL OBJECT-CLASS::= {
- SUBCLASS OF { top }
- KIND auxiliary
- MAY CONTAIN { deltaRevocationList }
- ID joint-iso-ccitt(2) ds(5) objectClass(6) deltaCRL(23) }
-
- 4. Security Considerations
-
- Since the elements of information which are key to the PKI service
- (certificates and CRLs) are both digitally signed pieces of
- information, no additional integrity service is REQUIRED.
-
- Security considerations with respect to retrieval, addition,
- deletion, and modification of the information supported by this
- schema definition are addressed in RFC 2559.
-
- 5. References
-
- [1] Yeong, Y., Howes, T. and S. Kille, "Lightweight Directory Access
- Protocol", RFC 1777, March 1995.
-
- [2] Bradner, S., "Key Words for use in RFCs to Indicate Requirement
- Levels", BCP 14, RFC 2119, March 1997.
-
- 6 Intellectual Property Rights
-
- The IETF has been notified of intellectual property rights claimed in
- regard to some or all of the specification contained in this
- document. For more information consult the online list of claimed
- rights.
-
- The IETF takes no position regarding the validity or scope of any
- intellectual property or other rights that might be claimed to
- pertain to the implementation or use of the technology described in
- this document or the extent to which any license under such rights
- might or might not be available; neither does it represent that it
- has made any effort to identify any such rights. Information on the
- IETF's procedures with respect to rights in standards-track and
- standards-related documentation can be found in BCP-11. Copies of
- claims of rights made available for publication and any assurances of
- licenses to be made available, or the result of an attempt made to
- obtain a general license or permission for the use of such
- proprietary rights by implementors or users of this specification can
- be obtained from the IETF Secretariat.
-
-
-
-
-
-
-
- Boeyen, et al. Standards Track [Page 6]
-
- RFC 2587 PKIX LDAPv2 Schema June 1999
-
-
- 7. Authors' Addresses
-
- Sharon Boeyen
- Entrust Technologies Limited
- 750 Heron Road
- Ottawa, Ontario
- Canada K1V 1A7
-
- EMail: sharon.boeyen@entrust.com
-
-
- Tim Howes
- Netscape Communications Corp.
- 501 E. Middlefield Rd.
- Mountain View, CA 94043
- USA
-
- EMail: howes@netscape.com
-
-
- Patrick Richard
- Xcert Software Inc.
- Suite 1001, 701 W. Georgia Street
- P.O. Box 10145
- Pacific Centre
- Vancouver, B.C.
- Canada V7Y 1C6
-
- EMail: patr@xcert.com
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Boeyen, et al. Standards Track [Page 7]
-
- RFC 2587 PKIX LDAPv2 Schema June 1999
-
-
- Full Copyright Statement
-
- Copyright (C) The Internet Society (1999). All Rights Reserved.
-
- This document and translations of it may be copied and furnished to
- others, and derivative works that comment on or otherwise explain it
- or assist in its implementation may be prepared, copied, published
- and distributed, in whole or in part, without restriction of any
- kind, provided that the above copyright notice and this paragraph are
- included on all such copies and derivative works. However, this
- document itself may not be modified in any way, such as by removing
- the copyright notice or references to the Internet Society or other
- Internet organizations, except as needed for the purpose of
- developing Internet standards in which case the procedures for
- copyrights defined in the Internet Standards process must be
- followed, or as required to translate it into languages other than
- English.
-
- The limited permissions granted above are perpetual and will not be
- revoked by the Internet Society or its successors or assigns.
-
- This document and the information contained herein is provided on an
- "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
- TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
- BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
- HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
- MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
-
- Acknowledgement
-
- Funding for the RFC Editor function is currently provided by the
- Internet Society.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Boeyen, et al. Standards Track [Page 8]
-
-