Atos Trustcenter Trust Service Provider for TrustedRoot Certificates
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Atos Trustcenter Trust Service Provider for TrustedRoot Certificates Certification Practice Statements of Atos TrustedRoot Issuing CAs Version 2.4.0 Release 07.04.2021 Document Atos_TrustedRoot_CPS_Issuing_CAs Owner TrustedRoot CA Service Manager Status Released Classification Public
Page 2 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 Table of Contents 1 INTRODUCTION ...................................................................................................... 4 1.1 Overview ................................................................................................................. 4 1.2 Document name and identification ........................................................................... 6 1.3 PKI participants ....................................................................................................... 7 1.4 Certificate usage ...................................................................................................... 8 1.5 Policy administration ................................................................................................ 9 1.6 Definitions and acronyms........................................................................................10 2 PUBLICATION AND REPOSITORY RESPONSIBILITIES ...................................... 11 2.1 Repositories............................................................................................................11 2.2 Publication of certification information .....................................................................12 2.3 Time or frequency of publication .............................................................................13 2.4 Access controls on repositories ..............................................................................14 3 IDENTICATION AND AUTHENTICATION .............................................................. 15 3.1 Naming ...................................................................................................................15 3.2 Initial identity validation ...........................................................................................17 3.3 Identification and authentication for re-key requests ...............................................20 3.4 Identification and authentication for revocation request ..........................................20 4 CERTIFICATE LIFE-CYCLE OPERATIONAL REQUIREMENTS ........................... 21 4.1 Certificate application .............................................................................................21 4.2 Certificate application processing ...........................................................................22 4.3 Certificate issuance ................................................................................................23 4.4 Certificate acceptance ............................................................................................24 4.5 Key pair and certificate usage .................................................................................25 4.6 Certificate renewal ..................................................................................................25 4.7 Certificate re-key ....................................................................................................26 4.8 Certificate modification ...........................................................................................27 4.9 Certificate revocation and suspension ....................................................................28 4.10 Certificate status services .......................................................................................31 4.11 End of subscription .................................................................................................31 4.12 Key escrow and recovery........................................................................................31 5 FACILITY, MANGEMENT, AND OPERATIONAL CONTROLS ............................... 32 5.1 Physical controls .....................................................................................................32 5.2 Procedural controls .................................................................................................32 5.3 Personnel controls ..................................................................................................33 5.4 Audit logging procedure ..........................................................................................34 5.5 Records archival .....................................................................................................34 5.6 Key changeover......................................................................................................35 5.7 Compromise and disaster recovery ........................................................................35 5.8 CA or RA termination ..............................................................................................35 6 TECHNICAL SECURITY CONTROLS .................................................................... 36 6.1 Key pair generation and installation ........................................................................36 6.2 Private key protection and cryptographic module engineering controls ...................38 6.3 Other aspects of key pair management ..................................................................40 6.4 Activation data ........................................................................................................40 6.5 Computer security controls .....................................................................................40 6.6 Life cycle technical controls ....................................................................................41 6.7 Network security controls ........................................................................................41 6.8 Timestamping .........................................................................................................41 7 CERTIFICATE, CRL, AND OCSP PROFILES ........................................................ 42 Classification: Public
Page 3 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 7.1 Certificate profile .....................................................................................................42 7.2 CRL profile .............................................................................................................45 7.3 OCSP profile...........................................................................................................45 8 COMPLIANCE AUDIT AND OTHER ASSESSMENTS ........................................... 46 8.1 Frequency and circumstances of assessment ........................................................46 8.2 Identity/qualifications of assessor ...........................................................................46 8.3 Assessor's relationship to assessed entity ..............................................................46 8.4 Topics covered by assessment ...............................................................................46 8.5 Actions taken as a result of deficiency ....................................................................46 8.6 Communications of results......................................................................................46 9 OTHER BUSINESS AND LEGAL MATTERS ......................................................... 47 9.1 Fees .......................................................................................................................47 9.2 Financial responsibility ............................................................................................47 9.3 Confidentiality of business information ....................................................................47 9.4 Privacy of personal information ...............................................................................48 9.5 Intellectual property rights .......................................................................................48 9.6 Representations and warranties .............................................................................49 9.7 Disclaimers of warranties ........................................................................................50 9.8 Limitations of liability ...............................................................................................50 9.9 Indemnities .............................................................................................................50 9.10 Term and termination..............................................................................................50 9.11 Individual notices and communications with participants ........................................50 9.12 Amendments ..........................................................................................................50 9.13 Dispute resolution provisions ..................................................................................51 9.14 Governing law.........................................................................................................51 9.15 Compliance with applicable law ..............................................................................51 9.16 Miscellaneous provisions ........................................................................................51 9.17 Other provisions .....................................................................................................52 10 Abbreviations and terms ......................................................................................... 53 10.1 Abbreviations ..........................................................................................................53 10.2 Terms .....................................................................................................................55 11 Information to the document ................................................................................... 56 11.1 Document history ....................................................................................................56 11.2 Table of figures .......................................................................................................58 11.3 Table of tables ........................................................................................................58 11.4 References .............................................................................................................59 Classification: Public
Page 4 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 1 INTRODUCTION Preamble: The term Certificate Authority = CA is used for two different meanings: • The organisation, which is responsible for operating trustworthiness services; • The technical entity for issuing and revocation of electronic certificates. The following definitions are made to differentiate both meanings: • If the organisation is meant, then the term "Atos TrustedRoot CA" is used; • If the technical entity is meant then the full entity name "Atos TrustedRoot CA" is used, e.g. "Atos TrustedRoot Server CA". The Atos Trustcenter operates the Atos TrustedRoot CA and further trust services. This CPS document refers only to Atos TrustedRoot Issuing CA services. 1.1 Overview The Atos TrustedRoot CA operates certification services for issuing and managing publicly trusted certificates. In detail the Atos TrustedRoot CA operates the following certificate services: • Atos TrustedRoot Root CA service issuing - sub-ca certificates and - OCSP certificates; • Atos TrustedRoot Client CA services issuing - client certificates for authentication, encryption and/or secure e-mail and - OCSP certificates; • Atos TrustedRoot Server CA services issuing - server certificates for TLS and - OCSP certificates; • Atos TrustedRoot CodeSign CA services issuing - end entity certificates for code signing and - OCSP certificates; • Atos TrustedRoot TimeStamp CA services issuing - end entity certificates for time stamping and - OCSP certificates. Classification: Public
Page 5 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 Figure 1 End Entity Certificate Services The certificate of Atos TrustedRoot Root CA service is the trust anchor for the complete TrustedRoot certificate hierarchy in the Atos TrustedRoot CA. This policy document comprises the certificate policy and the certification practice statements for issuing of TrustedRoot end entity certificates issued by Atos TrustedRoot Issuing CAs. The following ETSI policies are considered: • The Atos TrustedRoot Client CA end entity certificates are issued following the policies NCP and OVCP (see [6]). • The Atos TrustedRoot Server CA end entity certificates are issued following the policies NCP, DVCP, OVCP and IVCP (see [6]). • The Atos TrustedRoot CodeSign CA end entity certificates are issued following the policies NCP and OVCP (see [6]). • The Atos TrustedRoot TimeStamp CA end entity certificates are issued following the policies NCP and OVCP (see [6]). This policy document is structured according to RFC 3647 (see [1]). Classification: Public
Page 6 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 1.2 Document name and identification Document Name Certification Practice Statements of Atos TrustedRoot Issuing CAs Document Version 2.4.0 The following Policy OIDs are administrated by Atos TrustedRoot CA: Atos TrustedRoot ID atos-trustedroot-id = 1.3.6.1.4.1.6189.5.1 iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) atos(6189) trustcenter(5) trusted-root(1) Atos TrustedRoot atos-trustedroot-cps-rootca-id = 1.3.6.1.4.1.6189.5.1.1.1.4 Root CA Policy atos-trustedroot-id policy-identifiers(1) cps(1) root-ca(4) Atos TrustedRoot atos-trustedroot-cps-clientca-id = 1.3.6.1.4.1.6189.5.1.1.1.1 Client CA SC Policy atos-trustedroot-id policy-identifiers(1) cps(1) client-ca(1) Atos TrustedRoot atos-trustedroot-cps-clientca-softpse-id = 1.3.6.1.4.1.6189.5.1.1.1.1.1 Client CA P12 Policy atos-trustedroot-id policy-identifiers(1) cps(1) client-ca(1) softpse(1) Atos TrustedRoot atos-trustedroot-cps-codesignca-id = 1.3.6.1.4.1.6189.5.1.1.1.2 CodeSign CA Policy atos-trustedroot-id policy-identifiers(1) cps(1) codesign-ca(2) Atos TrustedRoot atos-trustedroot-cps-serverca-id = 1.3.6.1.4.1.6189.5.1.1.1.3 Server CA Policy atos-trustedroot-id policy-identifiers(1) cps(1) server-ca(3) Atos TrustedRoot atos-trustedroot-cps-timestampca-id = 1.3.6.1.4.1.6189.5.1.1.1.5 TimeStamp CA Policy atos-trustedroot-id policy-identifiers(1) cps(1) timestamp-ca(5) The document history can be found in section 11.1. This document considers the relevant ETSI and CABF requirements: • ETSI EN 319 401: Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers [5]; • ETSI EN 319 411-1: Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 1: General requirements [6]; • CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly Trusted Certificates [7]. The standard ETSI EN 319 401 defines general requirements for a trust service provider (TSP). A TSP for certification services has to consider the requirements in standard ETSI EN 319 411-1. A TSP issuing publicly trusted certificates for webserver has in addition to consider the requirements in CABF baseline requirements. Classification: Public
Page 7 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 1.3 PKI participants 1.3.1 Certification authorities The Atos TrustedRoot CA operates all certification services of the Atos TrustedRoot hierarchy. This includes: • Atos TrustedRoot Root CAs; • Atos TrustedRoot Client CAs; • Atos TrustedRoot Server CAs; • Atos TrustedRoot CodeSign CAs; • Atos TrustedRoot TimeStamp CAs of sequent generations. The purpose of the Atos TrustedRoot Root CA is to issue CA certificates for itself and for all subordinated issuing CAs. The purpose of the Atos TrustedRoot Client CA is to issue end entity certificates for client authentication, encryption and secure e-mail. If in any subsequent section this document refers only to this CA, the corresponding section is marked with: [Client-CA]. The purpose of the Atos TrustedRoot Server CA is to issue end entity certificates for TLS server applications. If in any subsequent section this document refers only to this CA, the corresponding section is marked with: [Server-CA]. The purpose of the Atos TrustedRoot CodeSign CA is to issue end entity certificates for code signing. If in any subsequent section this document refers only to this CA, the corresponding section is marked with: [CodeSign-CA]. The purpose of the Atos TrustedRoot TimeStamp CA is to issue end entity certificates for time stamping. If in any subsequent section this document refers only to this CA, the corresponding section is marked with: [TimeStamp-CA]. In addition, each CA issues the OCSP certificates for signing of OCSP responses which belongs to certificates which this CA has issued. 1.3.2 Registration authorities The registration authorities (RA) perform the identification and authentication of end entity certificate applicants. Subordinate organizations within or a dedicated group of authorized employees of an external organization can act as a RA. [Client-CA], [CodeSign-CA], [Server-CA] In the case of issuing end entity certificates the Atos TrustedRoot CA handover the registration to customer specific registration authorities. The obligations and authorizations of the registration authority are defined in customer contracts (see section 9.6). The RA portals validates the entered data automatically against whitelists (see section 3.2). Acceptable values are defined in the customer agreement. [TimeStamp-CA] RA services are not performed by third parties. Classification: Public
Page 8 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 1.3.3 Subscriber The Atos TrustedRoot CA issues end entity certificates to natural person as certificate holder (subscriber). The subscriber is: [Client-CA], [CodeSign-CA] the certificate user, [Server-CA], [TimeStamp-CA] the person who controls the systems which uses the issued certificate. In any way the subscriber must belong to a customer which has a contract with Atos TrustedRoot CA for issuing of publicly trusted end entity certificates. 1.3.4 Relying parties The relying parties comprise all persons and systems, who or which rely on the trustworthiness of issued certificates and therefore have to check the status of the issued certificates. Relying parties include amongst others: • Certificate holder, • Business partner who are using the issued certificates in business processes. 1.3.5 Other participants No stipulation. 1.4 Certificate usage 1.4.1 Appropriate certificate uses The end entity certificates issued by Atos TrustedRoot Issuing CA services may be used according to the purpose they are issued for: [Client-CA] Authentication certificates on smart card for client authentication in applications, Encryption certificates on smart card for data and/or key encryption/decryption, SoftPSE certificates for authentication/verify and encrypt/decrypt of data and e-mails, [CodeSign-CA] Codesign certificates for signature/verify application (e.g. VB scripts, Java code, etc.), [Server-CA] TLS client/server certificates for TLS client and server authentication and transport channel encryption, [TimeStamp-CA] Timestamp certificates for signature/verify of timestamps. 1.4.2 Prohibited certificate uses The usage of end entity certificates is limited to the statements in section 1.4.1. It is not allowed to use these certificates for other purposes. Classification: Public
Page 9 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 1.5 Policy administration 1.5.1 Organization administering the document The Atos TrustedRoot CA is responsible to maintain this policy document. 1.5.2 Contact person Please use the following contact, if there are questions and/or comments to this policy document: Postal Address: Atos Information Technology GmbH Atos Trustcenter Lohberg 10 49716 Meppen Germany Web URL: https://pki.atos.net/trustcenter/en E-Mail address gmde-trustcenter@atos.net To report problems, service outages, private key compromise, potential certificate misuse, or other types of fraud or inappropriate conduct, or any other matter related to certificates the Trustcenter can be contacted 24x7 via contact formula on the Atos Trustcenter web page (https://pki.atos.net/trustcenter/en/contact/trustcenter). Choose “Report problem” under the field “Topic”. In the field “Message” a detailed description of the problem should be provided. At least the common name, certificate serial number and issuer of a certificate should be given. This document will be published according to section 2.2 after formal approval. 1.5.3 Person determining CPS suitability for the policy The policy requirements and the guidelines for practice statements are reviewed and approved by the Atos TrustedRoot CA. The TrustedRoot CA Service Manager is responsible for the review and the approval of this document. 1.5.4 CPS approval procedures As outlined in section 1.1 the Atos TrustedRoot CA services covered by this document follow the appropriate ETSI standards. The document on hand is the certification policy statement (CPS) describing the practices and procedures. The conformance of the present policy with the ETSI requirements is documented in every section of this document. The obligations of all external organizations supporting the Atos TrustedRoot CA services including the applicable policies and practices are identified in section 9.6. This CPS is made available to subscribers and relying parties together with other relevant documentation according to section 2.2. Other relevant documents are (1) General Terms and Conditions for Services of Atos SE, (2) Privacy Declaration of Atos SE and (3) Atos (TrustedRoot) Subscriber Agreement. Classification: Public
Page 10 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 Intended changes of the CPS are announced and the revised document is published after the appropriate approval is made. The Atos TrustedRoot CA has a high-level management body with final authority and responsibility for approving the certification practice statement. The approval process is repeated with every further change of the CPS. The TrustedRoot CA Service Manager is responsible for ensuring that the certification practices established to meet the applicable requirements specified in the present document are properly implemented. The Atos TrustedRoot CA defines a review process for certification practices including responsibilities for maintaining the certification practice statement. 1.6 Definitions and acronyms Terms, abbreviations and references are defined in section 10. Classification: Public
Page 11 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 2 PUBLICATION AND REPOSITORY RESPONSIBILITIES 2.1 Repositories The Atos TrustedRoot CA publishes issued end entity certificates and the appropriate CRLs in repositories. The repository maintains a LDAP/HTTP directory service and an OCSP Responder service. 2.1.1 Directory service The Atos TrustedRoot CA publishes end entity certificates and CRLs to the directory: • [Client-CA] Client certificates during its validity period if the subscriber has explicitly confirmed his agreement for certificate publication, • [CodeSign-CA] Codesign certificates if the subscriber has explicitly confirmed his agreement for certificate publication, • [Server-CA] Server certificates during its validity period if the subscriber has explicitly confirmed his agreement for certificate publication, • [TimeStamp-CA] Timestamp certificates during its validity period if the subscriber has explicitly confirmed his agreement for certificate publication, • CRLs issued by Atos TrustedRoot CA services (Root CA and Issuing CA). End entity certificates are published (if confirmed by the subscriber) to the LDAP directory service. Certificates are available for retrieval only in those cases for which the subject's consent has been obtained. CRLs are published to the HTTP and to the LDAP directory services. The published CRLs can be downloaded from the repository via HTTP or LDAP from the internet. The URLs for downloading of the CRL are included in the extension "CRL Distribution Point (CDP)" of the issued certificates. The directory services are publicly available 24 hours per day, 7 days per week. Upon system failure, service or other factors which are not under the control of Atos TrustedRoot CA, the Atos TrustedRoot CA applies best endeavours to ensure that this service is not unavailable for longer than 1 working day. 2.1.2 OCSP responder service The status of issued end entity certificates can be requested from the Atos TrustedRoot OCSP responder service. There is one common OCSP responder service for all Atos TrustedRoot CA services. Each Atos TrustedRoot CA service issues its own OCSP certificate for signing of OCSP responses. If the certificate status is requested of a certificate issued by a certain issuer, then the OCSP response will be signed with a private key which belongs to an OCSP certificate signed by the same issuer (Authorized OCSP according to RFC 6960 [3]). The OCSP response can include the following certificate status: "Good", "Revoked" or "Unknown". The appropriate URL of the OCSP responder service is included in the extension "Authority Information Access (AIA)" of the issued certificates. Classification: Public
Page 12 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 In case of errors, the OCSP responder returns an error message. The response "unauthorized" is returned in cases where the server is not capable of responding authoritatively (certificate issuer is unknown). The OCSP responder service is publicly available 24 hours per day, 7 days per week. Upon system failure or other factors, which are not under the control of Atos TrustedRoot CA, the Atos TrustedRoot CA applies best endeavors to ensure that this service is available as soon as possible. 2.2 Publication of certification information The Atos TrustedRoot CA publishes the relevant documentation on its publicly available web site. The documentation includes: (1) General Terms and Conditions for Services of Atos SE, (2) Privacy Declaration of Atos SE, (3) Atos Subscriber Agreement and (4) This CPS document. The CPS document includes the relevant clauses for the certificate policy (CP). There is no extra document available including the CP requirements. The web site of Atos TrustedRoot CA is publicly available 24 hours per day, 7 days per week. 2.2.1 Test sites [Server-CA] Special web sites are operated by Atos TrustedRoot CA for testing purposes. Developers can test already prepared web sites with valid, revoked and expired TLS server certificates. For this purpose, the following test web sites are available: • https://pki-expired.atos.net • https://pki-revoked.atos.net • https://pki-valid.atos.net Classification: Public
Page 13 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 2.3 Time or frequency of publication The time and frequency of the publication depends on the type of information. The next table gives an overview about the relevant information: Table 1: Published Information Information Frequency of issuance Time of Target of publication publication Atos TrustedRoot EE On request by the After download and • LDAP directory Certificates subscriber confirmation by the subscriber Atos TrustedRoot Root At least every 12 After generation of the • HTTP directory CA CRL months CRL • LDAP directory Atos TrustedRoot At least every 24 hours After generation of the • HTTP directory Issuing CA CRL CRL • LDAP directory General Terms and Update if required After document • Atos TC web site Conditions for Services approval by Atos of Atos SE Privacy Declaration of Update if required After document • Atos TC web site Atos SE approval by Atos Atos Subscriber Update if required After document • Atos TC web site Agreement approval by TrustedRoot CA Service Manager Document CPS Update if required or After document • Atos TC web site at least every 12 approval by months TrustedRoot CA Service Manager Classification: Public
Page 14 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 2.4 Access controls on repositories The access to the repositories is limited by appropriate access controls. The next table gives an overview about the access controls in place: Table 2: Access Controls for the Repositories Publication system Access for Access by Access control Web site of Atos TrustedRoot Create Web-Admin User Authentication CA Change Delete Read Unrestricted Anonymous HTTP Directory Service Create Certificate User Authentication Change Management System Delete Read Unrestricted Anonymous LDAP Directory Service Create Certificate User Authentication Change Management System Delete Read Unrestricted Anonymous OCSP Responder Service Create Certificate User Authentication Change Management System Delete OCSP request Unrestricted Anonymous Classification: Public
Page 15 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 3 IDENTICATION AND AUTHENTICATION This chapter describes identification and authentication of the subscriber. 3.1 Naming 3.1.1 Type of names The end entity certificates issued by Atos TrustedRoot CAs include the following attributes in subject name and/or subject alternative name. Table 3: Name attributes for EE certificates Abbreviation Mandatory/Optional Subject Name Components CN Mandatory Common Name [Server-CA] Optional SerialNumber Optional Unique number identifying the subscriber UID Optional Unique identifier identifying the subscriber E Optional E-mail address of the subscriber SN Optional Surname of the subscriber G Optional Given name of the subscriber OU Optional Organizational unit O Optional Organization L Optional Locality C Optional Country DNS Optional Fully qualified domain name of a server Rfc822Name Optional E-mail address of the subscriber UPN Optional User principal name of the subscriber The next tables give an overview about the used names for Atos TrustedRoot end entity certificates. Table 4: [Client-CA] Names for EE certificates Purpose Subject Name Components Client Authentication (Smart Card) CN Name of subscriber or functional mailbox SerialNumber subject identifier Client Encryption (Smart Card) UID subject identifier Client Authentication & Encryption E subscriber e-mail address (SoftPSE) G subscriber given name SN subscriber surname OU organizational unit O organization according CATS L locality according CATS C country according CATS Classification: Public
Page 16 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 Table 5: [CodeSign-CA] Names for EE certificates Purpose Subject Name Components Code Signing CN Code signing entity OU organizational unit O organization according CATS L locality according CATS C country according CATS Table 6: [Server-CA] Names for EE certificates Purpose Subject Name Components TLS Client/Server CN Server name OU organizational unit O organization according CATS L locality according CATS ST state according CATS C country according CATS DNS FQDN of the server (1 or more records) Table 7: [TimeStamp-CA] Names for EE certificates Purpose Subject Name Components Time Stamping CN Timestamp-SHA256- O Atos C DE 3.1.2 Need for names to be meaningful The attribute "Common Name" gives each end entity certificate a meaningful and user- friendly name. 3.1.3 Anonymity or pseudonymity of subscribers [Client-CA] The Atos TrustedRoot client certificates on smart card are issued to natural persons. The certificates do not include pseudonyms or other attributes for anonymization. The Atos TrustedRoot client certificates on SoftPSE are issued to legal persons. The certificates do not include pseudonyms or other attributes for anonymization. [CodeSign-CA] The Atos TrustedRoot codesign certificates are issued to natural persons. The certificates do not include pseudonyms or other attributes for anonymization. [Server-CA] The Atos TrustedRoot server certificates are issued to legal persons. The certificates do not include pseudonyms or other attributes for anonymization. Classification: Public
Page 17 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 [TimeStamp-CA] The Atos TrustedRoot timestamp certificates are issued to legal persons. The certificates do not include pseudonyms or other attributes for anonymization. 3.1.4 Rules for interpreting various name forms Not relevant. 3.1.5 Uniqueness of names The SubjectDN names are unique. The SubjectDN is clearly assigned to a specific entity. 3.1.6 Recognition, authentication, and the role of trademarks No stipulation. 3.2 Initial identity validation 3.2.1 Method to prove possession of private key [Client-CA] The private keys for client authentication certificates are generated by the subscriber. The proof of possession of the private keys is explicitly checked by the certificate management system (CMS). The CMS gets the certificate signing requests in form of PKCS#10 request files, which are signed with the appropriate private key. The CMS checks the signature of the PKCS#10 request. The private keys for client encryption or SoftPSE certificates are generated by the certificate management system (CMS). The proof of possession of the private keys is implicitly checked by the CMS. [CodeSign-CA] The private keys for code signing certificates are generated by the subscriber. The proof of possession of the private keys is explicitly checked by the certificate management system (CMS). The CMS gets the certificate signing requests in form of PKCS#10 request files, which are signed with the appropriate private key. The CMS checks the signature of the PKCS#10 request. [Server-CA] The private keys for server certificates are generated by the subscriber. The proof of possession of the private keys is explicitly checked by the certificate management system (CMS). The CMS gets the certificate signing requests in form of PKCS#10 request files, which are signed with the appropriate private key. The CMS checks the signature of the PKCS#10 request. [TimeStamp-CA] The private keys for time stamping are generated by the certificate management system (CMS). The proof of possession of the private keys is implicitly checked by the CMS. 3.2.2 Authentication of organization identity Atos TrustedRoot CA records all information necessary to verify the organization’s identity and, if applicable, any specific attributes including any reference number on the documentation used for verification and any limitations on its validity. [Client-CA], [CodeSign-CA], [Server-CA] Classification: Public
Page 18 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 The organization(s) for end entity certificates are defined in the CATS between Atos TrustedRoot CA and the customer. Atos TrustedRoot CA checks the existence of the organization of the contracting party against an excerpt from the commercial register (certificate of registration, in Germany: Handelsregisterauszug). The registered organizations will be implemented in a customer specific whitelist. The RA portal will not accept any organization names in certificate requests of the customer, which are not included in the customer specific whitelist. [Client-CA], [Server-CA] The customer DNS or e-mail domain for client certificates are defined in the CATS between Atos TrustedRoot CA and the customer. Atos TrustedRoot CA checks the registration of this domain against publicly WHOIS-services as part of each certificate issuance process. If the domain was not validated within the last 395 days or if the last WHOIS-request got changed registration data compared with the WHOIS-request before, then the domain will be validated with one of the following methods according to CABF baseline requirements [7]: (1) Confirming the applicants control over the domain is checked by confirming the presence of a random value (unique and valid for authorization for 30 days) in the DNS TXT record of the DNS domain; or (2) Confirm the applicants control over the domain by sending an e-mail to one e- mail address created by using 'admin', 'administrator', 'webmaster', 'hostmaster' or 'postmaster' as the local part, followed by the @-sign, followed by the domain. The e-mail includes a random value and a link for response. (3) Confirming the applicants control over the domain using the ACME HTTP Challenge method defined in section 8.3 of RFC 8555 and CABF Section 3.2.2.4.19. The registered domain(s) will be implemented in a customer specific whitelist. The RA portal will not accept any domain in certificate requests of the customer, which is not included in the customer specific whitelist. [Server-CA] Atos TrustedRoot CA will check the Certificate Authority Authorization (CAA) records for certificate application. The check will be done for each FQDN and wildcard domain names specified in the request, according to the procedure in RFC 8659 [4]. Atos TrustedRoot CA will use the CAA record “atos.net“ as permission for issuing certificates. [TimeStamp-CA] The organization of Atos TrustedRoot time stamping certificates is always "Atos", the organization Atos TrustedRoot CA belongs to. It is not allowed to issue Atos TrustedRoot time stamping certificates to another organization. Classification: Public
Page 19 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 3.2.3 Authentication of individual identity Atos TrustedRoot CA records all information necessary to verify the individual’s identity and, if applicable, any specific attributes including any reference number on the documentation used for verification and any limitations on its validity. [Client-CA] The data of persons (individuals) are delivered by customer specific databases (e.g. Active Directory). The data source for personnel data is defined in the CATS between Atos TrustedRoot CA and the customer. The customer has the obligation to deliver validated personnel data. In addition, the e-mail address of the applicant (if provided) will be checked: The subscriber has to logon to the RA portal as part of the certificate acceptance procedure. Before starting the issuance process, an e-mail will be sent to the subscriber’s e-mail address, which will be included in the certificate. This e-mail contains a second factor which must be entered into the RA portal by the subscriber. This process ensures that the subscriber has the control over the provided e-mail address. [CodeSign-CA], [Server-CA], [TimeStamp-CA] Not relevant. 3.2.4 Non-verified subscriber information Not relevant. 3.2.5 Validation of authority [Client-CA], [CodeSign-CA], [Server-CA] The CATS between Atos TrustedRoot CA and the customer defines amongst others: (1) The names of customer representatives(s) for administrative purposes (customer administrator) and (2) How employees of the customer shall be authorized to RA portal (e.g. group membership). Afterwards, the employees of the customer have the following ways to get authorized access to the RA portal: (a) Logon to the RA portal via the pre-defined administrator account(s). The customer has the obligation that only the named administrators can logon with these accounts. (b) Logon to the RA portal by customer employees, who get the authorization for RA portal by the membership in the pre-defined group (e.g. in Active Directory). [TimeStamp-CA] The subscriber for time stamping certificates gets the authorization through the role description of the Atos TrustedRoot CA. The subscriber is personally known to Atos TrustedRoot CA staff. 3.2.6 Criteria for interoperation No stipulation. Classification: Public
Page 20 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 3.3 Identification and authentication for re-key requests 3.3.1 Identification and authentication for routine re-key The identity validation for renewal of end entity certificates will be processed in the same way like for initial certificate issuance. (see section 4.7) 3.3.2 Identification and authentication for re-key after revocation The identity validation for renewal of end entity certificates will be processed in the same way like for initial certificate issuance. (see section 4.7) 3.4 Identification and authentication for revocation request The Atos TrustedRoot CA performs the following checks for identification and authentication of certificate revocation requests: • Revocation request is digitally signed; • Revocation request is authorized with the revocation passphrase, which was agreed in CATS; • Requester appears in person and can be identified as the subject belonging to the certificate which shall be revoked. The identification follows the requirements as described for the initial identity validation for natural persons; • Requester is a member of the Atos TrustedRoot CA and is informed about the circumstances which are specified in section 4.9.1 • The customer administrators according to CATS have the authorization to revoke the end entity certificates of the organization they are working for. • In addition, if defined in CATS the customer delivers daily a list of closed user accounts. The RA portal uses these lists for certificate revocation of the closed user accounts. Classification: Public
Page 21 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 4 CERTIFICATE LIFE-CYCLE OPERATIONAL REQUIREMENTS 4.1 Certificate application 4.1.1 Who can submit a certificate application? [Client-CA], [CodeSign-CA], [Server-CA] The authorized persons for certificate application are defined in the Customer Agreement for Trustcenter Services (CATS). [Client-CA] The authorized person logon to the RA portal with customer domain accounts. They get their right for certificate application through membership in the appropriate Trustcenter group. [CodeSign-CA], [Server-CA] The authorized person can logon to the RA portal on two ways. In CATS is defined, which way is applicable for a designated customer: (1) Logon with customer domain accounts. The persons get their right for certificate application through membership in the appropriate Trustcenter group. (2) Logon with RA portal user accounts. The accounts are defined in CATS. [TimeStamp-CA] Certificates for time stamping are requested by Atos Trustcenter administrators. These persons have personal accounts on the Trustcenter certificate management system. 4.1.2 Enrollment process and responsibilities Before entering into a contractual relationship with a subscriber, the Atos TrustedRoot CA informs the subscriber about the policy for certificate issuance, usage and management. The related documents “Subscriber Agreement” and this CPS can be downloaded in the certificate application process from Atos RA portal. The subscriber has to agree that he has read and understood the policy before he can request a certificate. The subscriber's obligations are defined in section 9.6 of this CPS document. The provisions for data privacy are defined in section 9.4. [Client-CA] Each employee of the customer is responsible to request his own certificates. [CodeSign-CA], [Server-CA] In CATS is defined, who can request certificates from Atos RA portal. [TimeStamp-CA] Atos Trustcenter administrators are responsible for certificate requests of time stamping services. Classification: Public
Page 22 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 4.1.2.1 Key generation [Client-CA] The keys for authentication purposes are generated by the applicant (customer). The provisions in section 6.1 shall be considered. The keys for encryption purposes are generated by the Atos Trustcenter in a controlled and secured environment. [CodeSign-CA], [Server-CA] The keys for code signing and server certificates are generated by the applicant (customer). The provisions in section 6.1 shall be considered. [TimeStamp-CA] The keys for time stamping services are generated by the Atos Trustcenter in a controlled and secured environment. 4.1.2.2 Certificate application [Client-CA] The application process is controlled by the RA portal. Authentication certificates are requested via PKCS#10 request. Encryption certificates are requested via PKCS#12 requests. The requests are generated by the RA portal. [CodeSign-CA], [Server-CA] The applicant generates the key and the certificate signing request (CSR) in advance of the certificate request process. The resulting CSR will be inserted into the RA portal forms via copy & paste. [TimeStamp-CA] Time stamping certificates are requested via PKCS#10 requests. The request is generated by the Trustcenter management system. 4.2 Certificate application processing 4.2.1 Performing identification and authentication functions [Client-CA], [Server-CA], [CodeSign-CA] The applicant will be identified and authenticated in the Atos RA portal. [TimeStamp-CA] The applicant will be identified and authenticated in the Atos TrustedRoot CA certificate management system. 4.2.2 Approval or rejection of certificate applications [Client-CA], [CodeSign-CA] The attribute organisation will be checked via whitelist. The acceptable value(s) are defined in CATS. The attribute e-mail address will be checked via whitelist. The acceptable mail domains are defined in CATS. Classification: Public
Page 23 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 [Server-CA] The attribute(s) FQDN will be checked via whitelist. The acceptable DNS domains are defined in CATS. In addition, there is a DNS domain validation to check, if the customer can manage the appropriate DNS domain (see section 3.2.2). The attribute organization will be checked via whitelist. The acceptable value(s) are defined in CATS. [TimeStamp-CA] The attributes organisation and country are fix and cannot be changed by the applicant. If the automatic checks are not fulfilled, then the applicant has two possibilities: (1) The Atos TA portal offers values for substitution according to CATS. The applicant can agree for substitution and afterwards continue the process. (2) The applicant can break the certificate request process. 4.2.3 Time to process certificate applications [Client-CA], [CodeSign-CA], [TimeStamp-CA] Certificates are issued automatically. There is no waiting time between certificate application and certificate issuance. [Server-CA] Certificates have to be DNS domain validated. The methods for domain validation lead to a waiting time up to a maximum of 2 weeks. If the domain validation could not be completed within 2 weeks the certificate request will be rejected. 4.3 Certificate issuance 4.3.1 CA actions during certificate issuance The certificates are issued automatically if the prerequisites are fulfilled. The Atos TrustedRoot CA will not issue certificates whose lifetime exceeds the lifetime of the signing CA certificate. 4.3.2 Notification to subscriber by the CA of issuance of certificate [Client-CA], [CodeSign-CA], [Server-CA] The applicant will be informed about certificate issuance via e-mail. [TimeStamp-CA] Not relevant. Classification: Public
Page 24 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 4.4 Certificate acceptance 4.4.1 Conduct constituting certificate acceptance [Client-CA] If the applicant has requested an encryption certificate with central key generation then the PKCS#12 token will be automatically downloaded and written on the applicant's smart card. In addition, the PKCS#12 token can be downloaded from the Atos RA Portal. In this case the token password is sent to the applicant via encrypted e-mail. If the applicant has requested an authentication certificate with de-central key generation then the certificate will be automatically downloaded and written on the applicant's smart card. If the applicant has request a SoftPSE with central key generation then the issued PKCS#12 token can be downloaded from the Atos RA Portal. The token password is sent to the applicant via e-mail. Transport channels for delivery of PKCS#12 token and the password are separated. [Server-CA], [CodeSign-CA] Certificates can be downloaded by the applicant from the Atos RA Portal. [TimeStamp-CA] Certificates can be downloaded directly after issuance in the certificate management system. 4.4.2 Publication of the certificate by the CA [Client-CA] Client certificates are published to customer directory if publication is defined in CATS. [Server-CA] Pre-certificates are published for transparency purposes to appropriate CT log server. The pre-certificates can be reviewed and downloaded via web site https://crt.sh/ . [TimeStamp-CA], [CodeSign-CA] Certificates are not published. 4.4.3 Notification of certificate issuance by the CA to other entities No stipulation. Classification: Public
Page 25 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 4.5 Key pair and certificate usage 4.5.1 Subscriber private key and certificate usage The end entity keys and certificates issued by Atos TrustedRoot Issuing CA services may be used according to the purpose they are issued for (see also section 1.4): [Client-CA] Authentication keys/certificates on smart card for client authentication in applications, Encryption keys/certificates on smart card for data and/or key encryption/decryption, SoftPSE keys/certificates for authentication/verify and encrypt/decrypt of data and e- mails, [CodeSign-CA] Codesign keys/certificates for signature/verify application (e.g. VB scripts, Java code, etc.), [Server-CA] TLS client/server keys/certificates for TLS client and server authentication and transport channel encryption, [TimeStamp-CA] Timestamp keys/certificates for signature/verify of timestamps. 4.5.2 Relying party public key and certificate usage Relying parties can use the public keys and the certificates for checking of certificate reliability. Relying parties shall verify that the used end-entity certificate has a CA certificate chain which ends at a trusted Root CA certificate and that every certificate in the chain is neither expired nor revoked. 4.6 Certificate renewal 4.6.1 Circumstance for certificate renewal [Client-CA], [CodeSign-CA], [TimeStamp-CA] Certificate renewal with a key, which is already in use, is not supported. [Server-CA] Certificate renewal with a key, which is already in use, is supported if the cryptographic security of subject's previously certified public key is still sufficient for the new certificate's validity period and no indications exist that the subject's private key has been compromised nor that the certificate has been revoked due to any other reason. 4.6.2 Who may request renewal [Client-CA], [CodeSign-CA], [TimeStamp-CA] Not relevant. [Server-CA] The provisions made in section 4.1 shall apply. Classification: Public
Page 26 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 4.6.3 Processing certificate renewal requests [Client-CA], [CodeSign-CA], [TimeStamp-CA] Not relevant. [Server-CA] The provisions made in section 4.2 shall apply. 4.6.4 Notification of new certificate issuance to subscriber [Client-CA], [CodeSign-CA], [TimeStamp-CA] Not relevant. [Server-CA] The provisions made in section 4.3 shall apply. 4.6.5 Conduct constituting acceptance of a renewal certificate [Client-CA], [CodeSign-CA], [TimeStamp-CA] Not relevant. [Server-CA] The provisions made in section 4.4 shall apply. 4.6.6 Publication of the renewal certificate by the CA The provisions made in section 4.4.2 shall apply. 4.6.7 Notification of certificate issuance by the CA to other entities No stipulation. 4.7 Certificate re-key 4.7.1 Circumstance for certificate re-key Certificate renewal with a new key is allowed for any end entity certificate issued by Atos TrustedRoot CA. 4.7.2 Who may request certification of a new public key? The provisions made in section 4.1 shall apply. 4.7.3 Processing certificate re-keying requests The provisions made in section 4.2 shall apply. 4.7.4 Notification of new certificate issuance to subscriber The provisions made in section 4.3 shall apply. 4.7.5 Conduct constituting acceptance of a re-keyed certificate The provisions made in section 4.4 shall apply. 4.7.6 Publication of the re-keyed certificate by the CA The provisions made in section 4.4 shall apply. Classification: Public
Page 27 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 4.7.7 Notification of certificate issuance by the CA to other entities No stipulation. 4.8 Certificate modification Certificate modification without re-keying is not supported. If any information given in the certificate is no longer valid then a new certificate with re-keying shall be issued. The provisions in section 4.1 shall apply. 4.8.1 Circumstance for certificate modification No stipulation. 4.8.2 Who may request certificate modification? No stipulation. 4.8.3 Processing certificate modification requests No stipulation. 4.8.4 Notification of new certificate issuance to subscriber No stipulation. 4.8.5 Conduct constituting acceptance of modified certificate No stipulation. 4.8.6 Publication of the modified certificate by the CA No stipulation. 4.8.7 Notification of certificate issuance by the CA to other No stipulation. Classification: Public
Page 28 of 59 Atos TrustedRoot CA ATC TR Version: 2.4.0 Issuing CA - CPS Release: 07.04.2021 4.9 Certificate revocation and suspension 4.9.1 Circumstances for revocation Reasons for revocation of end entity certificates are: a) The subscriber requests revocation in written form; b) The subscriber notifies the Atos TrustedRoot CA that the original certificate request was not authorized; c) The Atos TrustedRoot CA obtains evidence that the private key was compromised; d) The Atos TrustedRoot CA obtains evidence that the validation of domain authorization or control for any FQDN or IP address in the certificate cannot be relied; e) The issued certificate no longer complies with the requirements of section 6.1; f) The Atos TrustedRoot CA obtains evidence that the certificate was misused; g) The Atos TrustedRoot CA is made aware that a subscriber has violated one or more of its material obligations under the subscriber agreement or terms of use; h) The Atos TrustedRoot CA is made aware of any circumstance indicating that use of a FQDN or IP address in the certificate is no longer legally permitted; i) The Atos TrustedRoot CA is made aware that a wildcard certificate has been used to authenticate a fraudulently misleading subordinate FQDN; j) The Atos TrustedRoot CA is made aware of a material change in the information contained in the certificate; k) The Atos TrustedRoot CA is made aware that the certificate was not issued in accordance with the CA's CP/CPS; l) The Atos TrustedRoot CA determines or is made aware that any of the information appearing in the certificate is inaccurate; m) The Atos TrustedRoot CA's right to issue certificates under this CP/CPS expires or is revoked or terminated, unless the CA has planned to continue maintaining the CRL/OCSP repository; n) Revocation is required by the CA's CP/CPS; o) The Atos TrustedRoot CA is made aware of a demonstrated or proven method that exposes the subscriber's private key to compromise, methods have been developed that can easily calculate it based on the public key (such as a Debian weak key, see http://wiki.debian.org/SSLkeys), or if there is clear evidence that the specific method used to generate the private key was flawed. 4.9.2 Who can request revocation The following person are authorized to request a certificate revocation of Atos TrustedRoot end entity certificates: • The subscriber can request the revocation of the certificates he is responsible for. • In CATS is one or more responsible person for certificate revocation of the contracting party defined. These persons (customer administrator) can request the revocation of all certificates issued to this contracting party. • TrustedRoot CA Service Manager as the subscriber of Atos TrustedRoot CA system certificates can request the revocation of one or more if a reason according section 4.9.1 is existent. Classification: Public
You can also read