mirror of
https://git.openldap.org/openldap/openldap.git
synced 2024-12-21 03:10:25 +08:00
452 lines
15 KiB
Plaintext
452 lines
15 KiB
Plaintext
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Network Working Group S. Boeyen
|
|||
|
Request for Comments: 2587 Entrust
|
|||
|
Category: Standards Track T. Howes
|
|||
|
Netscape
|
|||
|
P. Richard
|
|||
|
Xcert
|
|||
|
June 1999
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Internet X.509 Public Key Infrastructure
|
|||
|
LDAPv2 Schema
|
|||
|
|
|||
|
Status of this Memo
|
|||
|
|
|||
|
This document specifies an Internet standards track protocol for the
|
|||
|
Internet community, and requests discussion and suggestions for
|
|||
|
improvements. Please refer to the current edition of the "Internet
|
|||
|
Official Protocol Standards" (STD 1) for the standardization state
|
|||
|
and status of this protocol. Distribution of this memo is unlimited.
|
|||
|
|
|||
|
Copyright Notice
|
|||
|
|
|||
|
Copyright (C) The Internet Society (1999). All Rights Reserved.
|
|||
|
|
|||
|
1. Abstract
|
|||
|
|
|||
|
The schema defined in this document is a minimal schema to support
|
|||
|
PKIX in an LDAPv2 environment, as defined in RFC 2559. Only PKIX-
|
|||
|
specific components are specified here. LDAP servers, acting as PKIX
|
|||
|
repositories should support the auxiliary object classes defined in
|
|||
|
this specification and integrate this schema specification with the
|
|||
|
generic and other application-specific schemas as appropriate,
|
|||
|
depending on the services to be supplied by that server.
|
|||
|
|
|||
|
The key words 'MUST', 'SHALL', 'REQUIRED', 'SHOULD', 'RECOMMENDED',
|
|||
|
and 'MAY' in this document are to be interpreted as described in RFC
|
|||
|
2119.
|
|||
|
|
|||
|
2. Introduction
|
|||
|
|
|||
|
This specification is part of a multi-part standard for development
|
|||
|
of a Public Key Infrastructure (PKI) for the Internet. LDAPv2 is one
|
|||
|
mechanism defined for access to a PKI repository. Other mechanisms,
|
|||
|
such as http, are also defined. If an LDAP server, accessed by LDAPv2
|
|||
|
is used to provide a repository, the minimum requirement is that the
|
|||
|
repository support the addition of X.509 certificates to directory
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Boeyen, et al. Standards Track [Page 1]
|
|||
|
|
|||
|
RFC 2587 PKIX LDAPv2 Schema June 1999
|
|||
|
|
|||
|
|
|||
|
entries. Certificate Revocation List (CRL)is one mechanism for
|
|||
|
publishing revocation information in a repository. Other mechanisms,
|
|||
|
such as http, are also defined.
|
|||
|
|
|||
|
This specification defines the attributes and object classes to be
|
|||
|
used by LDAP servers acting as PKIX repositories and to be understood
|
|||
|
by LDAP clients communicating with such repositories to query, add,
|
|||
|
modify and delete PKI information. Some object classes and attributes
|
|||
|
defined in X.509 are duplicated here for completeness. For end
|
|||
|
entities and Certification Authorities (CA), the earlier X.509
|
|||
|
defined object classes mandated inclusion of attributes which are
|
|||
|
optional for PKIX. Also, because of the mandatory attribute
|
|||
|
specification, this would have required dynamic modification of the
|
|||
|
object class attribute should the attributes not always be present in
|
|||
|
entries. For these reasons, alternative object classes are defined in
|
|||
|
this document for use by LDAP servers acting as PKIX repositories.
|
|||
|
|
|||
|
3. PKIX Repository Objects
|
|||
|
|
|||
|
The primary PKIX objects to be represented in a repository are:
|
|||
|
|
|||
|
- End Entities
|
|||
|
- Certification Authorities (CA)
|
|||
|
|
|||
|
These objects are defined in RFC 2459.
|
|||
|
|
|||
|
3.1. End Entities
|
|||
|
|
|||
|
For purposes of PKIX schema definition, the role of end entities as
|
|||
|
subjects of certificates is the major aspect relevant to this
|
|||
|
specification. End entities may be human users, or other types of
|
|||
|
entities to which certificates may be issued. In some cases, the
|
|||
|
entry for the end entity may already exist and the PKI-specific
|
|||
|
information is added to the existing entry. In other cases the entry
|
|||
|
may not exist prior to the issuance of a certificate, in which case
|
|||
|
the entity adding the certificate may also need to create the entry.
|
|||
|
Schema elements used to represent the non PKIX aspects of an entry,
|
|||
|
such as the structural object class used to represent organizational
|
|||
|
persons, may vary, depending on the particular environment and set of
|
|||
|
applications served and are outside the scope of this specification.
|
|||
|
|
|||
|
The following auxiliary object class MAY be used to represent
|
|||
|
certificate subjects:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Boeyen, et al. Standards Track [Page 2]
|
|||
|
|
|||
|
RFC 2587 PKIX LDAPv2 Schema June 1999
|
|||
|
|
|||
|
|
|||
|
pkiUser OBJECT-CLASS ::= {
|
|||
|
SUBCLASS OF { top}
|
|||
|
KIND auxiliary
|
|||
|
MAY CONTAIN {userCertificate}
|
|||
|
ID joint-iso-ccitt(2) ds(5) objectClass(6) pkiUser(21)}
|
|||
|
|
|||
|
userCertificate ATTRIBUTE ::= {
|
|||
|
WITH SYNTAX Certificate
|
|||
|
EQUALITY MATCHING RULE certificateExactMatch
|
|||
|
ID joint-iso-ccitt(2) ds(5) attributeType(4) userCertificate(36) }
|
|||
|
|
|||
|
An end entity may obtain one or more certificates from one or more
|
|||
|
Certification Authorities. The userCertificate attribute MUST be
|
|||
|
used to represent these certificates in the directory entry
|
|||
|
representing that user.
|
|||
|
|
|||
|
3.2. Certification Authorities
|
|||
|
|
|||
|
As with end entities, Certification Authorities are typically
|
|||
|
represented in directories as auxiliary components of entries
|
|||
|
representing a more generic object, such as organizations,
|
|||
|
organizational units etc. The non PKIX-specific schema elements for
|
|||
|
these entries, such as the structural object class of the object, are
|
|||
|
outside the scope of this specification.
|
|||
|
|
|||
|
The following auxiliary object class MAY be used to represent
|
|||
|
Certification Authorities:
|
|||
|
|
|||
|
pkiCA OBJECT-CLASS ::= {
|
|||
|
SUBCLASS OF { top}
|
|||
|
KIND auxiliary
|
|||
|
MAY CONTAIN {cACertificate |
|
|||
|
certificateRevocationList |
|
|||
|
authorityRevocationList |
|
|||
|
crossCertificatePair }
|
|||
|
ID joint-iso-ccitt(2) ds(5) objectClass(6) pkiCA(22)}
|
|||
|
|
|||
|
cACertificate ATTRIBUTE ::= {
|
|||
|
WITH SYNTAX Certificate
|
|||
|
EQUALITY MATCHING RULE certificateExactMatch
|
|||
|
ID joint-iso-ccitt(2) ds(5) attributeType(4) cACertificate(37) }
|
|||
|
|
|||
|
crossCertificatePairATTRIBUTE::={
|
|||
|
WITH SYNTAX CertificatePair
|
|||
|
EQUALITY MATCHING RULE certificatePairExactMatch
|
|||
|
ID joint-iso-ccitt(2) ds(5) attributeType(4) crossCertificatePair(40)}
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Boeyen, et al. Standards Track [Page 3]
|
|||
|
|
|||
|
RFC 2587 PKIX LDAPv2 Schema June 1999
|
|||
|
|
|||
|
|
|||
|
The cACertificate attribute of a CA's directory entry shall be used
|
|||
|
to store self-issued certificates (if any) and certificates issued to
|
|||
|
this CA by CAs in the same realm as this CA.
|
|||
|
|
|||
|
The forward elements of the crossCertificatePair attribute of a CA's
|
|||
|
directory entry shall be used to store all, except self-issued
|
|||
|
certificates issued to this CA. Optionally, the reverse elements of
|
|||
|
the crossCertificatePair attribute, of a CA's directory entry may
|
|||
|
contain a subset of certificates issued by this CA to other CAs.
|
|||
|
When both the forward and the reverse elements are present in a
|
|||
|
single attribute value, issuer name in one certificate shall match
|
|||
|
the subject name in the other and vice versa, and the subject public
|
|||
|
key in one certificate shall be capable of verifying the digital
|
|||
|
signature on the other certificate and vice versa.
|
|||
|
|
|||
|
When a reverse element is present, the forward element value and the
|
|||
|
reverse element value need not be stored in the same attribute value;
|
|||
|
in other words, they can be stored in either a single attribute value
|
|||
|
or two attribute values.
|
|||
|
|
|||
|
In the case of V3 certificates, none of the above CA certificates
|
|||
|
shall include a basicConstraints extension with the cA value set to
|
|||
|
FALSE.
|
|||
|
|
|||
|
The definition of realm is purely a matter of local policy.
|
|||
|
|
|||
|
certificateRevocationListATTRIBUTE::={
|
|||
|
WITH SYNTAX CertificateList
|
|||
|
EQUALITY MATCHING RULE certificateListExactMatch
|
|||
|
ID joint-iso-ccitt(2) ds(5) attributeType(4)
|
|||
|
certificateRevocationList(39)}
|
|||
|
|
|||
|
The certificateRevocationList attribute, if present in a particular
|
|||
|
CA's entry, contains CRL(s) as defined in RFC 2459.
|
|||
|
|
|||
|
authorityRevocationListATTRIBUTE::={
|
|||
|
WITH SYNTAX CertificateList
|
|||
|
EQUALITY MATCHING RULE certificateListExactMatch
|
|||
|
ID joint-iso-ccitt(2) ds(5) attributeType(4)
|
|||
|
authorityRevocationList(38)}
|
|||
|
|
|||
|
The authorityRevocationList attribute, if present in a particular
|
|||
|
CA's entry, includes revocation information regarding certificates
|
|||
|
issued to other CAs.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Boeyen, et al. Standards Track [Page 4]
|
|||
|
|
|||
|
RFC 2587 PKIX LDAPv2 Schema June 1999
|
|||
|
|
|||
|
|
|||
|
3.2.1. CRL distribution points
|
|||
|
|
|||
|
CRL distribution points are an optional mechanism, specified in RFC
|
|||
|
2459, which MAY be used to distribute revocation information.
|
|||
|
|
|||
|
A patent statement regarding CRL distribution points can be found at
|
|||
|
the end of this document.
|
|||
|
|
|||
|
If a CA elects to use CRL distribution points, the following object
|
|||
|
class is used to represent these.
|
|||
|
|
|||
|
cRLDistributionPoint OBJECT-CLASS::= {
|
|||
|
SUBCLASS OF { top }
|
|||
|
KIND structural
|
|||
|
MUST CONTAIN { commonName }
|
|||
|
MAY CONTAIN { certificateRevocationList |
|
|||
|
authorityRevocationList |
|
|||
|
deltaRevocationList }
|
|||
|
ID joint-iso-ccitt(2) ds(5) objectClass(6) cRLDistributionPoint(19) }
|
|||
|
|
|||
|
The certificateRevocationList and authorityRevocationList attributes
|
|||
|
are as defined above.
|
|||
|
|
|||
|
The commonName attribute and deltaRevocationList attributes, defined
|
|||
|
in X.509, are duplicated below.
|
|||
|
|
|||
|
commonName ATTRIBUTE::={
|
|||
|
SUBTYPE OF name
|
|||
|
WITH SYNTAX DirectoryString
|
|||
|
ID joint-iso-ccitt(2) ds(5) attributeType(4) commonName(3) }
|
|||
|
|
|||
|
deltaRevocationList ATTRIBUTE ::= {
|
|||
|
WITH SYNTAX CertificateList
|
|||
|
EQUALITY MATCHING RULE certificateListExactMatch
|
|||
|
ID joint-iso-ccitt(2) ds(5) attributeType(4)
|
|||
|
deltaRevocationList(53) }
|
|||
|
|
|||
|
3.2.2. Delta CRLs
|
|||
|
|
|||
|
Delta CRLs are an optional mechanism, specified in RFC 2459, which
|
|||
|
MAY be used to enhance the distribution of revocation information.
|
|||
|
|
|||
|
If a CA elects to use delta CRLs, the following object class is used
|
|||
|
to represent these.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Boeyen, et al. Standards Track [Page 5]
|
|||
|
|
|||
|
RFC 2587 PKIX LDAPv2 Schema June 1999
|
|||
|
|
|||
|
|
|||
|
deltaCRL OBJECT-CLASS::= {
|
|||
|
SUBCLASS OF { top }
|
|||
|
KIND auxiliary
|
|||
|
MAY CONTAIN { deltaRevocationList }
|
|||
|
ID joint-iso-ccitt(2) ds(5) objectClass(6) deltaCRL(23) }
|
|||
|
|
|||
|
4. Security Considerations
|
|||
|
|
|||
|
Since the elements of information which are key to the PKI service
|
|||
|
(certificates and CRLs) are both digitally signed pieces of
|
|||
|
information, no additional integrity service is REQUIRED.
|
|||
|
|
|||
|
Security considerations with respect to retrieval, addition,
|
|||
|
deletion, and modification of the information supported by this
|
|||
|
schema definition are addressed in RFC 2559.
|
|||
|
|
|||
|
5. References
|
|||
|
|
|||
|
[1] Yeong, Y., Howes, T. and S. Kille, "Lightweight Directory Access
|
|||
|
Protocol", RFC 1777, March 1995.
|
|||
|
|
|||
|
[2] Bradner, S., "Key Words for use in RFCs to Indicate Requirement
|
|||
|
Levels", BCP 14, RFC 2119, March 1997.
|
|||
|
|
|||
|
6 Intellectual Property Rights
|
|||
|
|
|||
|
The IETF has been notified of intellectual property rights claimed in
|
|||
|
regard to some or all of the specification contained in this
|
|||
|
document. For more information consult the online list of claimed
|
|||
|
rights.
|
|||
|
|
|||
|
The IETF takes no position regarding the validity or scope of any
|
|||
|
intellectual property or other rights that might be claimed to
|
|||
|
pertain to the implementation or use of the technology described in
|
|||
|
this document or the extent to which any license under such rights
|
|||
|
might or might not be available; neither does it represent that it
|
|||
|
has made any effort to identify any such rights. Information on the
|
|||
|
IETF's procedures with respect to rights in standards-track and
|
|||
|
standards-related documentation can be found in BCP-11. Copies of
|
|||
|
claims of rights made available for publication and any assurances of
|
|||
|
licenses to be made available, or the result of an attempt made to
|
|||
|
obtain a general license or permission for the use of such
|
|||
|
proprietary rights by implementors or users of this specification can
|
|||
|
be obtained from the IETF Secretariat.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Boeyen, et al. Standards Track [Page 6]
|
|||
|
|
|||
|
RFC 2587 PKIX LDAPv2 Schema June 1999
|
|||
|
|
|||
|
|
|||
|
7. Authors' Addresses
|
|||
|
|
|||
|
Sharon Boeyen
|
|||
|
Entrust Technologies Limited
|
|||
|
750 Heron Road
|
|||
|
Ottawa, Ontario
|
|||
|
Canada K1V 1A7
|
|||
|
|
|||
|
EMail: sharon.boeyen@entrust.com
|
|||
|
|
|||
|
|
|||
|
Tim Howes
|
|||
|
Netscape Communications Corp.
|
|||
|
501 E. Middlefield Rd.
|
|||
|
Mountain View, CA 94043
|
|||
|
USA
|
|||
|
|
|||
|
EMail: howes@netscape.com
|
|||
|
|
|||
|
|
|||
|
Patrick Richard
|
|||
|
Xcert Software Inc.
|
|||
|
Suite 1001, 701 W. Georgia Street
|
|||
|
P.O. Box 10145
|
|||
|
Pacific Centre
|
|||
|
Vancouver, B.C.
|
|||
|
Canada V7Y 1C6
|
|||
|
|
|||
|
EMail: patr@xcert.com
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Boeyen, et al. Standards Track [Page 7]
|
|||
|
|
|||
|
RFC 2587 PKIX LDAPv2 Schema June 1999
|
|||
|
|
|||
|
|
|||
|
Full Copyright Statement
|
|||
|
|
|||
|
Copyright (C) The Internet Society (1999). All Rights Reserved.
|
|||
|
|
|||
|
This document and translations of it may be copied and furnished to
|
|||
|
others, and derivative works that comment on or otherwise explain it
|
|||
|
or assist in its implementation may be prepared, copied, published
|
|||
|
and distributed, in whole or in part, without restriction of any
|
|||
|
kind, provided that the above copyright notice and this paragraph are
|
|||
|
included on all such copies and derivative works. However, this
|
|||
|
document itself may not be modified in any way, such as by removing
|
|||
|
the copyright notice or references to the Internet Society or other
|
|||
|
Internet organizations, except as needed for the purpose of
|
|||
|
developing Internet standards in which case the procedures for
|
|||
|
copyrights defined in the Internet Standards process must be
|
|||
|
followed, or as required to translate it into languages other than
|
|||
|
English.
|
|||
|
|
|||
|
The limited permissions granted above are perpetual and will not be
|
|||
|
revoked by the Internet Society or its successors or assigns.
|
|||
|
|
|||
|
This document and the information contained herein is provided on an
|
|||
|
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
|
|||
|
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
|
|||
|
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
|
|||
|
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
|
|||
|
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
|
|||
|
|
|||
|
Acknowledgement
|
|||
|
|
|||
|
Funding for the RFC Editor function is currently provided by the
|
|||
|
Internet Society.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Boeyen, et al. Standards Track [Page 8]
|
|||
|
|