ДСТУ ISO/IEC 9594-8:2021 Информационные технологии. Взаимосвязь открытых систем. Часть 8. Каталог. Структура сертификатов открытых ключей и атрибутов (ISO/IEC 9594-8:2020, IDT)

Данный документ доступнен в тарифе «ВСЕ ВКЛЮЧЕНО»

У Вас есть вопросы по документу? Мы рады на них ответить!Перечень бесплатных документовОбнаружили ошибку в документе или на сайте? Пожалуйста, напишите нам об этом!Оставить заявку на документ


ПІДТВЕРДЖУВАЛЬНЕ ПОВІДОМЛЕННЯ

Державне підприємство
«Український науково-дослідний і навчальний центр
проблем стандартизації, сертифікації та якості»
(ДП «УкрНДНЦ»)

Наказ від 16.12.2021 №512

ISO/IEC 9594-8:2020

Information technology — Open systems interconnection —
Part 8: The Directory: Public-key and attribute certificate frameworks

прийнято як національний стандарт
методом «підтвердження» за позначенням

ДСТУ ISO/IEC 9594-8:2021
(ISO/IEC 9594-8:2020, IDT)

Інформаційні технології. Взаємозв’язок відкритих систем.
Частина 8. Каталог, структура сертифікатів відкритих ключів та атрибутів

З наданням чинності від 2021-12-22

 

 
 
Не є офіційним виданням.
Офіційне видання розповсюджує національний орган стандартизації
(ДП «УкрНДНЦ» http://uas.gov.ua)
 

Contents

SECTION I - General

1 Scope

2 Normative references

2.1 Identical Recommendations | International Standards

2.2 Paired Recommendations | International Standards equivalent in technical content

2.3 Recommendations

2.4 Other references

3 Definitions

3.1 OS1 Reference Model security architecture definitions

3.2 Baseline identity management terms and definitions

3.3 Directory model definitions

3.4 Access control framework definitions

3.5 Public-key and attribute certificate definitions

4 Abbreviations

5 Conventions

6 Frameworks overview

6.1 Digital signatures

6.2 Public-key cryptography and cryptographic algorithms

6.3 Distinguished encoding of basic encoding rules

6.4 Applying distinguished encoding

6.5 Using repositories

SECTION 2 - PUBLIC-KEY CERTIFICATE FRAMEWORK

7 Public keys and public-key certificates

7.1 Introduction

7.2 Public-key certificate

7.3 Public-key certificate extensions

7.4 Types of public-key certificates

7.5 Trust anchor

7.6 Entity relationship

7.7 Certification path

7.8 Generation of key pairs

7.9 Public-key certificate creation

7.10 Certificate revocation list

7.11 Uniqueness of names

7.12 Indirect CRLs

7.13 Repudiation of a digital signing

8 Trust models

8.1 Three-cornered trust model

8.2 Four cornered trust model

9 Public-key certificate and CRL extensions

9.1 Policy handling

9.2 Key and policy information extensions

9.3 Subject and issuer information extensions

9.4 Certification path constraint extensions

9.5 Basic CRL extensions

9.6 CRL distribution points and delta CRL extensions

9.7 Authorization and validation list extensions

9.8 Alternative cryptographic algorithms and digital signature extensions

10 Delta CRL relationship to base

11 Authorization and validation lists

11.1 Authorization and validation list concept

11.2 The authorizer

11.3 Authorization and validation list syntax

11.4 Multiple cryptographic algorithms for authorization and validation list

12 Certification path processing procedure

12.1 Path processing inputs

12.2 Path processing outputs

12.3 Path processing variables

12.4 Initialization step

12.5 Public-key certificate processing

13 PKI directory schema

13.1 PKI directory object classes and name forms

13.2 PKI directory attributes

13.3 PKI directory matching rules

13.4 PKI directory syntax definitions

SECTION 3 - ATTRIBUTE CERTIFICATE FRAMEWORK

14 Attribute certificates

14.1 General

14.2 Attribute certificate syntax

14.3 Multiple cryptographic algorithms for attribute certificates

14.4 Delegation paths

14.5 Attribute certificate revocation lists

15 Attribute authority, source of authority and certification authority relationship

15.1 Privilege in attribute certificates

15.2 Privilege in public-key certificates

16 PM I models

16.1 General model

16.2 Control model

16.3 Delegation model

16.4 Group assignment model

16.5 Roles model

16.6 Recognition of Authority Model

16.7 XML privilege information attribute

16.8 Permission attribute and matching rule

17 Attribute certificate and attribute certificate revocation list extensions

17.1 Basic privilege management extensions

17.2 Privilege revocation extensions

17.3 Source of authority extensions

17.4 Role extensions

17.5 Delegation extensions

17.6 Recognition of authority extensions

17.7 Use of alternative digital signature algorithm and digital signature extensions

18 Delegation path processing procedure

18.1 Basic processing procedure

18.2 Role processing procedure

18.3 Delegation processing procedure

19 PM I directory schema

19.1 PM I directory object classes

19.2 PM I directory attributes

19.3 PMI general directory matching rules

Annex A - Public-key and attribute certificate frameworks

Annex В - Reference definition of cryptographic algorithms

Annex C - Certificate extension attribute types

Annex D - External ASN.1 modules

Annex E - CRL generation and processing rules

Annex F - Examples of delta CRL issuance

Annex G - Privilege policy and privilege attribute definition examples

Annex H - An introduction to public key cryptography

Annex I - Examples of use of certification path constraints

Annex J - Guidance on determining for which policies a certification path is valid

Annex К - Key usage certificate extension issues

Annex L - Deprecated extensions

Annex M - Directory concepts

Annex N - Considerations on strong authentication

Annex О - Alphabetical list of information item definitions

Annex P - Amendments and corrigenda

Bibliography

Полная версия документа доступна в тарифе «ВСЕ ВКЛЮЧЕНО».

Войти в Личный кабинет Подробнее о тарифах

БУДСТАНДАРТ Online