2008
DOI: 10.17487/rfc5280
|View full text |Cite
|
Sign up to set email alerts
|

Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile

Abstract: This memo profiles the X.509 v3 certificate and X.509 v2 certificate revocation list (CRL) for use in the Internet. An overview of this approach and model is provided as an introduction. The X.509 v3 certificate format is described in detail, with additional information regarding the format and semantics of Internet name forms. Standard certificate extensions are described and two Internet-specific extensions are defined. A set of required certificate extensions is specified. The X.509 v2 CRL format is describ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
931
0
18

Year Published

2009
2009
2019
2019

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 867 publications
(984 citation statements)
references
References 15 publications
0
931
0
18
Order By: Relevance
“…When it is present, it provides the controls needed to initialize an X.509 certification path validation algorithm implementation (see Section 6 of [RFC5280]). When absent, the trust anchor cannot be used to validate the signature on an X.509 certificate.…”
Section: Trust Anchor Information Syntaxmentioning
confidence: 99%
See 4 more Smart Citations
“…When it is present, it provides the controls needed to initialize an X.509 certification path validation algorithm implementation (see Section 6 of [RFC5280]). When absent, the trust anchor cannot be used to validate the signature on an X.509 certificate.…”
Section: Trust Anchor Information Syntaxmentioning
confidence: 99%
“…If the certificate is present, the subject name in the certificate MUST exactly match the X.500 distinguished name provided in the taName field, the public key MUST exactly match the public key in the pubKey field, and the subjectKeyIdentifier extension, if present, MUST exactly match the key identifier in the keyId field. The complete description of the syntax and semantics of the Certificate are provided in [RFC5280] inhibitPolicyMapping indicates if policy mapping is allowed in the certification path. When set to TRUE, policy mapping is not permitted.…”
Section: Trust Anchor Information Syntaxmentioning
confidence: 99%
See 3 more Smart Citations