Freshest CRL Extension Default
431
• No Constraints; see
Section B.2.6, “No Constraint”
.
This default defines five locations with parameters for each location. The parameters are marked with
an
n
in the table to show with which location the parameter is associated.
Parameter
Description
Critical
Select
true
to mark this extension critical; select
false
to mark the extension noncritical.
PointEnable_
n
Select
true
to enable this point; select
false
to
disable this point.
PointType_
n
Specifies the type of issuing point, either
DirectoryName
or
URIName
.
PointName_
n
• If
pointType
is set to
directoryName
, the
value must be an X.500 name, similar to the
subject name in a certificate. For example,
cn=CACentral,ou=Research Dept,o=Example
Corporation,c=US
.
• If
pointType
is set to
URIName
, the name
must be a URI, an absolute pathname that
specifies the host. For example,
http://
testCA.example.com/get/crls/here/
.
PointIssuerName_
n
Specifies the name of the issuer that has
signed the CRL. The name can be in any of the
following formats:
• For
RFC822Name
, the value must be a
valid Internet mail address. For example,
testCA@example.com
.
• For
DirectoryName
, the value must be
a string form of X.500 name, similar to the
subject name in a certificate. For example,
cn=SubCA, ou=Research Dept, o=Example
Corporation, c=US
.
• For
DNSName
, the value must be a valid
fully-qualified domain name. For example,
testCA.example.com
.
• For
EDIPartyName
, the value must be an
IA5String. For example,
Example Corporation
.
• For
URIName
, the value must be a non-relative
URI following the URL syntax and encoding
rules. The name must include both a scheme,
such as
http
, and a fully qualified domain
name or IP address of the host. For example,
http://testCA.example.com
. Certificate System
supports both IPv4 and IPv6 addresses.
Summary of Contents for CERTIFICATE SYSTEM 8.0 - ADMINISTRATION
Page 42: ...20 ...
Page 43: ...Part I Setting up Certificate Services ...
Page 44: ......
Page 190: ...168 ...
Page 208: ...186 ...
Page 223: ...Part II Additional Configuration to Manage CA Services ...
Page 224: ......
Page 256: ...234 ...
Page 270: ...248 ...
Page 280: ...258 ...
Page 292: ...270 ...
Page 293: ...Part III Managing the Subsystem Instances ...
Page 294: ......
Page 408: ...386 ...
Page 438: ...416 ...
Page 439: ...Part IV References ...
Page 440: ......
Page 503: ...Netscape Defined Certificate Extensions Reference 481 OID 2 16 840 1 113730 13 ...
Page 504: ...482 ...
Page 556: ...534 ...
Page 564: ...542 ...