Skip to main content

claimSigning Extended Key Usage (EKU)
draft-king-pkix-claimsigning-extn-03

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Chris Louden , Dave Silver , Matt King , Matt Tebo , Patrick Patterson , Wendy Brown
Last updated 2012-06-29 (Latest revision 2011-12-27)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document specifies an Extended Key Usage (EKU) value which indicates that the certificate holder is authorized to sign security tokens to assert claims, or attributes, about a subject. When a certificate that asserts the claimSigning EKU signs a claim, the owner of the service holding that certificate is asserting that a statement about the subject is true. For example, a IdP secure token service (STS) would use an X.509 certificate containing the claimSigning EKU to sign SAML assertions containing an identifier and attributes about a user. This EKU value would allow for a separation between the designation that a given Identity belongs within a given Federation, and the empowerment of that entity within the federation to sign claims.. This approach allows for greater flexibility for the operators of Federated systems and for Certification Authorities and avoids the overloading of other, already established methods (such as Assurance Level designation via certificatePolicy OID).

Authors

Chris Louden
Dave Silver
Matt King
Matt Tebo
Patrick Patterson
Wendy Brown

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)