[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


To: ietf-provreg@cafax.se
From: Hugo Koji Kobayashi <koji@registro.br>
Date: Tue, 5 Dec 2006 15:58:38 -0200
Content-Disposition: inline
In-Reply-To: <046F43A8D79C794FA4733814869CDF07019A6F68@dul1wnexmb01.vcorp.ad.vrsn.com>
Sender: owner-ietf-provreg@cafax.se
User-Agent: Mutt/1.4.2.1i
Subject: Re: [ietf-provreg] Certificate Validation and Subject Analysis

Scott,

Our (.br Registry) server implementation uses the Subject's Common
Name to carry an unique client identifier that is used to authenticate
clients in a multiple match authentication (EPP <clID> and <pw>, IP
address, and certificate).

Hugo

On Tue, Dec 05, 2006 at 08:13:29AM -0500, Hollenbeck, Scott wrote:
> I received a question from an IESG member about EPP implementations and
> X.509 digital certificate validation.  What are implementers doing with
> the certificate subject name information when validating the
> certification path of a client or server?  Is the name being examined
> and/or used for authentication or access control purposes?
> 
> -Scott-
> 

Home | Date list | Subject list