亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? draft-ietf-pkix-usergroup-01.txt

?? PKIX的RFC英文文檔
?? TXT
?? 第 1 頁 / 共 2 頁
字號:
Network Working Group                                         M. StJohnsInternet-Draft                                   Network Associates LabsExpires: March 26, 2003                               September 25, 2002                The PKIX UserGroupName GeneralName Type                      draft-ietf-pkix-usergroup-01Status of this Memo   This document is an Internet-Draft and is in full conformance with   all provisions of Section 10 of RFC2026.   Internet-Drafts are working documents of the Internet Engineering   Task Force (IETF), its areas, and its working groups.  Note that   other groups may also distribute working documents as Internet-   Drafts.   Internet-Drafts are draft documents valid for a maximum of six months   and may be updated, replaced, or obsoleted by other documents at any   time.  It is inappropriate to use Internet-Drafts as reference   material or to cite them other than as "work in progress."   The list of current Internet-Drafts can be accessed at http://   www.ietf.org/ietf/1id-abstracts.txt.   The list of Internet-Draft Shadow Directories can be accessed at   http://www.ietf.org/shadow.html.   This Internet-Draft will expire on March 26, 2003.Copyright Notice   Copyright (C) The Internet Society (2002).  All Rights Reserved.Abstract   A number of systems which understand X.509 client certificates have   developed various ad hoc mechanisms to map a certificate to a   'userid'/'group(s)' value which can then be used for access control.   The mechanisms include idiosyncratic name forms for the SubjectName   field such as encoding the userid as a CommonName and the group as an   OrganizationalUnit, or mapping the certificate against an entry in a   directory system.  This document describes an otherName extension of   the GeneralName type which can be used in the SubjectAltName   extension or IssuerAltName extension to directly encode userid and   group information.ConformanceStJohns                  Expires March 26, 2003                 [Page 1]Internet-Draft             PKIX UserGroupName             September 2002   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this   document are to be interpreted as described in RFC 2119 [RFC2119].Table of Contents   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3   2.  Definition . . . . . . . . . . . . . . . . . . . . . . . . . .  3   3.  Usage  . . . . . . . . . . . . . . . . . . . . . . . . . . . .  4   3.1 Use Within a Leaf (End User) Certificate . . . . . . . . . . .  4   3.2 Use Within an Intermediate (CA) Certificate  . . . . . . . . .  5   4.  Path Validation Considerations . . . . . . . . . . . . . . . .  5   4.1 Trust Mappings . . . . . . . . . . . . . . . . . . . . . . . .  5   4.2 Domain Matching  . . . . . . . . . . . . . . . . . . . . . . .  6   4.3 Multiple UserGroupNames  . . . . . . . . . . . . . . . . . . .  7   5.  Scenarios  . . . . . . . . . . . . . . . . . . . . . . . . . .  7   5.1 Web Server with Client Certificates  . . . . . . . . . . . . .  8   6.  Security Considerations  . . . . . . . . . . . . . . . . . . .  9   7.  Design Discussion  . . . . . . . . . . . . . . . . . . . . . .  9   7.1 Attribute Certificate  . . . . . . . . . . . . . . . . . . . . 10   7.2 Certificate Extension  . . . . . . . . . . . . . . . . . . . . 10   7.3 otherName GeneralName type . . . . . . . . . . . . . . . . . . 10       References . . . . . . . . . . . . . . . . . . . . . . . . . . 11       Author's Address . . . . . . . . . . . . . . . . . . . . . . . 11   A.  ASN.1 Definitions  . . . . . . . . . . . . . . . . . . . . . . 11   A.1 1988 Module  . . . . . . . . . . . . . . . . . . . . . . . . . 11   A.2 Notional ASN.1 Encoding  . . . . . . . . . . . . . . . . . . . 13       Full Copyright Statement . . . . . . . . . . . . . . . . . . . 14StJohns                  Expires March 26, 2003                 [Page 2]Internet-Draft             PKIX UserGroupName             September 20021. Introduction   This document defines a proposed extension of the acceptable   otherName instantiations of the GeneralName type within the Subject   and IssuerAltName extensions described in [RFC3280].  It is   applicable to the X.509 Public Key Infrastructure for the Internet   family of standards.  The definitions described herein extend and   depend on those described in RFC 3280 which, in turn, defines the   underlying certificate formats needed for a full implementation of   this otherName definition.   This document describes a method of encoding Unix-style userid and   group information directly within an X.509 certificate.  Currently, a   number of systems (e.g.  web servers which accept or depend upon SSL/   TLS [RFC2246] client certificate authentication) use ad hoc methods   for either mapping from or encoding names within the X.509   SubjectName RDN (Relative Distinguished Name).  For example, one   system uses a CommonName element within the SubjectName to represent   a userid and an OrganizationalUnit element to represent one or more   groups.  Another system stores a mapping from a particular   certificate to a set of userid and group information within an LDAP   database.  Neither of the above approaches are standardized, nor are   they substantially interoperable across many systems.   The approach described in this document does not necessarily enable   any additional functionality over that available in existing systems.   However, it does standardize and specify a single common encoding for   userid and group names and this appears to be a useful goal.  Code   and products which work across a broad spectrum of applications can   be designed once a standard semantic and syntactic definition exists.2. Definition   This name is defined as a form of otherName from the GeneralName   structure in SubjectAltName.  The basic definition of the   UserGroupName type is:   id-on-userGroup   AttributeType ::= { id-on 2 }   UserGroupName ::=     SEQUENCE {              domain            UTF8String,              user              UTF8String,              groups            SEQUENCE OF UTF8String OPTIONAL   }   The UserGroupName otherName consists of three fields:   o  The domain field indicates the domain under which the other fieldsStJohns                  Expires March 26, 2003                 [Page 3]Internet-Draft             PKIX UserGroupName             September 2002      are evaluated.  Although it is encoded as a UTF8String to permit      future expansion, by convention this SHOULD be specified as a      valid, '.' (dot) separated tokens, domain name system (DNS) style      domain name.  The domain is used to differentiate userids on      various systems and within various organizations.  For example,      'smith' on the host yoohoo.entera.com might be different than      'smith' on the host (or within the domain) bigbank.org.  See      Section 4 below for more information on the treatment of the      domain field.   o  The user field encodes the userid represented by this certificate      within the domain specified.  In general, this SHOULD be in the      subset of UTF8 common to the target domain.   o  The groups field is optional and encodes the groups the holder of      this certificate is permitted access to within the specified      domain.  As above, this SHOULD be in the subset of UTF8 common to      the target domain.3. Usage3.1 Use Within a Leaf (End User) Certificate   For an end user certificate (i.e.  a client certificate), the   UserGroupName element is encoded within a SubjectAltName extension   (SANE).  The SANE SHOULD be marked as critical, and MUST be marked as   critical if the SubjectName field is empty.   The UserGroupName represents an identity for the certificate.  In   general, there SHOULD NOT be any other non-UserGroupName names within   the SANE and the SubjectName field SHOULD be empty.  If a leaf   certificate with both a SubjectName and a UserGroupName OtherName   SANE is presented, the certificate SHOULD be considered invalid for   the purposes of determining a userid or group mapping.   NOTE: Multiple UserGroupName elements are permitted with the SANE of   a leaf certificate.  Each is valid as an identity if and only if the   acceptor can establish that the client certificate chains back to a   CA certificate with a trust relationship for the domain indicated in   that UserGroupName element.  For any given acceptor context where the   client certificate has multiple UserGroupNames, some of the   UserGroupNames may be valid and some may not.   The selection of which of a number of valid UserGroupName elements is   accepted by the server or other acceptor is an implementation   decision.  Possibilities include accepting the userid with the most   access, with the least access, prioritizing it based on an orderedStJohns                  Expires March 26, 2003                 [Page 4]Internet-Draft             PKIX UserGroupName             September 2002   list of domains or only accepting a specific single domain.3.2 Use Within an Intermediate (CA) Certificate   For a CA certificate, one or more UserGroupName otherNames MAY be   included within a SANE.  The SANE MUST be marked as critical in that   event.  The inclusion of the UserGroupName element acts to restrict   the set of groups which this CA (and its subsidiary CA's) may   certify.  The userid field MAY be non-empty, but is ignored for most   purposes.  If a UserGroupName element is present in the SANE of a CA   certificate, then the BasicConstraints extension MUST also be   included and the BasicConstraints.cA flag MUST be set to true.   As per normal usage, the contents of the issuer's SANE are generally   copied to the IssuerAltName extension of an issued certificate as   part of the certificate signature process.  However, only the   UserGroupName SANEs are consulted during UserGroupName path   validation.   N.B.: A certificate where the BasicConstraints.cA flag is set to true   MUST NOT be accepted as a client or leaf certificate for the purposes   of UserGroupName processing.4. Path Validation Considerations4.1 Trust Mappings   Each system (server, application) which accepts certificates with a   UserGroupName element within the certificate's SANE must establish   one or more trust mappings between the specified domain tags and root   or intermediate CA certificates.  During path validation, the   accepting system MUST verify that the offered certificate chains back   to a root or intermediate CA that has a trust mapping which contains   the certificate's SubjectAltName UserGroup domain.   The specific mechanism for establishing or describing the trust   mapping is outside of the scope of this document.  However, it could   be something as simple as a text file with the first column listing   the domain and the second column listing a certificate fingerprint.            labs.nai.com  \               1B:D1:AD:17:8B:7F:22:13:24:F5:26:E2:5D:4E:B9:10            tislabs.com  \               63:1B:66:93:8C:F3:66:CB:3C:79:57:DC:05:49:EA:DB   Another possibility might be to identify the trusted certificate by   subjectName and the subjectKeyIdentifier.  This latter approach may   be more useful as it allows expired roots to be easily superceded.StJohns                  Expires March 26, 2003                 [Page 5]Internet-Draft             PKIX UserGroupName             September 2002   In addition to establishing a mapping between a trust root and a   domain, each implementing acceptor must decide whether to accept all,   some or none of the validated group information as authoritative.   Again, the specific mechanism for describing this is outside the   scope of the document, but SHOULD include a global on/off switch for   group processing which defaults to off (i.e.  group information is   not provided to the acceptor); an on/off switch for group processing   for each trust anchor which defaults to off; and the ability to limit   the groups accepted by each trust anchor to a specific maximum set or   to prohibit a set of groups.  See Section 6 below for discussion of   the appropriate use of group information.     :groups=true     labs.nai.com 1B:..:10 [ANY:^system:^wheel]     tislabs.com  63:..:DB []4.2 Domain Matching   As mentioned above, the domain field SHOULD be a DNS structured, dot   separated string (see 2.3.1 in [RFC1035]).  To be valid a client   certificate MUST chain back to a trusted certificate where the domain   specified by the trust mapping is either equal to the domain of the   client certificate or contains the domain of the client certificate.   The specific matching algorithm is:   if trustDomain(CA) == userGroupName.domain      then match   else if  tail (userGroupName.domain, length(trustDomain(CA))+1) ==            concat (".", trustDomain)      then match   else no match   trustDomain(CA) looks up the domain for the root      certificate's trust mapping   tail (string, len) returns the last len characters of a string   concat (string,string) returns a concatenation of two strings   The addition of the '.' (dot) to the trust domain in the algorithm   ensures that an invalid match like "mystupiddomain.com" matching   "stupiddomain.com" doesn't happen.  Also, as is normal for DNS style   names, matching is done without respect to case.  Note that there may   be multiple trust mappings for a single root and that all MUST be   tried for the match.   Obviously, using the above matching algorithm,  if the   userGroupName.domain does not contain a '.', the only match possible   is an exact match.StJohns                  Expires March 26, 2003                 [Page 6]Internet-Draft             PKIX UserGroupName             September 2002   Note: The matching algorithm will need to be readdressed when and if   a standard for internationalized domain names is completed and   approved.  The specific phrase "without respect to case" may be   meaningless or may not have a simple canonical resolution in some   character sets or under some languages.4.3 Multiple UserGroupNames   CA certificates may contain a SANE with one or more UserGroupNames   with a non-null domain and a empty or non-empty set of groups.  If a   CA certificate does have a such a SANE, it acts to restrict the set   of groups that can be 'certified' by that CA certificate.  The final   set of groups output from the path validation processing of the   UserGroupName elements is the MIN of the sets of all the group   elements from each UserGroupName (and, if specified, from the group   list for root trust mapping).  The algorithm is:   for each UserGroupName (UGN) in the client certificate SANE     set maxGroups to client's UGN.groups     for each UGN in the CA certificate in the path        if the CA's UGN.domain contains or equals the clients UGN.domain            then set maxGroups to MIN (maxGroups, CAs UGN.groups,                                           [trustRoot(CA).groups])     output {domain, maxGroups and userid}   For example, the client has a certificate issued by his host with a   UserGroupName containing a  user of 'stjohns', a group field of   ['system', 'security', 'atg'], and a domain field of 'labs.nai.com'.   It validly chains back to a root CA certificate that has a trust   relationship for 'nai.com'.  The CA which signed the client   certificate has a SANE with one UserGroupName containing a domain of   'nai.com' and groups of ['system', 'atg', 'admin'] and another   UserGroupName containing a domain of 'labs.nai.com' with groups of   ['atg'].  The certificate would be valid for the domain   'labs.nai.com', the user 'stjohns' and the groups ['atg'].5. Scenarios   Userids are used as a compact representation of identity on computer   systems.  It's generally much easier to remember "stjohns" than   UID:23645 or a certificate finger print.  It's also easier to use the   userid (vice the other identity forms) as a handle for creating,   deleting, or evaluating an access control entry.  The UserGroupName   provides a straightforward way to map a certificate into a userid.   The following section suggests some possible applications for the   UserGroupName approach to certificate/userid mapping.StJohns                  Expires March 26, 2003                 [Page 7]Internet-Draft             PKIX UserGroupName             September 2002

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
亚洲欧美另类综合偷拍| 91黄色激情网站| 日韩免费观看高清完整版| 午夜精品久久久久久久99樱桃| 97se狠狠狠综合亚洲狠狠| 国产精品视频yy9299一区| www.成人网.com| 亚洲精品免费播放| 欧美亚洲动漫精品| 日韩成人免费电影| 精品99一区二区| 成人免费视频视频在线观看免费| 亚洲国产精品国自产拍av| 94-欧美-setu| 日韩精品成人一区二区在线| 精品国产91久久久久久久妲己 | 成人午夜av电影| 国产视频在线观看一区二区三区| av在线免费不卡| 亚洲一区二区三区激情| 欧美一区二区三区日韩视频| 激情综合色播五月| 最新中文字幕一区二区三区| 精品视频全国免费看| 久久精品国产精品亚洲精品| 国产日产欧美精品一区二区三区| 91美女在线观看| 日韩综合小视频| 久久九九影视网| 欧美午夜电影网| 激情五月激情综合网| 国产精品短视频| 欧美老肥妇做.爰bbww视频| 精品无人码麻豆乱码1区2区| 亚洲欧洲综合另类在线| 日韩欧美区一区二| 色8久久人人97超碰香蕉987| 久久99精品久久久久婷婷| 自拍偷拍欧美精品| 欧美mv日韩mv国产网站| 99国产精品久久久| 九色综合国产一区二区三区| 亚洲精品成人少妇| 2014亚洲片线观看视频免费| 日韩欧美一级特黄在线播放| 91丨九色丨尤物| 久久精品国产一区二区三| 亚洲柠檬福利资源导航| 久久综合久久鬼色| 欧美亚洲动漫精品| av成人老司机| 国内久久精品视频| 日韩电影免费在线观看网站| 亚洲天堂福利av| 久久欧美中文字幕| 欧美日韩免费在线视频| av电影天堂一区二区在线| 国产一区二区不卡| 日韩电影网1区2区| 亚洲电影一级黄| 国产农村妇女毛片精品久久麻豆| 91精品国产91久久久久久一区二区| 不卡视频一二三| 国产一区二区日韩精品| 日韩专区一卡二卡| 一区二区欧美视频| 中文字幕一区二区三区在线播放 | 丝袜亚洲另类欧美| 亚洲免费在线电影| 中文字幕乱码一区二区免费| 精品国产一区二区国模嫣然| 在线综合亚洲欧美在线视频| 欧美体内she精视频| 91国产福利在线| 91免费视频大全| 成人av在线网站| 成人免费视频视频在线观看免费| 国产一区二区91| 国产一区 二区 三区一级| 久久精品国产精品亚洲综合| 久久精品国产亚洲aⅴ| 奇米在线7777在线精品| 蜜桃视频一区二区三区| 强制捆绑调教一区二区| 久久国产生活片100| 人人狠狠综合久久亚洲| 蜜臀av国产精品久久久久| 日本成人在线看| 麻豆91在线观看| 久久99精品久久久久久国产越南| 日本aⅴ免费视频一区二区三区| 首页国产丝袜综合| 日韩av中文在线观看| 婷婷综合另类小说色区| 另类小说一区二区三区| 极品美女销魂一区二区三区| 久久99国产精品久久| 国产一区二区三区免费在线观看 | 精品电影一区二区| 26uuu欧美| 国产欧美日韩在线看| 中文字幕日韩精品一区| 亚洲一卡二卡三卡四卡五卡| 亚洲国产乱码最新视频| 人人超碰91尤物精品国产| 麻豆精品国产传媒mv男同| 国产又黄又大久久| 成人黄色电影在线| 在线视频欧美区| 欧美一区二区三区系列电影| 精品国产一区二区亚洲人成毛片| 国产欧美精品一区二区色综合朱莉 | 国产喂奶挤奶一区二区三区| 中文字幕一区二区三| 一区二区三区欧美在线观看| 日韩精品电影在线观看| 国产寡妇亲子伦一区二区| 成人激情综合网站| 欧美在线小视频| 精品国产三级a在线观看| 国产精品第13页| 香蕉久久夜色精品国产使用方法| 久久国产剧场电影| 99视频有精品| 欧美日韩亚洲综合一区二区三区| 精品日韩一区二区| 亚洲人成人一区二区在线观看| 日韩和欧美一区二区| 国产91精品一区二区麻豆网站| 在线欧美小视频| 精品粉嫩超白一线天av| 亚洲免费视频中文字幕| 麻豆国产精品一区二区三区| 99久久精品99国产精品| 欧美理论片在线| 中文字幕日本乱码精品影院| 日本欧美在线观看| 色系网站成人免费| 337p粉嫩大胆噜噜噜噜噜91av| 亚洲欧美激情插| 国产精品99久久久久久有的能看| 色拍拍在线精品视频8848| 欧美电影免费观看完整版| 亚洲精品免费在线| 国产成人av资源| 欧美一二三区在线| 一区二区三区在线播放| 国产v日产∨综合v精品视频| 欧美精品久久99久久在免费线 | 一区二区免费在线| 成人美女在线观看| 日韩欧美专区在线| 亚洲成a人v欧美综合天堂| 成人h动漫精品一区二| xnxx国产精品| 麻豆国产欧美日韩综合精品二区| 欧美三片在线视频观看| 成人欧美一区二区三区1314| 精品一区二区成人精品| 制服.丝袜.亚洲.中文.综合| 亚洲美女视频一区| a亚洲天堂av| 久久久91精品国产一区二区精品| 日韩精品五月天| 欧美日韩国产大片| 亚洲综合在线免费观看| a4yy欧美一区二区三区| 国产精品亲子伦对白| 国产老妇另类xxxxx| 精品伦理精品一区| 美女www一区二区| 欧美一二三区在线| 美脚の诱脚舐め脚责91| 制服丝袜亚洲播放| 美日韩一区二区| 欧美一级日韩不卡播放免费| 日日摸夜夜添夜夜添精品视频| 欧美色窝79yyyycom| 一区二区三区四区五区视频在线观看 | 久久婷婷国产综合精品青草| 老司机午夜精品| 日韩视频123| 精品一区二区三区在线视频| 欧美大片一区二区三区| 精品亚洲porn| 久久先锋影音av鲁色资源网| 国产91精品久久久久久久网曝门| 国产亚洲人成网站| 成人午夜精品一区二区三区| 亚洲日本丝袜连裤袜办公室| 91在线精品一区二区| 一区二区欧美精品| 欧美一区二区三区视频免费| 紧缚捆绑精品一区二区| 国产欧美一区二区精品婷婷 | 国产精品美日韩| 色综合久久中文字幕综合网| 亚洲一区在线视频| 欧美一级专区免费大片| 国产一区二区久久|