@misc{rfc7711, series = {Request for Comments}, number = 7711, howpublished = {RFC 7711}, publisher = {RFC Editor}, doi = {10.17487/RFC7711}, url = {https://www.rfc-editor.org/info/rfc7711}, author = {Matthew A. Miller and Peter Saint-Andre}, title = {{PKIX over Secure HTTP (POSH)}}, pagetotal = 18, year = 2015, month = nov, abstract = {Experience has shown that it is difficult to deploy proper PKIX certificates for Transport Layer Security (TLS) in multi-tenanted environments. As a result, domains hosted in such environments often deploy applications using certificates that identify the hosting service, not the hosted domain. Such deployments force end users and peer services to accept a certificate with an improper identifier, resulting in degraded security. This document defines methods that make it easier to deploy certificates for proper server identity checking in non-HTTP application protocols. Although these methods were developed for use in the Extensible Messaging and Presence Protocol (XMPP) as a Domain Name Association (DNA) prooftype, they might also be usable in other non-HTTP application protocols.}, }