FBCA CP Section 3.3.1, Identification And Authentication For Routine Re-Key, Medium Hardware, v2.27
Profile of Medium Hardware level of assurance requirements for the Federal Bridge Certificate Authority (FBCA) Certificate Policy (CP), version 2.27, Section 3.3.1, Identification And Authentication For Routine Re-Key .
Identifier | https://artifacts.trustmarkinitiative.org/lib/tips/fbca-cp-section-3.3.1_-identification-and-authentication-for-routine-re-key_-medium-hardware/2.27/ | ||||
Publication Date | 2021-02-04 | ||||
Issuing Organization |
Trustmark Initiative (https://trustmarkinitiative.org/)
View Contact
|
||||
Keywords | PIV-I, Security, Identity, Federal Bridge | ||||
Legal Notice | This artifact is published by the Georgia Tech Research Institute (GTRI) as part of the Trustmark Initiative. This artifact and the information contained herein is provided on an "AS IS" basis, and GTRI disclaims all warranties, express or implied, including but not limited to any warranty that the use of the information herein will not infringe any rights or any implied warranties or merchantability or fitness for a particular purpose. In addition, GTRI disclaims legal liability for any loss incurred as a result of the use or reliance on the document or the information contained herein. |
Loading...
Trust Expression:
( TD_SubscribersIdentifyThemselvesForReKeyingPKICertificatesThroughUseOfCurrentSignatureKey or TD_IdentityReestablishmentForDevicePKICertificateReKeyingUsesMeansCommensurateWiththeCertificatesStrength ) and TD_MaximumTimePeriodForReestablishingIdentityForPKICertificateReKeying and TD_MaximumTimePeriodForReestablishingIdentityForPKICertificateReKeying.IdentityRe-establishmentTimePeriod < 10 and TD_IdentityReestablishmentForPKICertificateReKeyingUsesInitialRegistrationProcess
References (4)
TD Subscribers Identify Themselves For Re-Keying PKI Certificates Through Use Of Current Signature Key, v1.0 | |
---|---|
Description | Addresses the requirements for determining that an organization permits PKI certificate subscribers to use their current signature key to identify themselves for re-keying their certificates. |
ID | TD_SubscribersIdentifyThemselvesForReKeyingPKICertificatesThroughUseOfCurrentSignatureKey |
Provider Reference |
TD Identity Re-establishment For Device PKI Certificate Re-Keying Uses Means Commensurate With the Certificate's Strength, v1.0 | |
---|---|
Description | Addresses the requirement for organizations to require device PKI certificate subscribers to re-establish identity for re-keying through means commensurate with the certificate's strength. |
ID | TD_IdentityReestablishmentForDevicePKICertificateReKeyingUsesMeansCommensurateWiththeCertificatesStrength |
Provider Reference |
TD Maximum Time Period For Re-establishing Identity For PKI Certificate Re-Keying, v1.0 | |
---|---|
Description | Addresses the requirement for organizations to require PKI certificate subscribers to re-establish their identity within an organization defined time period from the time of initial registration. |
ID | TD_MaximumTimePeriodForReestablishingIdentityForPKICertificateReKeying |
Provider Reference |
TD Identity Re-establishment For PKI Certificate Re-Keying Uses Initial Registration Process, v1.0 | |
---|---|
Description | Addresses the requirement for organizations to require PKI certificate subscribers to re-establish their identity through the organization's initial registration process. |
ID | TD_IdentityReestablishmentForPKICertificateReKeyingUsesInitialRegistrationProcess |
Provider Reference |
Sources (1)
FBCA-CP | X.509 Certificate Policy For the Federal Bridge Certification Authority (FBCA), Version 2.27. December 2, 2013. |