Network
Working Group S. Boeyen
Request
for Comments: 2587 Entrust
Category:
Standards Track T. Howes
Netscape
P. Richard
Xcert
June 1999
Internet X.509 Public Key Infrastructure
LDAPv2 Schema
Status
of this Memo
This document specifies an Internet
standards track protocol for the
Internet community, and requests discussion
and suggestions for
improvements. Please refer to
the current edition of the "Internet
Official Protocol Standards" (STD 1)
for the standardization state
and status of this protocol. Distribution of this memo is unlimited.
Copyright
Notice
Copyright (C) The Internet Society
(1999). All Rights Reserved.
1. Abstract
The schema defined in this document is a
minimal schema to support
PKIX in an LDAPv2 environment, as defined
in RFC 2559. Only PKIX-
specific components are specified
here. LDAP servers, acting as PKIX
repositories should support the auxiliary
object classes defined in
this specification and integrate this
schema specification with the
generic and other application-specific
schemas as appropriate,
depending on the services to be supplied by
that server.
The key words 'MUST', 'SHALL', 'REQUIRED',
'SHOULD', 'RECOMMENDED',
and 'MAY' in this document are to be
interpreted as described in RFC
2119.
2. Introduction
This specification is part of a multi-part
standard for development
of a Public Key Infrastructure (PKI) for
the Internet. LDAPv2 is one
mechanism defined for access to a PKI
repository. Other mechanisms,
such as http, are also defined. If an LDAP
server, accessed by LDAPv2
is used to provide a repository, the
minimum requirement is that the
repository support the addition of X.509
certificates to directory
Boeyen,
et al. Standards Track [Page 1]
RFC
2587 PKIX LDAPv2 Schema June 1999
entries.
Certificate Revocation List (CRL)is one mechanism for
publishing revocation information in a
repository. Other mechanisms,
such as http, are also defined.
This specification defines the attributes
and object classes to be
used by LDAP servers acting as PKIX
repositories and to be understood
by LDAP clients communicating with such
repositories to query, add,
modify and delete PKI information. Some
object classes and attributes
defined in X.509 are duplicated here for
completeness. For end
entities and Certification Authorities
(CA), the earlier X.509
defined object classes mandated inclusion
of attributes which are
optional for PKIX. Also, because of the
mandatory attribute
specification, this would have required
dynamic modification of the
object class attribute should the
attributes not always be present in
entries. For these reasons, alternative
object classes are defined in
this document for use by LDAP servers
acting as PKIX repositories.
3. PKIX Repository Objects
The primary PKIX objects to be represented
in a repository are:
-
End Entities
-
Certification Authorities (CA)
These objects are defined in RFC 2459.
3.1. End Entities
For purposes of PKIX schema definition, the
role of end entities as
subjects of certificates is the major
aspect relevant to this
specification. End entities may be human
users, or other types of
entities to which certificates may be
issued. In some cases, the
entry for the end entity may already exist
and the PKI-specific
information is added to the existing entry.
In other cases the entry
may not exist prior to the issuance of a
certificate, in which case
the entity adding the certificate may also
need to create the entry.
Schema elements used to represent the non
PKIX aspects of an entry,
such as the structural object class used to
represent organizational
persons, may vary, depending on the
particular environment and set of
applications served and are outside the
scope of this specification.
The following auxiliary object class MAY be
used to represent
certificate subjects:
Boeyen,
et al. Standards Track [Page 2]
RFC
2587 PKIX LDAPv2
Schema June 1999
pkiUser OBJECT-CLASS ::= {
SUBCLASS OF { top}
KIND auxiliary
MAY CONTAIN {userCertificate}
ID
joint-iso-ccitt(2) ds(5) objectClass(6) pkiUser(21)}
userCertificate ATTRIBUTE
::= {
WITH SYNTAX Certificate
EQUALITY MATCHING RULE certificateExactMatch
ID
joint-iso-ccitt(2) ds(5) attributeType(4) userCertificate(36) }
An end entity may obtain one or more
certificates from one or more
Certification Authorities. The userCertificate attribute MUST be
used to represent these certificates in the
directory entry
representing that user.
3.2. Certification Authorities
As with end entities, Certification
Authorities are typically
represented in directories as auxiliary
components of entries
representing a more generic object, such as
organizations,
organizational units etc. The non PKIX-specific
schema elements for
these entries, such as the structural
object class of the object, are
outside the scope of this specification.
The following auxiliary object class MAY be
used to represent
Certification Authorities:
pkiCA OBJECT-CLASS ::= {
SUBCLASS OF { top}
KIND auxiliary
MAY CONTAIN {cACertificate |
certificateRevocationList |
authorityRevocationList |
crossCertificatePair }
ID joint-iso-ccitt(2) ds(5) objectClass(6) pkiCA(22)}
cACertificate ATTRIBUTE
::= {
WITH SYNTAX Certificate
EQUALITY MATCHING RULE certificateExactMatch
ID
joint-iso-ccitt(2) ds(5) attributeType(4) cACertificate(37) }
crossCertificatePairATTRIBUTE::={
WITH SYNTAX CertificatePair
EQUALITY MATCHING RULE
certificatePairExactMatch
ID joint-iso-ccitt(2) ds(5) attributeType(4)
crossCertificatePair(40)}
Boeyen,
et al. Standards Track [Page 3]
RFC
2587 PKIX LDAPv2
Schema June 1999
The cACertificate attribute of a CA's
directory entry shall be used
to store self-issued certificates (if any)
and certificates issued to
this CA by CAs in the same realm as this
CA.
The forward elements of the
crossCertificatePair attribute of a CA's
directory entry shall be used to store all,
except self-issued
certificates issued to this CA. Optionally, the reverse elements of
the
crossCertificatePair attribute, of a CA's directory entry may
contain a subset of certificates issued by
this CA to other CAs.
When both the forward and the reverse
elements are present in a
single attribute value, issuer name in one
certificate shall match
the subject name in the other and vice
versa, and the subject public
key in one certificate shall be capable of
verifying the digital
signature on the other certificate and vice
versa.
When a reverse element is present, the
forward element value and the
reverse element value need not be stored in
the same attribute value;
in other words, they can be stored in
either a single attribute value
or two attribute values.
In the case of V3 certificates, none of the
above CA certificates
shall include a basicConstraints extension
with the cA value set to
FALSE.
The definition of realm is purely a matter
of local policy.
certificateRevocationListATTRIBUTE::={
WITH SYNTAX CertificateList
EQUALITY MATCHING RULE
certificateListExactMatch
ID joint-iso-ccitt(2) ds(5)
attributeType(4)
certificateRevocationList(39)}
The certificateRevocationList attribute, if
present in a particular
CA's entry, contains CRL(s) as defined in
RFC 2459.
authorityRevocationListATTRIBUTE::={
WITH SYNTAX CertificateList
EQUALITY MATCHING RULE
certificateListExactMatch
ID joint-iso-ccitt(2) ds(5)
attributeType(4)
authorityRevocationList(38)}
The authorityRevocationList attribute, if
present in a particular
CA's entry, includes revocation information
regarding certificates
issued to other CAs.
Boeyen,
et al. Standards Track [Page 4]
RFC
2587 PKIX LDAPv2
Schema June 1999
3.2.1. CRL distribution points
CRL distribution points are an optional
mechanism, specified in RFC
2459, which MAY be used to distribute revocation
information.
A patent statement regarding CRL
distribution points can be found at
the end of this document.
If a CA elects to use CRL distribution
points, the following object
class is used to represent these.
cRLDistributionPoint OBJECT-CLASS::= {
SUBCLASS OF { top }
KIND structural
MUST CONTAIN { commonName }
MAY CONTAIN { certificateRevocationList |
authorityRevocationList
|
deltaRevocationList }
ID joint-iso-ccitt(2) ds(5) objectClass(6)
cRLDistributionPoint(19) }
The certificateRevocationList and
authorityRevocationList attributes
are as defined above.
The commonName attribute and
deltaRevocationList attributes, defined
in X.509, are duplicated below.
commonName ATTRIBUTE::={
SUBTYPE OF name
WITH SYNTAX DirectoryString
ID joint-iso-ccitt(2) ds(5)
attributeType(4) commonName(3) }
deltaRevocationList ATTRIBUTE ::= {
WITH SYNTAX CertificateList
EQUALITY MATCHING RULE certificateListExactMatch
ID joint-iso-ccitt(2) ds(5)
attributeType(4)
deltaRevocationList(53) }
3.2.2. Delta CRLs
Delta CRLs are an optional mechanism,
specified in RFC 2459, which
MAY be used to enhance the distribution of
revocation information.
If a CA elects to use delta CRLs, the
following object class is used
to represent these.
Boeyen,
et al. Standards Track [Page 5]
RFC
2587 PKIX LDAPv2
Schema June 1999
deltaCRL OBJECT-CLASS::= {
SUBCLASS OF { top }
KIND auxiliary
MAY CONTAIN {
deltaRevocationList }
ID joint-iso-ccitt(2) ds(5)
objectClass(6) deltaCRL(23) }
4. Security Considerations
Since the elements of information which are
key to the PKI service
(certificates and CRLs) are both digitally
signed pieces of
information, no additional integrity
service is REQUIRED.
Security considerations with respect to
retrieval, addition,
deletion, and modification of the
information supported by this
schema definition are addressed in RFC
2559.
5. References
[1]
Yeong, Y., Howes, T. and S. Kille, "Lightweight Directory Access
Protocol", RFC 1777, March 1995.
[2]
Bradner, S., "Key Words for use in RFCs to Indicate Requirement
Levels", BCP 14, RFC 2119, March
1997.
6 Intellectual Property Rights
The IETF has been notified of intellectual
property rights claimed in
regard to some or all of the specification
contained in this
document.
For more information consult the online list of claimed
rights.
The IETF takes no position regarding the
validity or scope of any
intellectual property or other rights that
might be claimed to
pertain to the implementation or use of the
technology described in
this document or the extent to which any
license under such rights
might or might not be available; neither
does it represent that it
has made any effort to identify any such
rights. Information on the
IETF's procedures with respect to rights in
standards-track and
standards-related documentation can be
found in BCP-11. Copies of
claims of rights made available for
publication and any assurances of
licenses to be made available, or the
result of an attempt made to
obtain a general license or permission for
the use of such
proprietary rights by implementors or users
of this specification can
be obtained from the IETF Secretariat.
Boeyen,
et al. Standards Track [Page 6]
RFC
2587 PKIX LDAPv2 Schema June 1999
7. Authors' Addresses
Sharon Boeyen
Entrust Technologies Limited
750 Heron Road
Ottawa, Ontario
Canada K1V 1A7
EMail: sharon.boeyen@entrust.com
Tim Howes
Netscape Communications Corp.
501 E. Middlefield Rd.
Mountain View, CA 94043
USA
EMail: howes@netscape.com
Patrick Richard
Xcert Software Inc.
Suite 1001, 701 W. Georgia Street
P.O. Box 10145
Pacific Centre
Vancouver, B.C.
Canada V7Y 1C6
EMail: patr@xcert.com
Boeyen,
et al. Standards Track [Page 7]
RFC
2587 PKIX LDAPv2
Schema June 1999
Full
Copyright Statement
Copyright (C) The Internet Society
(1999). All Rights Reserved.
This document and translations of it may be
copied and furnished to
others, and derivative works that comment
on or otherwise explain it
or assist in its implementation may be
prepared, copied, published
and distributed, in whole or in part,
without restriction of any
kind, provided that the above copyright
notice and this paragraph are
included on all such copies and derivative
works. However, this
document itself may not be modified in any
way, such as by removing
the copyright notice or references to the
Internet Society or other
Internet organizations, except as needed
for the purpose of
developing Internet standards in which case
the procedures for
copyrights defined in the Internet
Standards process must be
followed, or as required to translate it
into languages other than
English.
The limited permissions granted above are
perpetual and will not be
revoked by the Internet Society or its successors or assigns.
This document and the information contained
herein is provided on an
"AS IS" basis and THE INTERNET
SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE
USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY
IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE.
Acknowledgement
Funding for the RFC Editor function is
currently provided by the
Internet Society.
Boeyen,
et al. Standards Track [Page 8]