Academia Sinica Grid Computing Certification Authority (ASGCCA) Certificate Policy and Certification Practice Statement
Version 3.0
June, 2013
Document Revision History
Version |
Date |
Editor |
3.0 |
June 2013 |
Jinny Chien |
2.1 |
March 2008 |
Jinny Chien |
2.0 |
July 2006 |
Jinny Chien |
1.5 |
September 2005 |
|
1.4 |
August 2005 |
|
1.1 |
February 2002 |
|
1.2 Document Name and Identification
1.3.1 Certification Authorities
1.3.2 Registration Authorities
1.4.1 Appropriate Certificate Uses
1.4.2 Prohibited Certificate Uses
1.5.1 Organization Administering the Document
1.5.3 Person Determing CPS Suitability for the Policy
2. Publication and Repository Responsibilities
2.2 Publication of Certification Information
2.3 Time or Frequency of Publication
2.4 Access Controls on Repositories
3. Identification and Authentication
3.1.2 Need for Names to be Meaningful
3.1.3 Anonymity or pseudonymity of Subscribers
3.1.4 Rules for Interpreting Various Name Forms
3.1.6 Recognition, Authentication, and Role of Trademarks
3.2 Initial Identity Validation
3.2.1 Method to Prove Possession of Private Key
3.2.2 Authentication of Organization Identity
3.2.3 Authentication of Individual Identity
3.2.4 Non-verified Subscriber Information
3.2.6 Criteria of Interoperation
3.3 Identification and Authentication for Re-key Requests
3.3.1 Identification and Authentication for Routine Re-key
3.3.2 Identification and Authentication for Re-key after Revocation
3.4 Identification and Authentication for Revocation Request
4. Certificate Life-Cycle Operational Requirements
4.1.1 Who Can Submit a Certificate Application
4.1.2 Enrollment Process and Responsibilities
4.2 Certificate Application Processing
4.2.1 Performing Identification and Authentication Functions
4.2.2 Approval or Rejection of Certificate Applications
4.2.3 Time to Process Certificate Applications
4.3.1 CA Actions During Certificate Issuance
4.3.2 Notifications to Subscriber by the CA of Issuance of Certificate
4.4.1 Conduct Constituting Certificate Acceptance
4.4.2 Publication of the Certificate by the CA
4.4.3 Notification of Certificates Issuance by the CA to Other Entities
4.5 Key Pair and Certificate Usage
4.5.1 Subscriber Private Key and Certificate Usage
4.5.2 Relying Party Public Key and Certificate Usage
4.6.1 Circumstances for Certificate Renewal
4.6.3 Processing Certificate Renewal Requests
4.6.4 Notification of New Certificate Issuance to Subscriber
4.6.5 Conduct Constituting Acceptance of a Renewal Certificate
4.6.6 Publication of the Renewal Certificate by the CA
4.6.7 Notification of Certificate Issuance by the CA to Other Entities
4.7.1 Circumstances for Certificate Re-key
4.7.2 Who May Request Certification of a New Public Key
4.7.3 Processing Certificate Re-key Requests
4.7.4 Notification of New Certificate Issuance to Subscriber
4.7.5 Conduct Constituting Acceptance of a Re-keyed Certificate
4.7.6 Publication of the Re-keyed Certificate by the CA
4.7.7 Notification of Certificate Issuance by the CA to Other Entities
4.8.1 Circumstances for Certificate Modification
4.8.2 Who May Request Certificate Modification
4.8.3 Processing Certificate Modification Requests
4.8.4 Notification of new certificate issuance to subscriber
4.8.5 Conduct Constituting Acceptance of Modified Certificate
4.8.6 Publication of the Modified Certificate by the CA
4.8.7 Notification of Certificate Issuance by the CA to Other Entities
4.9 Certificate Revocation and Suspension
4.9.1 Circumstances for Revocation
4.9.2 Who Can Request Revocation
4.9.3 Procedure for Revocation Request
4.9.4 Revocation Request Grace Period
4.9.5 Time Within Which CA Must Process the Revocation Request
4.9.6 Revocation Checking Requirements for Relying Parties
4.9.8 Maximum latency for CRLs
4.9.9 Online Revocation/Status Checking Availability
4.9.10 Online Revocation Checking Requirements
4.9.11 Other Forms of Revocation Advertisements Available
4.9.12 Special Requirements Re-key Compromise
4.9.13 Circumstances for Suspension
4.9.14 Who can Request Suspension
4.9.15 Procedure for Suspension Request
4.9.16 Limits on Suspension Period
4.10 Certificate Status Services
4.10.1 Operational Characteristics
4.12.1 Key Escrow and Recovery Policy and Practices
4.12.2 Session Key Encapsulation and Recovery Policy and Practices
5. Physical, Procedural and Personnel Security Controls
5.1.1 Site Location and Construction
5.1.3 Power and Air Conditioning
5.1.5 Fire Prevention and Protection
5.2.2 Number of Persons Required per Task
5.2.3 Identification and Authentication for Each Role
5.2.4 Roles Requiring Separation of Duties
5.3.1 Qualifications, Experience, and Clearance Requirements
5.3.2 Background Check Procedures
5.3.4 Retraining Frequency and Requirement
5.3.5 Job Rotation Frequency and Sequence
5.3.6 Sanctions for Unauthorized Actions
5.3.7 Independent Contractor Requirements
5.3.8 Documentation Supplied to Personnel
5.4.1 Types of Events Recorded
5.4.2 Frequency of Processing Logs
5.4.3 Retention Period for Audit Logs
5.4.5 Audit Log Backup Procedures
5.4.6 Audit Collection System (internal vs. external)
5.4.7 Notification to Event-Causing Subject
5.4.8 Vulnerability Assessments
5.5.1 Types of Records Archived
5.5.2 Retention Period for Archive
5.5.4 Archive Backup Procedures
5.5.5 Requirements for Time-Stamping of Records
5.5.6 Archive Collection System (Internal or External)
5.5.7 Procedures to Obtain and Verify Archive Information
5.7 Compromise and Disaster Recovery
5.7.1 Incident and Compromise Handling Procedure
6. Technical Security Controls
6.1 Key Pair Generation and Installation
6.1.2 Private Key Delivery to Subscriber
6.1.3 Public Key Delivery to Certificate Issuer
6.1.4 CA Public Key Delivery to Relying Parties
6.1.6 Public Key Parameters Generation and Quality Checking
6.1.7 Key Usage Purposes (as per X.509 v3 Key Usage Field)
6.2 Private Key Protection and Cryptographic Module Engineering Controls
6.2.1 Cryptographic Module Standards and Controls
6.2.2 Private Key (n out of m) Multi-person Control
6.3 Other Aspects of Key Pair Management
6.3.2 Certificate Operational Periods and Key Pair Usage Periods
6.4.1 Activation Data Generation and Installation
6.4.2 Activation Data Protection
6.4.3 Other Aspects of Activation Data
6.5 Computer Security Controls
6.5.1 Specific Computer Security Technical Requirements
6.5.2 Computer Security Rating
6.6 Life Cycle Technical Controls
7 Certificate, CRL, and OCSP Profiles
7.1.3 Algorithm Object Identifiers
7.1.6 Certificate Policy Object Identifier
7.1.7 Usage of Policy Constraints Extensions
7.1.8 Policy Qualifier Syntax and Semantics
7.1.9 Processing Semantics for the Critical Certificate Policies Extension
7.2.2 CRL and CRL Entry Extensions
8. Compliance Audit and Other Assessment
8.1 Frequency and Circumstances of Assessments
8.2 Identity / Qualifications of Assessor
8.3 Assessor’s Relationship to Assessed Entity
8.4 Topic covered by assessment
8.5 Actions taken as a result of deficiency
9. Other Business and Legal Matters
9.5 Intellectual Property rights
This document is based on the structure suggested by the
''Internet X.509 Public Key Infrastructure Certificate Policy and Certification
Practices Framework'' [RFC 3647]. Sections that are not included have a
default value of "No stipulation". This document describes the set of
rules and procedures established by the Academia Sinica Grid Computing
Certification Authority (ASGCCA).
(http://ca.grid.sinica.edu.tw).
Academia Sinica Grid Computing Certification Authority (ASGCCA) Certificate Policy and Certification Practice Statement
3.0
The following ASN.1 Object Identifier (OID) has been assigned to this document: 1.3.6.1.4.1.5935.10.1.3.0. This OID is constructed as shown in the table below
IANA |
1.3.6.1.4.1 |
Academia Sinica Computing Centre |
.5935 |
ASGCCA |
.10 |
CP/CPS |
.1 |
Major Version |
.3 |
Minor Version |
.0 |
|
|
June 2013
ASGCCA is managed by Academia Sinica Grid Computing Centre.
The ASGCCA delegates the authentication of individual identity to Registration Authorities. RAs must sign an agreement with the ASGCCA, stating their adherence to the procedures described in this document. RAs are not allowed to issue certificates under this CP/CPS. The list of RAs is available from the ASGCA website. (http://ca.grid.sinica.edu.tw/contact.html)
Every organization has at least one Registration Authority who is in charge of an organization. Only permanent staff members are eligible to become an ASGCCA RA for their organizations.
The following is the ASGCCA RA registration procedure:
ASGCCA issues certificates to person (user certificate), computers and services (host certificates).
The entities eligible for certification by the ASGCCA are:
A recipient of a certificate who acts in reliance on that certificate and/or digital signatures verified using that certificate.
No stipulation
The authorized uses of certificate issued by ASGCCA are:
The certificates issued by ASGCCA must not be used for financial transaction.
The ASGCCA is managed by Academia Sinica Grid Computing Centre.
128, Sec. 2, Academia Road, Nankang, Taipei, Taiwan 11529
http://www.twgrid.org, http://ca.grid.sinica.edu.tw
Yen, Eric
Address: 128, Sec. 2, Academia Road, Nankang, and Taipei, Taiwan 11529
Phone: +886-2-2789-9494
Mobile: +886-922-959211
Fax: +886-2-2783-7653
A mailing list containing ASGCCA managers has been setup to ensure quick response :
Email: asgcca@grid.sinica.edu.tw
ASGCCA managers (see 1.5.2) determine CPS suitability for the policy.
The document shall be submitted to APGridPMA (Asia Pacific Grid Policy Management Authority) for acceptance and accreditation. All major changes must be approved by APGridPMA.
The following definitions and associated abbreviations are used in this document.
The Academia Sinica Grid Computing Certification Authority.
A named set of rules that indicates the applicability of a certificate to a particular community and/or class of application with common security requirements. For example, a particular certificate policy might indicate applicability of a type of certificate to the authentication of electronic data interchange transactions for the trading of goods within a given price range.
A statement of the practices, which a certification authority employs in issuing certificates.
An entity trusted by one or more users to create and assign public key certificates and be responsible for them during their whole lifetime.
A time stamped list identifying revoked certificates which is signed by a CA and made freely available in a public repository.
Policy-dependent information that accompanies a certificate policy identifier in an X.509 certificate.
An entity that is responsible for identification and authentication of certificate subjects, but that does not sign or issue certificates (i.e. an RA is delegated certain tasks on behalf of a CA).
A recipient of a certificate who acts in reliance on that certificate and/or digital signatures verified using that certificate.
A term generally used to describe the laws, policies, standards, and software that regulated or manipulate certificates and public and private keys. All of this implies a set of standards for applications that use encryption.
An entity establishing requirements and best practices for public Key Infrastructure.
A website is maintained by ASGCCA. It contains all the information published by ASGCCA specified in section 2.2. The website can be reached at the following address: http://ca.grid.sinica.edu.tw
ASGCCA operates a secure online repository that contains:
The online repository is available 24 hours a day, 7 days a week, subject to reasonable scheduled maintenance.
ASGCCA doesn't impose any access control on its CP/CPS, its Certificate and issued certificates and CRLs.
The CRL list is signed by ASGCCA private key.
Name components vary depending on the type of certificate. Names will be consistent with the name requirements specified in “Internet X.509 Public Key Infrastructure Certificate and CRL profile'' [RFC 3280].
l In case of personal certificate the subject name must include the person’s full name. C=Country, O=Organization, OU=Unit, CN=First Name Last Name
l In case of host certificate the subject name must include the FQDN of the host. C=Country, O=Organization, OU=Unit, CN=DNS server name(FQDN)
For a user certificate, the CN must be the full name of the subscriber. For a host certificate, the CN must be functional fully qualified domain name.
ASGCCA will neither issue nor sign pseudonymous or anonymous certificates. The ASGCCA RA validates identity of subscribers.
l Each entity has a clear and unique Distinguished Name in the certificate subject field.
l For a host certificate, the common name(CN) must be functional fully qualified domain name.
l Any name under this CPCPS defined as the form “OU=GRID”.
l To select your organization, please choose “AP” if your organization is outside of Taiwan.
The Distinguished Name must be unique for each subject name certified by ASGCCA.
No stipulation
The public and private keys are generated on the user station when he/she fills the certificate request form with Mozilla, Internet Explorer and Google Chrome browser.
If the name of an organization is requested to be part of subject
name, ASGCCA may take steps to ascertain that the organization consent to such
use. The organization is outside of Taiwan, the name of an organization must be
“AP”. The information of authenticated organization is published on
http://ca.grid.sinica.edu.tw/contact.html.
Procedures differ if the subject is a user or host:
Users request user certificates must have face to face meetings with the RA and show their work IDs. If the ID card is valid and the photo image corresponds to the bearer, the RA shall consider that the user is correctly identified. The RA will sign the user’s application form. Then the user will complete the online application form to the CA. Once the user's identification is verified, ASGCCA will authenticate the subscriber and issue a certificate without namespace clash with other CAs in APGridPMA, EUGridPMA and TAGPMA.
Requests must be signed with a valid personal ASGCCA user certificate.
No stipulation.
See the provisions of section 3.2.2 and 3.2.3.
No stipulation.
Expiration notifications are sent to subscribers before re-key time. Rekeying of certificates can be requested by an online procedure, which checks the validity of certificates.
Rekey after revocation follows the same rules as an initial registration.
Certificate revocation request must be sent in the following ways:
l Send e-mail to asgcca@grid.sinica.edu.tw signed with a valid and trusted certificate.
l Contact personally the CA/RA staff in order to verify his/her identity and the validity of the request.
Procedures are different if the subject is a person or a server. For every certificate application, the subject has to generate his/her own key pair. Minimum key length is 1024 bits.
Certificates requests are submitted by an online procedure on ASGCCA website (http://ca.grid.sinica.edu.tw), using a web browser. Authentication using a user certificate mandatory to request a host certificate.
For user certificates, the subject requests an appointment with the CA/RA (in person). The authentication according to sections 1.3.3, 3.2.2 and 3.2.3 must be processed in a face to face meeting. After a successful authentication, the CA/RA process and sign the request.
For host certificate, the request is through the secure online portal. The authentication is performed according to sections 1.3.3, 3.2.2 and 3.2.3.
The certificate applications will be validated by the CA/RA. For new user certificate request, the CA/RA will authenticate the request according to sections 3.2.2 and 3.2.3. The host administrator must already have a valid personal ASGCCA certificate, required to authenticate to ASGCCA secure website and request host certificates.
A certificate request is only allowed to users who do not already have a valid certificate assigned, otherwise rekey or revocation will be proposed. Provided the users as defined in section 4.1.1 and already verified by CA/RA. The certificate issuing is allowed.
The process of issuing certificates is done immediately: identity verification has been made previously by the ASGCCA RA, and is mandatory to proceed with the request for a certificate.
ASGCCA issues the certificate if, and only if, the authentication of the subject is successful.
If the subject is a person, a message is sent to his/her e-mail address with the instructions on how to download it from the ASGCCA web server. If the subject is a host or a service entity, the certificate itself is sent to the address specified in the request email.
If the authentication is unsuccessful, the certificate is not issued and e-mail with the reason is sent to the subject.
After issuance of the certificate, ASGCCA will send a notification and guide to the subscriber how to download the certificate from ASGCCA online website.
No Stipulation.
All valid certificates are published in an online repository available at the URL: http://ca.grid.sinica.edu.tw/publication/newCRT/newcerts/crt.php
During the period of issuance, ASGCCA manager sends the notification to the entity. Also forwards this message to RA.
In requesting a certificate, subscribers agree to:
In requesting a certificate, subscribers agree to:
ASGCCA does not renew subscribers’ certificates. Subscribers must follow the re-key procedure as described in section 4.7.
ASGCCA does not renew subscribers’ certificates. Subscribers must follow the re-key procedure as described in section 4.7.
ASGCCA does not renew subscribers’ certificates. Subscribers must follow the re-key procedure as described in section 4.7.
ASGCCA does not renew subscribers’ certificates. Subscribers must follow the re-key procedure as described in section 4.7.
ASGCCA does not renew subscribers’ certificates. Subscribers must follow the re-key procedure as described in section 4.7.
ASGCCA does not renew subscribers’ certificates. Subscribers must follow the re-key procedure as described in section 4.7.
ASGCCA does not renew subscribers’ certificates. Subscribers must follow the re-key procedure as described in section 4.7.
The lifetime of ASGCCA certificates must be no longer than 13 months. If users would get the brand-new certificate and private key, they must follow the online procedure to get these achieves from ASGCCA manager.
Subscribers must regenerate the key pairs in the following circumstance:
See section 4.1.1
Re-key request before expiration of the user certificate can be accomplished by sending an online request with the current user certificate. Subscriber follows the authentication procedure to get a new certificate. Please note that the user certificate must be imported to the browser to access the secure re-key page.
Requests must be signed with a valid personal ASGCCA user certificate.
See the provisions of section 4.3.2
No stipulation
See the provisions of section 4.4.2.
See the provisions of section 4.4.3.
Certificates must not be modified. In case of changes, the old certificate must be revoked, and a new certificate must be requested.
No stipulation
No stipulation
No stipulation
No stipulation
No stipulation
No stipulation
No stipulation
A certificate is revoked when the information it contains is suspected to be incorrect or compromised. This includes situations where:
The revocation of the certificate can be requested by:
The entity requesting revocation of a certificate must authenticate themselves in one of the following ways:
In both case above, the requesting entity must specify the reason for the revocation request and provide evidence of circumstances as described in section 4.9.1.
The CRL is updated immediately after every revocation.
The CRL is updated immediately after every revocation.
There is no provision for certificate suspension.
The lifetime of the CRL is 30 days.
The CRL is updated immediately after every revocation.
CRL is reissued 7 days before expiration even if there have been no revocations.
The maximum latency for CRLs is immediately after every revocation.
No stipulation
No stipulation.
No stipulation.
No stipulation.
There is no provision for certificate suspension.
There is no provision for certificate suspension.
There is no provision for certificate suspension.
There is no provision for certificate suspension.
The ASGCCA operates as an online repository that contains all the CRLs that have been issued. See http://ca.grid.sinica.edu.tw/publication/newCRT/newcerts/status.php
The online repository is available 24 hours a day, 7 days a week, subject to reasonable scheduled maintenance.
No stipulation
The subscription ends with the expiration of the certificate if it is not rekeyed before that date, or if the subscriber requests the revocation of the certificate.
ASGCCA does not support key escrow and recovery
No stipulation
The ASGCCA is located safely at Academia Sinica Grid Computing Centre facilities in Taiwan.
Physical access to the ASGCCA is restricted to authorized personnel. The access key is controlled by one of the ASGCCA staff who is assigned to secure the facilities safety. All access to the facilities needs to be scheduled and the facilities security staff needs to be presented at all time.
The CA signing machine and the CA web server are both protected by uninterruptible power supplies. Environment temperature in rooms containing CA related equipment is maintained at appropriate levels by suitable air conditioning systems.
Due to the location of the ASGCCA facilities floods are not expected.
ASGCCA facilities obey to the R.O.C. law regarding fire prevention and protection in buildings.
The ASGCCA key is kept in several removable storages. Backup copies of CA related information are kept in removable media.
Wastes carrying potential confidential information such as old floppy disks are physically destroyed before being disposal of.
No off-site backups are currently performed.
No Stipulations.
No Stipulations.
No Stipulations.
No Stipulations.
All access to servers and applications that compromise the Academia Sinica Grid Computing Centre is controlled.
CA personnel are recruited from the Academia Sinica Grid Computing Centre and familiar with PKI concept.
No other personnel are authorized to access ASGCCA facilities without the physical presence of CA personnel.
Internal training is given to CA operators.
No Stipulation
Job rotation is not performed.
No Stipulation.
No Stipulation
The following events are stored and backed-up in safekeeping:
No Stipulation.
Logs will be kept for a minimum of 3 years.
All audit logs are accessible to the ASGCCA managers and to authorized audit personnel.
Audit logs are copied to an offline medium every 3 months.
Audit collection is internal to ASGCCA service.
No stipulation
No stipulation
The provisions of section 5.4.1 apply.
The minimum retention period is 3 years.
The archive is accessible to ASGCCA personnel only.
Archives are copied to an offline medium and stored in a restricted access area every 3 months.
All records are saved with an automatically generated time stamp.
Archive collection is internal to ASGCCA service.
No stipulation
No stipulation
If the CA's private key is (or suspected to be) compromised, the CA will:
If the CA server is damaged, the CA will
Before ASGCCA terminates its services, it will:
The key pair of the ASGCCA Root CA is generated by authorized CA staff on the offline ASGCCA Root CA machine. The keys for ASGCCA are generated by software, in the CA service. Each subscriber must generate its own key pair. The ASGCCA does not generate private keys for subjects. An end entity key pair is generated using a software tool in subscriber's personal or server hardware.
The ASGCCA does not generate private keys hence does not deliver private keys.
Entities' private key will be generated by browser application in personal computer.
Entities' public keys are delivered to issuing CA in a secure and trustworthy manner.
CA certificate can be downloaded from the ASGCCA secure web site.
No Stipulation.
ASGCCA private key is the only key used for signing CRLs and Certificates for person and server.
The Certificate key Usage field must be used in accordance with the ”Internet X.509 Public Key Infrastructure Certificate and CRL profile'' [RFC 3280].
No Stipulation.
The CA's private key is not under (n out of m) multi-person control. But the ASGCCA implements multi-person control for the access to the CA server as described in this document [5.1 Physical Controls]. Backup Copy of the CA's private key is under (2 out of 5) multi-person control.
ASGCCA keys are not given in escrow. ASGCCA is not available for accepting escrow copies of keys of other parties.
The ASGCCA's private key is kept encrypted in multiple copies in portable Hard Disk device and USBs in safe places. For emergencies, the passphrase is in a sealed envelope kept in a safe.
See the provisions of section 6.2.4.
The CA archives all issued certificates and its own public keys.
Subscriber certificates have a validity period of 1 year. The ASGCCA certificate has a life time of 20 years.
The ASGCCA's private key is protected by a 15 characters passphrase.
No stipulation.
If subscriber's private key is protected by a pass phrase, it must be a strong pass phrase.
No stipulation.
No Stipulation.
No Stipulation.
No Stipulation.
All certificates issued by ASGCCA conform to the Internet PKI profile (PKIX) for X.509 certificates as defined by RFC 3280.
X.509 v3.
Basic constraints:
Not a CA.
Key usage:
Digital signature, non-repudiation, key encipherment, data encipherment.
Subject key identifier
Authority key identifier
Subject alternative name
Issuer alternative name
CRL distribution points
Certificate policies
No Stipulation.
Issuer:
l C=TW, O=AS, CN=Academia Sinica Grid Computing Certification Authority Mercury
Person DN:
l C=Country, O=Organization, OU=GRID, CN=First Name Last Name
Server name DN:
l C=Country, O=Organization, OU=GRID, CN=DNS server name(FQDN)
The CA does not support the name constraints extension.
See section 1.2.
No Stipulation.
No Stipulation.
No Stipulation.
x.509 v1.
No Stipulation.
No Stipulation.
No Stipulation.
ASGCCA may be audited by other trusted CAs to verify its compliance with the rules and procedures specified in this document.
The ASGCCA will accept at least one external Compliance Audit per year. In addition, the ASGCCA performs operational self-assessment of CA/RA staff at least once per year.
The CA will be audited by the other cross-certifying CAs.
It is desirable that the auditor is a third-party to this PKI system.
Audit items will be selected based on the WebTrust criteria and minimum CA requirements enacted by the APGridPMA, EUGridPMA and TAGPMA. The audit must cover both compliance audit and operational audit.
The ASGCCA has the responsibility for the action to be taken as a result of deficiency when the ASGCCA receives an audit report from the auditor, it will send a report on actions to the auditor within two weeks. The report must describe actions taken as a result of deficiency and their timetable.
The result of the audit will be made available to members of any policy management authorities in which ASGCCA participates. It may make the results of the audit publicly available. The decision will be made by the ASGCCA in case-by-case basis.
No fees are charged for any service provided by ASGCCA.
No financial responsibility is accepted fir certificates issued under this policy.
No stipulation.
Parts of this document are inspired by [CERN CA], [DutchGrid CA].
Amendments to this CP/CPS must undergo the same procedures as for the initial approval (see 1.5.4).
Interpretation of this policy is according to R.O.C laws.
CERN CA Certificate Policy and Certification Practice Statement. http://ca.cern.ch/ca/crl/policy/cp-cps.pdf
DutchGrid CA
DutchGrid CA Certificate Policy and Certification Practice Statement.
http://ca.dutchgrid.nl/medium/policy/DutchGridCA-CPCPS-3.2.pdf
Internet X.509 Public Key Infrastructure Certificate and CRL Profile. http://www.ietf.org/rfc/rfc3280.txt
Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework. http://www.ietf.org/rfc/rfc3647.txt