Field | Value |
---|---|
Serial Number | Serial number shall be a unique positive integer with a minimum of 64 bits of entropy generated by a CSPRNG. Serial number shall not exceed 20 bytes in length. Serial numbers shall be non-sequential. |
Issuer Signature Algorithm | sha256 WithRSAEncryption {1 2 840 113549 1 1 11} |
Issuer Distinguished Name | Unique X.500 issuing CA DN as specified in Section 7.1.4 of this CP |
Validity Period | Validity Period dates shall be encoded as UTCTime for dates through 2049 and GeneralizedTime for dates thereafter Validity Period shall be no longer than 10 years from date of issue. |
Subject Distinguished Name | Subordinate CA Certificate Subject Distinguished Name (DN) shall be a unique X.500 DN as specified in Section 7.1.4 of this CP. Distinguished Name shall conform to PrintableString string type in ASN.1 notation. The Subordinate CA Certificate DN shall be of the following format: cn=US Federal TLS CA x, o=U.S. Government, c=US Where x starts at 1 and is incremented by 1 for each Subordinate CA signed by the Root CA. No other attributes shall be included in the Certificate Subject DN. Non-production Subordinate CAs signed by non-production Root CA certificates shall include "Test" in the DN. A non-production DN example is: cn=US Federal Test TLS CA 1, o=U.S. Government, c=US Subject name shall be encoded exactly as it is encoded in the issuer field of certificates issued by the subject. |
Subject Public Key Information | At least 2048 bit modulus, rsaEncryption {1 2 840 113549 1 1 1} |
Issuer Signature | sha256 WithRSAEncryption {1 2 840 113549 1 1 11} |
Extension | Required | Critical | Value and Requirements |
---|---|---|---|
authorityKeyIdentifier | Mandatory | False | Octet String Derived using the SHA-1 hash of the Issuer’s public key in accordance with RFC 5280. Shall match SKI of issuing CA. |
basicConstraints | Mandatory | True | cA=True The pathLenConstraint field shall be present and set to zero (0). |
subjectKeyIdentifier | Mandatory | False | Octet String Derived using SHA-1 hash of the public key |
keyUsage | Mandatory | True | Bit positions for keyCertSign and cRLSign shall be set. If the Subordinate CA Private Key is used for signing OCSP responses, then the digitalSignature bit shall also be set. |
extkeyUsage | Mandatory | False | This extension is required for Technically Constrained Subordinate CAs per Section 7.1.5. Required Extended Key Usage: Server Authentication id-kp-serverAuth {1.3.6.1.5.5.7.3.1} Optional Extended Key Usage: Client Authentication id-kp-clientAuth {1.3.6.1.5.5.7.3.2} id-kp-OCSPSigning {1.3.6.1.5.5.7.3.9} Other values may be present consistent with use for server authentication, with approval by the FPKIPA. |
certificatePolicies | Mandatory | False | See Section 7.1.6.3. At least one U.S. Government certificate policy OID listed in Section 7.1.6.1 asserting compliance with this CP, and one CAB Forum certificate policy OID listed in Section 7.1.6.1 asserting compliance with the CAB Forum Baseline Requirements. The certificate shall include all the certificate policy OIDs for all certificates issued by the CA. |
authorityInformationAccess | Mandatory | False | OCSP: Publicly accessible URI of Issuing CA's OCSP responder accessMethod = {1.3.6.1.5.5.7.48.1} At least one instance of the OCSP responder access method shall be included. All instances of this access method shall include the HTTP URI name form. id-ad-caIssuers: Publicly accessible URI of Issuing CA’s certificate accessMethod = {1.3.6.1.5.5.7.48.2} All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing either a single DER encoded certificate, or a BER or DER encoded “certs-only” CMS message as specified in [RFC 5272]. |
cRLDistributionPoints | Mandatory | False | At least one instance shall be included and shall specify a HTTP URI to the location of a publicly accessible CRL. All URIs included shall be publicly accessible and shall specify the HTTP protocol only. The reasons and cRLIssuer fields shall be omitted. |
nameConstraints | Mandatory | True | See Section 7.1.5. |