4. OPERATIONAL REQUIREMENTS

4.1. Certificate Application

In order to apply for a certificate, the following steps need to be undertaken:

  1. A requester generates its own key pair and submits the public key and other required data to the RA. (See Section 6.1.1 and Section 6.1.3).

4.2. Certificate Issuance

In order to issue a certificate, the following steps need to be undertaken:

  1. RA verifies whether the requester qualifies for the certificate.

  2. RA verifies the identity of the requester as indicated in Section 3.1.

  3. RA validates the prove of possession of private key using procedures indicated in Section 3.1.7.

  4. When the certificate request does not contain an email address, RA registers the email address to which the subscriber wants the certificate issuance notification to be sent.

  5. RA sends the digitally signed certificate request to the CA.

  6. On receipt of a certificate request, the CA will verify the RA's signature and issue a certificate.

    The requester is notified via email to the address included in the certificate or to the address registered by the RA.

4.3. Certificate Acceptance

The certificate is assumed to be accepted unless its requester explicitly rejects it in an authenticated communication with the CA.

4.4. Certificate Suspension and Revocation

4.5. Security Audit Procedures

4.6. Records Archival

4.7. Key changeover

The CESNET CA's keys SHOULD be changed while sufficient validity time remains on the existing keys to allow uninterrupted validity of all subordinate keys. The following steps SHOULD be undertaken when changing the CESNET CA's keys:

  1. A new CESNET CA key is generated and self signed certificate issued.

  2. The old key is signed by the new one.

  3. The new key is signed by the old one.

  4. All the newly issued certificates are published.

4.8. Compromise and Disaster Recovery

4.9. CA Termination