mirror of
https://github.com/outbackdingo/labca.git
synced 2026-01-27 10:19:34 +00:00
172 lines
9.3 KiB
HTML
172 lines
9.3 KiB
HTML
<!DOCTYPE html>
|
|
<html lang="en">
|
|
<head>
|
|
<meta charset="utf-8">
|
|
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
|
<meta name="viewport" content="width=device-width, initial-scale=1">
|
|
<meta name="description" content="LabCA is a private Certificate Authority for internal (intranet) use, based on the open source ACME Automated Certificate Management Environment implementation from Let's Encrypt (tm).">
|
|
<meta name="keywords" content="LabCA PKI CA Certificate Authority ACME Boulder">
|
|
<meta name="author" content="Arjan Hakkesteegt">
|
|
|
|
<title>CPS | LabCA</title>
|
|
|
|
<link href="../css/bootstrap.min.css" rel="stylesheet">
|
|
<link href="../css/sb-admin-2.min.css" rel="stylesheet">
|
|
<link href="../css/font-awesome.min.css" rel="stylesheet" type="text/css">
|
|
<link href="../css/labca.css" rel="stylesheet">
|
|
<link rel="icon" type="image/png" href="../img/fav-public.png">
|
|
</head>
|
|
|
|
<body>
|
|
<div id="wrapper">
|
|
<nav class="navbar navbar-default navbar-static-top" role="navigation" style="margin-bottom: 0">
|
|
<div class="navbar-header">
|
|
<button type="button" class="navbar-toggle" data-toggle="collapse" data-target=".navbar-collapse">
|
|
<span class="sr-only">Toggle navigation</span>
|
|
<span class="icon-bar"></span>
|
|
<span class="icon-bar"></span>
|
|
<span class="icon-bar"></span>
|
|
</button>
|
|
<a class="navbar-brand" href="/"><!-- BEGIN WEBTITLE -->LabCA<!-- END WEBTITLE --></a>
|
|
</div>
|
|
|
|
<ul class="nav navbar-top-links navbar-right">
|
|
<li title="Login to Admin Area"><a href="/admin/"><i class="fa fa-user fa-fw admin-login"></i></a>
|
|
</li>
|
|
</ul>
|
|
|
|
<div class="navbar-default sidebar" role="navigation">
|
|
<div class="sidebar-nav navbar-collapse">
|
|
<ul class="nav" id="side-menu">
|
|
<li><a class="public" href="/"><i class="fa fa-home fa-fw"></i> Home</a>
|
|
</li>
|
|
<li><a class="public" href="/certs/index.html"><i class="fa fa-download fa-fw"></i> Certificates</a>
|
|
</li>
|
|
<li><a class="public" href="/cps/index.html" title="Certification Practice Statement"><i class="fa fa-book fa-fw"></i> CPS</a>
|
|
</li>
|
|
<li><a class="public" href="/terms/v1" title="Usage Terms"><i class="fa fa-edit fa-fw"></i> Terms</a>
|
|
</li>
|
|
</ul>
|
|
</div>
|
|
</div>
|
|
</nav>
|
|
|
|
<div id="page-wrapper">
|
|
<div class="row">
|
|
<div class="col-lg-12">
|
|
<h1 class="page-header">Certification Practice Statement</h1>
|
|
<p><strong>1. Introduction</strong></p>
|
|
<p>
|
|
This Certification Practice Statement ("CPS") document outlines the certification services practices for this
|
|
particular instance running the LabCA software. PKI (Public Key Infrastructure) services include, but are not limited to, issuing, managing,
|
|
validating, revoking, and renewing Certificates. The services are provided for <!-- BEGIN PKI_COMPANY_NAME -->PKI_COMPANY_NAME<!-- END PKI_COMPANY_NAME --> internal use only.
|
|
</p>
|
|
<p>The following Certification Authorities are covered under this CPS:</p>
|
|
<table class="table table-striped table-bordered">
|
|
<thead><tr>
|
|
<th>CA Type</th>
|
|
<th>Distinguished Name</th>
|
|
<th>SHA-256 Key Fingerprint</th>
|
|
<th>Validity Period</th>
|
|
</tr></thead>
|
|
<tbody><tr>
|
|
<td>Root CA</td>
|
|
<td><!-- BEGIN PKI_ROOT_DN -->PKI_ROOT_DN<!-- END PKI_ROOT_DN --></td>
|
|
<td><!-- BEGIN PKI_ROOT_FINGERPRINT -->PKI_ROOT_FINGERPRINT<!-- END PKI_ROOT_FINGERPRINT --></td>
|
|
<td><!-- BEGIN PKI_ROOT_VALIDITY -->PKI_ROOT_VALIDITY<!-- END PKI_ROOT_VALIDITY --></td>
|
|
</tr></tbody>
|
|
</table>
|
|
<p>
|
|
Certificates issued by this PKI can be used only to establish secure online communication between hosts (as
|
|
identified by the FQDN provided in the Certificate) and clients using the TLS protocol. A Certificate only represents
|
|
that the information contained in it was verified as reasonably correct when the Certificate was issued.
|
|
</p>
|
|
<p>
|
|
Certificates may not be used for any application requiring fail-safe performance, providing financial services,
|
|
facilitating interference with encrypted communications or violating laws or regulations.
|
|
</p>
|
|
<p>
|
|
Relying Parties should verify the validity of certificates via CRL or OCSP prior to relying on certificates. CRL and
|
|
OCSP location information is provided within certificates.
|
|
</p>
|
|
|
|
<p class="caption"><strong>2. Publication and Repository</strong></p>
|
|
<p>This CPS is published at <!-- BEGIN LABCA_CPS_LOCATION --><a class="public" href="[LABCA_CPS_LOCATION]">[LABCA_CPS_LOCATION]</a><!-- END LABCA_CPS_LOCATION --></p>
|
|
<p>
|
|
Records of root and intermediate certificates, including those that have been revoked, are available at
|
|
<!-- BEGIN LABCA_CERTS_LOCATION --><a class="public" href="[LABCA_CERTS_LOCATION]">[LABCA_CERTS_LOCATION]</a><!-- END LABCA_CERTS_LOCATION -->
|
|
</p>
|
|
<p>
|
|
<!-- BEGIN WEBTITLE -->LabCA<!-- END WEBTITLE --> certificates contain URLs to locations where certificate-related information is published, including
|
|
revocation information via OCSP and/or CRLs.
|
|
</p>
|
|
|
|
<p class="caption"><strong>3. Identification and Authentication</strong></p>
|
|
<p>
|
|
<!-- BEGIN WEBTITLE -->LabCA<!-- END WEBTITLE --> certificates include a "Subject" field which identifies the subject entity (i.e. organization or domain). The
|
|
subject entity is identified using a distinguished name.
|
|
</p>
|
|
<p>
|
|
<!-- BEGIN WEBTITLE -->LabCA<!-- END WEBTITLE --> certificates include an "Issuer" field which identifies the issuing entity. The issuing entity is identified
|
|
using a distinguished name.
|
|
</p>
|
|
|
|
<p class="caption"><strong>4. Certificate Life-Cycle Operational Requirements</strong></p>
|
|
<p>
|
|
Anyone associated with <!-- BEGIN PKI_COMPANY_NAME -->PKI_COMPANY_NAME<!-- END PKI_COMPANY_NAME --> may submit an application for a certificate via the ACME protocol. Issuance
|
|
will depend on proper validation and compliance with this PKI's policies. End-entity certificates are made available
|
|
to Subscribers via the ACME protocol as soon after issuance as reasonably possible.
|
|
</p>
|
|
<p>
|
|
Subscribers are obligated to generate Key Pairs using reasonably trustworthy systems and to take reasonable measures
|
|
to protect their Private Keys from unauthorized use or disclosure.
|
|
</p>
|
|
<p>
|
|
Relying Parties must fully evaluate the context in which they are relying on certificates and the information
|
|
contained in them, and decide to what extent the risk of reliance is acceptable. If the risk of relying on a
|
|
certificate is determined to be unacceptable, then Relying Parties should not use the certificate or should obtain
|
|
additional assurances before using the certificate.
|
|
</p>
|
|
<p>
|
|
Relying Parties ignoring certificate expiration, revocation data provided via OCSP or CRL, or other pertinent
|
|
information do so at their own risk.
|
|
</p>
|
|
<p>Certificate revocation permanently ends the certificate's operational period prior to its stated validity period.</p>
|
|
|
|
<p class="caption"><strong>5. Facilities, Management, and Operational Controls</strong></p>
|
|
<p>Operating this PKI is under full responsibility of <!-- BEGIN PKI_COMPANY_NAME -->PKI_COMPANY_NAME<!-- END PKI_COMPANY_NAME -->.</p>
|
|
|
|
<p class="caption"><strong>6. Technical Security Controls</strong></p>
|
|
<p>
|
|
<!-- BEGIN WEBTITLE -->LabCA<!-- END WEBTITLE --> is <strong>not</strong> using a Hardware Security Module (HSM) for storing CA private keys.
|
|
<!-- BEGIN WEBTITLE -->LabCA<!-- END WEBTITLE --> is intended to be used in a lab or intranet environment with sufficient protection against
|
|
bad actors. It may not be used as publicly accessible PKI instance.
|
|
</p>
|
|
|
|
<p class="caption"><strong>7. Certificate, CRL, and OCSP Profile</strong></p>
|
|
<p>Any requirements or policies regarding Certificates, CRLs and OCSP are at full discretion of <!-- BEGIN PKI_COMPANY_NAME -->PKI_COMPANY_NAME<!-- END PKI_COMPANY_NAME -->.</p>
|
|
|
|
<p class="caption"><strong>8. Compliance audit</strong></p>
|
|
<p>Not applicable.</p>
|
|
|
|
<p class="caption"><strong>9. Other Business and Legal Matters</strong></p>
|
|
<p>
|
|
LabCA CERTIFICATES AND SERVICES ARE PROVIDED "AS-IS". LabCA DISCLAIMS ANY AND ALL WARRANTIES OF ANY TYPE AND DOES
|
|
NOT ACCEPT ANY LIABILITY.
|
|
</p>
|
|
<p>EACH USER AFFIRMATIVELY AND EXPRESSLY WAIVES THE RIGHT TO HOLD LabCA RESPONSIBLE IN ANY WAY.</p>
|
|
|
|
<p> </p>
|
|
</div>
|
|
</div>
|
|
</div>
|
|
</div>
|
|
|
|
<script src="../js/jquery.min.js"></script>
|
|
<script src="../js/bootstrap.min.js"></script>
|
|
<script src="../js/metisMenu.min.js"></script>
|
|
<script src="../js/sb-admin-2.min.js"></script>
|
|
<script src="../js/labca.js"></script>
|
|
</body>
|
|
</html>
|