Information technology — Open systems interconnection — Part 8: The Directory: Public-key and attribute certificate frameworks

This document addresses some of the security requirements in the areas of authentication and other security services through the provision of a set of frameworks upon which full services can be based. Specifically, this Recommendation | International Standard defines frameworks for: ? public-key certificates; and ? attribute certificates. The public-key certificate framework defined in this Recommendation | International Standard specifies the information objects and data types for a public-key infrastructure (PKI), including public-key certificates, certificate revocation lists (CRLs), trust broker and authorization and validation lists (AVLs). The attribute certificate framework specifies the information objects and data types for a privilege management infrastructure (PMI), including attribute certificates, and attribute certificate revocation lists (ACRLs). This Recommendation | International Standard also provides the framework for issuing, managing, using and revoking certificates. An extensibility mechanism is included in the defined formats for both certificate types and for all revocation list schemes. This Recommendation | International Standard also includes a set of extensions, which is expected to be generally useful across a number of applications of PKI and PMI. The schema components (including object classes, attribute types and matching rules) for storing PKI and PMI information in a directory, are included in this Recommendation | International Standard. This Recommendation | International Standard specifies the framework for strong authentication, involving credentials formed using cryptographic techniques. It is not intended to establish this as a general framework for authentication, but it can be of general use for applications which consider these techniques adequate. Authentication (and other security services) can only be provided within the context of a defined security policy. It is a matter for users of an application to define their own security policy.

Technologies de l'information — Interconnexion de systèmes ouverts (OSI) — Partie 8: Titre manque

General Information

Status
Published
Publication Date
30-Nov-2020
Current Stage
6060 - International Standard published
Start Date
01-Dec-2020
Due Date
19-Dec-2022
Completion Date
30-Nov-2020
Ref Project

Relations

Standard
ISO/IEC 9594-8:Version 24-okt-2020 - Information technology -- Open systems interconnection
English language
224 pages
sale 15% off
Preview
sale 15% off
Preview
Standard
ISO/IEC 9594-8:2020 - Information technology -- Open systems interconnection
English language
224 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


INTERNATIONAL ISO/IEC
STANDARD 9594-8
Ninth edition
Information technology — Open
systems interconnection —
Part 8:
The Directory: Public-key and
attribute certificate frameworks
PROOF/ÉPREUVE
Reference number
©
ISO/IEC 2020
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii PROOF/ÉPREUVE © ISO/IEC 2020 – All rights reserved

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of document should be noted (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details
of any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC list of patent
declarations received (see http://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the World
Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT),
see www.iso.org/iso/foreword.html.
This document was prepared by ITU-T as ITU-T X.509 (10/2019) and drafted in accordance with its
editorial rules. It was adopted by Joint Technical Committee ISO/IEC JTC 1, Information technology,
Subcommittee SC 6, Telecommunications and information exchange between systems.
A list of all parts in the ISO/IEC 9594 series can be found on the ISO website.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www.iso.org/members.html.

© ISO/IEC 2020 – All rights reserved iii

CONTENTS
Page
SECTION 1 – General . 1
1 Scope . 1
2 Normative references. 1
2.1 Identical Recommendations | International Standards . 1
2.2 Paired Recommendations | International Standards equivalent in technical content . 2
2.3 Recommendations . 2
2.4 Other references . 2
3 Definitions . 3
3.1 OSI Reference Model security architecture definitions. 3
3.2 Baseline identity management terms and definitions . 3
3.3 Directory model definitions . 3
3.4 Access control framework definitions . 3
3.5 Public-key and attribute certificate definitions . 3
4 Abbreviations . 7
5 Conventions . 8
6 Frameworks overview . 8
6.1 Digital signatures . 9
6.2 Public-key cryptography and cryptographic algorithms. 10
6.3 Distinguished encoding of basic encoding rules . 12
6.4 Applying distinguished encoding . 12
6.5 Using repositories . 13
SECTION 2 – PUBLIC-KEY CERTIFICATE FRAMEWORK . 14
7 Public keys and public-key certificates . 14
7.1 Introduction . 14
7.2 Public-key certificate. 14
7.3 Public-key certificate extensions . 17
7.4 Types of public-key certificates . 18
7.5 Trust anchor . 18
7.6 Entity relationship . 19
7.7 Certification path . 19
7.8 Generation of key pairs . 21
7.9 Public-key certificate creation . 21
7.10 Certificate revocation list . 22
7.11 Uniqueness of names . 25
7.12 Indirect CRLs . 25
7.13 Repudiation of a digital signing . 26
8 Trust models . 27
8.1 Three-cornered trust model . 27
8.2 Four cornered trust model . 27
9 Public-key certificate and CRL extensions . 28
9.1 Policy handling . 29
9.2 Key and policy information extensions . 31
9.3 Subject and issuer information extensions . 38
9.4 Certification path constraint extensions . 41
9.5 Basic CRL extensions . 45
9.6 CRL distribution points and delta CRL extensions . 52
9.7 Authorization and validation list extensions . 57
9.8 Alternative cryptographic algorithms and digital signature extensions . 58
10 Delta CRL relationship to base . 59
11 Authorization and validation lists . 60
11.1 Authorization and validation list concept . 60
© ISO/IEC 2020 – All rights reserved
Rec. ITU-T X.509 (10/2019) v
Page
11.2 The authorizer . 60
11.3 Authorization and validation list syntax . 61
11.4 Multiple cryptographic algorithms for authorization and validation list . 62
12 Certification path processing procedure . 63
12.1 Path processing inputs . 63
12.2 Path processing outputs . 63
12.3 Path processing variables . 64
12.4 Initialization step . 64
12.5 Public-key certificate processing . 65
13 PKI directory schema . 67
13.1 PKI directory object classes and name forms . 67
13.2 PKI directory attributes . 68
13.3 PKI directory matching rules . 72
13.4 PKI directory syntax definitions. 77
SECTION 3 – ATTRIBUTE CERTIFICATE FRAMEWORK . 80
14 Attribute certificates . 80
14.1 General . 80
14.2 Attribute certificate syntax . 81
14.3 Multiple cryptographic algorithms for attribute certificates . 83
14.4 Delegation paths . 83
14.5 Attribute certificate revocation lists . 84
15 Attribute authority, source of authority and certification authority relationship . 86
15.1 Privilege in attribute certificates . 87
15.2 Privilege in public-key certificates .
...


INTERNATIONAL ISO/IEC
STANDARD 9594-8
Ninth edition
2020-11
Information technology — Open
systems interconnection —
Part 8:
The Directory: Public-key and
attribute certificate frameworks
Reference number
©
ISO/IEC 2020
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2020 – All rights reserved

Foreword
ISO (the International Organization for Standardization) and IEC (the International Electrotechnical
Commission) form the specialized system for worldwide standardization. National bodies that are
members of ISO or IEC participate in the development of International Standards through technical
committees established by the respective organization to deal with particular fields of technical activity.
ISO and IEC technical committees collaborate in fields of mutual interest. Other international
organizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in the
work.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of document should be noted (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights. Details
of any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents) or the IEC list of patent
declarations received (see http://patents.iec.ch).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the World
Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT),
see www.iso.org/iso/foreword.html.
This document was prepared by ITU-T as ITU-T X.509 (10/2019) and drafted in accordance with
its editorial rules, in collaboration with Joint Technical Committee ISO/IEC JTC 1, Information
technology, Subcommittee SC 6, Telecommunications and information exchange between systems.
This ninth edition cancels and replaces the eighth edition (ISO/IEC 9594-8:2017), which has been
technically revised.
A list of all parts in the ISO/IEC 9594 series can be found on the ISO website.
Any feedback or questions on this document should be directed to the user’s national standards body.
A complete listing of these bodies can be found at www.iso.org/members.html.
© ISO/IEC 2020 – All rights reserved iii

CONTENTS
Page
SECTION 1 – General . 1
1 Scope . 1
2 Normative references. 1
2.1 Identical Recommendations | International Standards . 1
2.2 Paired Recommendations | International Standards equivalent in technical content . 2
2.3 Recommendations . 2
2.4 Other references . 2
3 Definitions . 3
3.1 OSI Reference Model security architecture definitions. 3
3.2 Baseline identity management terms and definitions . 3
3.3 Directory model definitions . 3
3.4 Access control framework definitions . 3
3.5 Public-key and attribute certificate definitions . 3
4 Abbreviations . 7
5 Conventions . 8
6 Frameworks overview . 8
6.1 Digital signatures . 9
6.2 Public-key cryptography and cryptographic algorithms. 10
6.3 Distinguished encoding of basic encoding rules . 12
6.4 Applying distinguished encoding . 12
6.5 Using repositories . 13
SECTION 2 – PUBLIC-KEY CERTIFICATE FRAMEWORK . 14
7 Public keys and public-key certificates . 14
7.1 Introduction . 14
7.2 Public-key certificate. 14
7.3 Public-key certificate extensions . 17
7.4 Types of public-key certificates . 18
7.5 Trust anchor . 18
7.6 Entity relationship . 19
7.7 Certification path . 19
7.8 Generation of key pairs . 21
7.9 Public-key certificate creation . 21
7.10 Certificate revocation list . 22
7.11 Uniqueness of names . 25
7.12 Indirect CRLs . 25
7.13 Repudiation of a digital signing . 26
8 Trust models . 27
8.1 Three-cornered trust model . 27
8.2 Four cornered trust model . 27
9 Public-key certificate and CRL extensions . 28
9.1 Policy handling . 29
9.2 Key and policy information extensions . 31
9.3 Subject and issuer information extensions . 38
9.4 Certification path constraint extensions . 41
9.5 Basic CRL extensions . 45
9.6 CRL distribution points and delta CRL extensions . 52
9.7 Authorization and validation list extensions . 57
9.8 Alternative cryptographic algorithms and digital signature extensions . 58
10 Delta CRL relationship to base . 59
11 Authorization and validation lists . 60
11.1 Authorization and validation list concept . 60
© ISO/IEC 2020 – All rights reserved
Rec. ITU-T X.509 (10/2019) v
Page
11.2 The authorizer . 60
11.3 Authorization and validation list syntax . 61
11.4 Multiple cryptographic algorithms for authorization and validation list . 62
12 Certification path processing procedure . 63
12.1 Path processing inputs . 63
12.2 Path processing outputs . 63
12.3 Path processing variables . 64
12.4 Initialization step . 64
12.5 Public-key certificate processing . 65
13 PKI directory schema . 67
13.1 PKI directory object classes and name forms . 67
13.2 PKI directory attributes . 68
13.3 PKI directory matching rules . 72
13.4 PKI directory syntax definitions. 77
SECTION 3 – ATTRIBUTE CERTIFICATE FRAMEWORK . 80
14 Attribute certificates . 80
14.1 General . 80
14.2 Attribute certificate syntax . 81
14.3 Multiple cryptographic algorithms for attribute certificates . 83
14.4 Delegation paths . 83
14.5 Attribute certificate revocation lists . 84
15 Attribute authority, source of authority and certification authority relationship . 86
15.1 Privilege in attribute certificates .
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.