亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? rfc3281.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 5 頁
字號:
Network Working Group                                         S. FarrellRequest for Comments: 3281                        Baltimore TechnologiesCategory: Standards Track                                     R. Housley                                                        RSA Laboratories                                                              April 2002                   An Internet Attribute Certificate                       Profile for AuthorizationStatus of this Memo   This document specifies an Internet standards track protocol for the   Internet community, and requests discussion and suggestions for   improvements.  Please refer to the current edition of the "Internet   Official Protocol Standards" (STD 1) for the standardization state   and status of this protocol.  Distribution of this memo is unlimited.Copyright Notice   Copyright (C) The Internet Society (2002).  All Rights Reserved.Abstract   This specification defines a profile for the use of X.509 Attribute   Certificates in Internet Protocols.  Attribute certificates may be   used in a wide range of applications and environments covering a   broad spectrum of interoperability goals and a broader spectrum of   operational and assurance requirements.  The goal of this document is   to establish a common baseline for generic applications requiring   broad interoperability as well as limited special purpose   requirements.  The profile places emphasis on attribute certificate   support for Internet electronic mail, IPSec, and WWW security   applications.Table of Contents   1. Introduction.................................................  2       1.1  Delegation and AC chains...............................  4       1.2  Attribute Certificate Distribution ("push" vs. "pull").  4       1.3  Document Structure.....................................  6   2. Terminology..................................................  6   3. Requirements.................................................  7   4. Attribute Certificate Profile................................  7       4.1  X.509 Attribute Certificate Definition.................  8       4.2  Profile of Standard Fields............................. 10           4.2.1  Version.......................................... 10           4.2.2  Holder........................................... 11Farrell & Housley           Standards Track                     [Page 1]RFC 3281           An Internet Attribute Certificate          April 2002           4.2.3  Issuer........................................... 12           4.2.4  Signature........................................ 12           4.2.5  Serial Number.................................... 12           4.2.6  Validity Period.................................. 13           4.2.7  Attributes....................................... 13           4.2.8  Issuer Unique Identifier......................... 14           4.2.9  Extensions....................................... 14       4.3  Extensions............................................. 14           4.3.1  Audit Identity................................... 14           4.3.2  AC Targeting..................................... 15           4.3.3  Authority Key Identifier......................... 17           4.3.4  Authority Information Access..................... 17           4.3.5  CRL Distribution Points.......................... 17           4.3.6  No Revocation Available.......................... 18       4.4  Attribute Types........................................ 18           4.4.1  Service Authentication Information............... 19           4.4.2  Access Identity.................................. 19           4.4.3  Charging Identity................................ 20           4.4.4  Group............................................ 20           4.4.5  Role............................................. 20           4.4.6  Clearance........................................ 21       4.5  Profile of AC issuer's PKC............................. 22   5. Attribute Certificate Validation............................. 23   6. Revocation................................................... 24   7. Optional Features............................................ 25       7.1  Attribute Encryption................................... 25       7.2  Proxying............................................... 27       7.3  Use of ObjectDigestInfo................................ 28       7.4  AA Controls............................................ 29   8. Security Considerations...................................... 30   9. IANA Considerations.......................................... 32   10. References.................................................. 32   Appendix A: Object Identifiers.................................. 34   Appendix B: ASN.1 Module........................................ 35   Author's Addresses.............................................. 39   Acknowledgements................................................ 39   Full Copyright Statement........................................ 401. Introduction   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in BCP 14, RFC 2119.   X.509 public key certificates (PKCs) [X.509-1997, X.509-2000,   PKIXPROF] bind an identity and a public key.  An attribute   certificate (AC) is a structure similar to a PKC; the main difference   being that the AC contains no public key.  An AC may containFarrell & Housley           Standards Track                     [Page 2]RFC 3281           An Internet Attribute Certificate          April 2002   attributes that specify group membership, role, security clearance,   or other authorization information associated with the AC holder.   The syntax for the AC is defined in Recommendation X.509, making the   term "X.509 certificate" ambiguous.   Some people constantly confuse PKCs and ACs.  An analogy may make the   distinction clear.  A PKC can be considered to be like a passport: it   identifies the holder, tends to last for a long time, and should not   be trivial to obtain.  An AC is more like an entry visa: it is   typically issued by a different authority and does not last for as   long a time.  As acquiring an entry visa typically requires   presenting a passport, getting a visa can be a simpler process.   Authorization information may be placed in a PKC extension or placed   in a separate attribute certificate (AC).  The placement of   authorization information in PKCs is usually undesirable for two   reasons.  First, authorization information often does not have the   same lifetime as the binding of the identity and the public key.   When authorization information is placed in a PKC extension, the   general result is the shortening of the PKC useful lifetime.  Second,   the PKC issuer is not usually authoritative for the authorization   information.  This results in additional steps for the PKC issuer to   obtain authorization information from the authoritative source.   For these reasons, it is often better to separate authorization   information from the PKC.  Yet, authorization information also needs   to be bound to an identity.  An AC provides this binding; it is   simply a digitally signed (or certified) identity and set of   attributes.   An AC may be used with various security services, including access   control, data origin authentication, and non-repudiation.   PKCs can provide an identity to access control decision functions.   However, in many contexts the identity is not the criterion that is   used for access control decisions, rather the role or group-   membership of the accessor is the criterion used.  Such access   control schemes are called role-based access control.   When making an access control decision based on an AC, an access   control decision function may need to ensure that the appropriate AC   holder is the entity that has requested access.  One way in which the   linkage between the request or identity and the AC can be achieved is   the inclusion of a reference to a PKC within the AC and the use of   the private key corresponding to the PKC for authentication within   the access request.Farrell & Housley           Standards Track                     [Page 3]RFC 3281           An Internet Attribute Certificate          April 2002   ACs may also be used in the context of a data origin authentication   service and a non-repudiation service.  In these contexts, the   attributes contained in the AC provide additional information about   the signing entity.  This information can be used to make sure that   the entity is authorized to sign the data.  This kind of checking   depends either on the context in which the data is exchanged or on   the data that has been digitally signed.1.1 Delegation and AC chains   The X.509 standard [X.509-2000] defines authorization as the   "conveyance of privilege from one entity that holds such privilege,   to another entity".  An AC is one authorization mechanism.   An ordered sequence of ACs could be used to verify the authenticity   of a privilege asserter's privilege.  In this way, chains or paths of   ACs could be employed to delegate authorization.   Since the administration and processing associated with such AC   chains is complex and the use of ACs in the Internet today is quite   limited, this specification does NOT RECOMMEND the use of AC chains.   Other (future) specifications may address the use of AC chains.  This   specification deals with the simple cases, where one authority issues   all of the ACs for a particular set of attributes.  However, this   simplification does not preclude the use of several different   authorities, each of which manages a different set of attributes.   For example, group membership may be included in one AC issued by one   authority, and security clearance may be included in another AC   issued by another authority.   This means that conformant implementations are only REQUIRED to be   able to process a single AC at a time.  Processing of more than one   AC, one after another, may be necessary.  Note however, that   validation of an AC MAY require validation of a chain of PKCs, as   specified in [PKIXPROF].1.2 Attribute Certificate Distribution ("push" vs. "pull")   As discussed above, ACs provide a mechanism to securely provide   authorization information to, for example, access control decision   functions.  However, there are a number of possible communication   paths for ACs.   In some environments, it is suitable for a client to "push" an AC to   a server.  This means that no new connections between the client and   server are required.  It also means that no search burden is imposed   on servers, which improves performance and that the AC verifier isFarrell & Housley           Standards Track                     [Page 4]RFC 3281           An Internet Attribute Certificate          April 2002   only presented with what it "needs to know."  The "push" model is   especially suitable in inter-domain cases where the client's rights   should be assigned within the client's "home" domain.   In other cases, it is more suitable for a client to simply   authenticate to the server and for the server to request or "pull"   the client's AC from an AC issuer or a repository.  A major benefit   of the "pull" model is that it can be implemented without changes to   the client or to the client-server protocol.  The "pull" model is   especially suitable for inter-domain cases where the client's rights   should be assigned within the server's domain, rather than within the   client's domain.   There are a number of possible exchanges involving three entities:   the client, the server, and the AC issuer.  In addition, a directory   service or other repository for AC retrieval MAY be supported.   Figure 1 shows an abstract view of the exchanges that may involve   ACs.  This profile does not specify a protocol for these exchanges.      +--------------+      |              |        Server Acquisition      |  AC issuer   +----------------------------+      |              |                            |      +--+-----------+                            |         |                                        |         | Client                                 |         | Acquisition                            |         |                                        |      +--+-----------+                         +--+------------+      |              |       AC "push"         |               |      |   Client     +-------------------------+    Server     |      |              | (part of app. protocol) |               |      +--+-----------+                         +--+------------+         |                                        |         | Client                                 | Server         | Lookup        +--------------+         | Lookup         |               |              |         |         +---------------+  Repository  +---------+                         |              |                         +--------------+                     Figure 1: AC ExchangesFarrell & Housley           Standards Track                     [Page 5]RFC 3281           An Internet Attribute Certificate          April 20021.3 Document Structure   Section 2 defines some terminology.  Section 3 specifies the   requirements that this profile is intended to meet.  Section 4   contains the profile of the X.509 AC.  Section 5 specifies rules for   AC validation.  Section 6 specifies rules for AC revocation checks.   Section 7 specifies optional features which MAY be supported;   however, support for these features is not required for conformance   to this profile.  Finally, appendices contain the list of OIDs   required to support this specification and an ASN.1 module.2. Terminology   For simplicity, we use the terms client and server in this   specification.  This is not intended to indicate that ACs are only to   be used in client-server environments.  For example, ACs may be used   in the S/MIME v3 context, where the mail user agent would be both a   "client" and a "server" in the sense the terms are used here.   Term          Meaning   AA            Attribute Authority, the entity that issues the                 AC, synonymous in this specification with "AC                 issuer"   AC            Attribute Certificate   AC user       any entity that parses or processes an AC   AC verifier   any entity that checks the validity of an AC and                 then makes use of the result   AC issuer     the entity which signs the AC, synonymous in this                 specification with "AA"   AC holder     the entity indicated (perhaps indirectly) in the                 holder field of the AC   Client        the entity which is requesting the action for

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产亚洲欧美一级| 色婷婷综合久久久| 国产高清精品在线| 99re热这里只有精品免费视频| 成人免费高清在线观看| 在线观看视频一区二区| 日韩欧美视频一区| 国产精品久久久久aaaa| 一区二区视频在线| 国产一二三精品| 欧美在线不卡视频| 色先锋资源久久综合| 日韩欧美电影一二三| 136国产福利精品导航| 男男视频亚洲欧美| 色哟哟国产精品免费观看| 精品国产不卡一区二区三区| 最新日韩在线视频| 精品亚洲国产成人av制服丝袜 | 日韩精品影音先锋| 国产欧美日韩在线| 丝袜亚洲另类丝袜在线| 不卡一区中文字幕| 欧美v亚洲v综合ⅴ国产v| 偷拍一区二区三区| 8x8x8国产精品| 视频一区在线播放| 7777精品伊人久久久大香线蕉经典版下载 | 日韩精品一区在线| 奇米888四色在线精品| 欧美精选在线播放| 日韩精品乱码免费| 日韩精品中文字幕在线一区| 美美哒免费高清在线观看视频一区二区| 欧美伊人久久大香线蕉综合69| 一区二区三区四区在线免费观看 | 亚洲精品亚洲人成人网| 色综合久久综合网欧美综合网 | 久久久天堂av| 成人免费视频一区| 国产精品国模大尺度视频| 成人激情午夜影院| 亚洲欧洲在线观看av| 91蜜桃免费观看视频| 亚洲久草在线视频| 欧美日韩视频在线第一区 | 欧美日韩国产一区| 日本不卡视频在线| 久久影音资源网| av电影在线观看完整版一区二区| 国产精品妹子av| 欧美丝袜丝nylons| 精品中文字幕一区二区| 久久久不卡影院| 色av成人天堂桃色av| 亚洲h动漫在线| 久久综合久色欧美综合狠狠| 成人性色生活片| 亚洲一区精品在线| 精品欧美乱码久久久久久| 国产成人精品免费看| 亚洲一区二区高清| 久久亚洲精华国产精华液| av在线综合网| 日韩精品成人一区二区在线| 国产视频一区在线播放| 欧美视频一区二区三区四区| 看电视剧不卡顿的网站| 亚洲摸摸操操av| 日韩欧美你懂的| 91视频观看视频| 美女一区二区久久| 亚洲日本一区二区| 欧美xxxxx牲另类人与| 99re视频这里只有精品| 捆绑调教美女网站视频一区| 国产精品成人免费在线| 日韩亚洲欧美成人一区| 91亚洲精品久久久蜜桃| 国产在线不卡一区| 性久久久久久久久久久久| 国产欧美一区二区精品性色超碰| 欧美视频一区二区在线观看| 国产99久久久国产精品潘金网站| 亚洲一区二区三区四区在线| 国产三级精品在线| 日韩精品影音先锋| 欧美日韩国产精选| 色综合夜色一区| 国产成a人亚洲| 精品一区二区三区的国产在线播放| 专区另类欧美日韩| 国产情人综合久久777777| 欧美精品视频www在线观看| 一道本成人在线| www.一区二区| 粉嫩绯色av一区二区在线观看| 另类中文字幕网| 日韩电影在线观看电影| 亚洲国产精品一区二区久久恐怖片| 国产精品沙发午睡系列990531| 日韩一区二区视频在线观看| 欧美性做爰猛烈叫床潮| 色综合久久久久久久久久久| 成人av片在线观看| 国产乱对白刺激视频不卡| 久久精品久久99精品久久| 亚洲电影视频在线| 性做久久久久久免费观看欧美| 亚洲一区二区三区视频在线| 亚洲人午夜精品天堂一二香蕉| 日本一区二区成人| 中文字幕一区二区三区四区 | 日韩精品一区二区三区视频在线观看| 欧美色图一区二区三区| 在线观看视频一区二区 | 性做久久久久久久久| 舔着乳尖日韩一区| 青青草国产成人av片免费| 日韩国产高清影视| 麻豆中文一区二区| 精品中文字幕一区二区小辣椒| 韩国午夜理伦三级不卡影院| 激情综合网最新| 国产成人小视频| www.欧美色图| 欧美性色综合网| 91麻豆精品国产无毒不卡在线观看 | 国产欧美日韩在线看| 国产精品乱码久久久久久| 中文字幕五月欧美| 一区二区三区在线不卡| 日韩二区三区四区| 国产一区在线精品| 99久久精品国产毛片| 91福利在线观看| 日韩欧美亚洲国产精品字幕久久久| 精品久久人人做人人爱| 国产精品午夜久久| 亚洲韩国一区二区三区| 日韩成人dvd| 北岛玲一区二区三区四区| 欧美色图在线观看| 久久亚洲精品小早川怜子| 综合久久综合久久| 日韩电影在线免费| 99精品视频在线播放观看| 欧美性大战久久| 精品国产一区二区三区av性色| 国产精品夫妻自拍| 午夜精品视频一区| 国产成人久久精品77777最新版本 国产成人鲁色资源国产91色综 | av亚洲产国偷v产偷v自拍| 欧美性生活大片视频| 久久人人超碰精品| 亚洲最大色网站| 国产精品小仙女| 欧美三级乱人伦电影| 国产午夜三级一区二区三| 一区二区在线看| 国产一区中文字幕| 欧美日韩一区二区在线观看 | 精品国产伦一区二区三区免费| 中文字幕一区av| 九九九久久久精品| 欧美日韩一区二区电影| 久久久久久亚洲综合| 亚洲一区二区视频在线观看| 国产传媒久久文化传媒| 欧美一区二区播放| 一区二区三区.www| 成人久久18免费网站麻豆| 日韩写真欧美这视频| 亚洲大片精品永久免费| av亚洲精华国产精华精华 | 亚洲国产综合91精品麻豆| 国产不卡视频一区| 精品久久久久久久久久久久久久久| 亚洲一区二区三区激情| av爱爱亚洲一区| 国产情人综合久久777777| 蜜桃91丨九色丨蝌蚪91桃色| 欧美性视频一区二区三区| 亚洲欧洲综合另类在线| k8久久久一区二区三区| 久久久久九九视频| 精品一区免费av| 日韩一区二区三| 日韩黄色免费网站| 欧美精品日韩一区| 亚洲成人中文在线| 欧美日韩免费视频| 亚洲综合成人网| 欧美视频在线播放| 午夜欧美在线一二页| 欧美福利电影网| 日日摸夜夜添夜夜添精品视频| 欧美日韩国产一二三| 石原莉奈一区二区三区在线观看| 欧美日韩一区二区三区四区|