3. IDENTIFICATION AND AUTHENTICATION

3.1. Initial Registration

3.1.1. Types of names

The CESNET CA assigns each entity a X.501 Distinguished Name (DN, see X.501) which serves as a unique identifier of the entity. The DN is inserted in the subject field of the certificate(s) issued to the entity to bind the entity to the certificate(s). The DN MUST be a non-empty printableString.

All end entity DNs in certificates issued under this CPS SHALL start with invariable part identifying the CA (O=CESNET). The following variable part can consists of the optional RDN indicating the organization which the subscriber is affiliated to (O=name of the organization, see Section 3.1.1.4) followed by the subscriber's common name (CN=subscriber's name, see Section 3.1.1.3). The structure od the variable part of the DN MAY be defined by the relevant CP.

The naming attributes of the subscriber to be requested to identify and authenticate the requester depend on the type of certificate that the subscriber requires. The choice of the types and format of names used in the fields of the certificate is conforming to RFC 2459.

Following naming attributes MAY be used in entities' Distinguished Names. In the case where the applicable CP states the rules for constructing the DN, the rules required by the CP take precedence over this CPS.

3.2. Routine Rekey

The identification and authentication for routine rekey may be accomplished either with the same procedure as for Section 3.1 or using digitally signed requests sent to the CA before certificate expiration.

In case where the certificate to be reissued contains the name of a certain organization, new legal documents as indicated in Section 3.1.8 must be presented before rekeying.

3.3. Rekey after Revocation

A rekey after a revocation without a key compromise is handled as a routine rekey (see Section 3.2).

A public key whose certificate has been revoked for private key compromise MUST NOT be re-certified.

3.4. Revocation Request

Revocation requests are authenticated either by procedures described in Section 3.1.9 or by verifying the digital signature of the revocation request made by a valid certificate under the corresponding CP.