Changes

Jump to: navigation, search

CA/Required or Recommended Practices

195 bytes added, 22:07, 25 October 2018
updated referenced section numbers and quotes
We rely on public documentation and audits of those documented processes to ascertain that the requirements of the Mozilla Root Store Policy are met.
Section 2.2.2 of the [http://www.mozilla.org/projects/security/certs/policy/ Mozilla 's Root Store Policy] states: “for "For a certificate to be capable of being used for digitally signing and/or encrypting email messages, the CA takes reasonable measures to verify that the entity submitting the request controls the email account associated with the email address referenced in the certificate”certificate or has been authorized by the email account holder to act on the account holder’s behalf. The CA's CP/CPS must clearly specify the procedure(s) that the CA employs to perform this verification."
The CA's public documentation needs to provide sufficient information describing how the email address is verified to be owned/controlled by the certificate subscriber. For instance, if a challenge-response type of procedure is used, then there needs to be a brief description of the process. If public resources are used, then there should be a description of which public resources are used, what data is retrieved from public resources, and how that data is used to verify that the certificate subscriber owns/controls the email address.
Confirm, administrator
5,526
edits

Navigation menu