Dashboard > openOSI Object Identifier name space > ... > >
  openOSI Object Identifier name space Log In   View a printable version of the current page.
Added by Jose REMY, last edited by Jose REMY on Sep 17, 2007

( DESC 'intermediate' )

Intermediate certification practices statement of class 3

 This object identifier (OID) describes our intermediate certification practices statement of class 2.

ASN1 notation: {iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) openosi(27630) cps(1) intermediate(3)}
URN notation: urn:oid:
IETF DOT notation:
BNF notation (RFC822 Backus-Naur form): ( DESC 'intermediate' )
Description:  Intermediate certification practices statement of class 3 - INTERMEDIATE

Class3 Certification authority (CA) identification - "openosiCA3-EU"

openosiCA3-EU issues class 3 certificates with DN ( Distinguished Names) complying with DC scheme, that is using dc components instead of classical Organisation (o) and Country (c) components. This certificate practice statement (CPS) with OID defines an INTERMEDIATE security framework for open source authentication of end entities. This OID is embedded in certificates issued by "openosiCA3-EU" which is a root certification authority; notably, "openosiCA3-EU" signs the certificate of the "openosiCA1-DC, openosiCA2-DC, and openosiCA3-DC' certification authorities, therefore subordinated to openosiCA3-EU.

The openOSI INTERMEDIATE certificate policy defines our set of rules for usage, extended usage, enrollment and issuance procedures, as well as corresponding liability issues of openosi class3 certificates. Our INTERMEDIATE certificate policy is independent of the certified entity (Virtual person, Host or software service) that is, there si no "name constraints". The enforcement of our certificate policy relies on the following cumulative conditions:

  1. The Certificate Signing Request (CSR) MUST be submitted by a person or a virtual person already having a valid class 1 certificate signed by openosiCA1-DC or others accepted CA. or
  2. Automated checks required for a class 1 (BASIC) certificate will be enforced
  3. Automated checks required for a class 2 (CLOUD) certificate will be enforced
  4. Human investigation will authenticate the identity required in the subject DN of the CSR
    • Scope is collaboration with :
      • Open source community
      • Education entity
      • Research and development activities
    • Investigation policy
      • Cross authentication with recognized organizations
      • Cross authentication with already authenticated persons
  5. Update of a public directory entry with virtual identity and public certificate
  6. Setting up and update of a personal space with authentication results

This INTERMEDIATE certification practices statement (INTERMEDIATE) helps the user of an X.509 certificate to determine the level of trust that its organization or given services can put in the certificates that are issued by the openosiCA3-DC certification authority embedding this OID. For this INTERMEDIATE level of assurance openOSI define several certificate profile. For each certificate profile there is an appropriate process for authentication with INTERMEDIATE level of assurance.

  • Common certificate profile elements for class 3 level of assurance OID []
  • Certificate profile for persons OID
  • Certificate profile for virtual persons OID
  • Certificate profile for software or appliance services OID
  • Certificate profile for software code authentication OID []


With this OID, the aim of openOSI is to publish its certificate policy as a support service, and as a legal framework. For other class (level of assurance) see OID

As an Identity provider openOSI is a certification authority providing, exceptionally, free class 3 certificates. See also ([] DESC 'fees' ). Exceptions are:

  • Persons for openOSI cooperation
  • Virtual persons for openOSI roles
  • Virtual hosts for openOSI
  • Services for openOSI
  • Code for openOSI software


The usage of certificate policy is to process an X.509 extension called "certificate policy" RFC3280. "Applications with specific policy requirements are expected to have a list of those policies which they will accept and to compare the policy OIDs in the certificate to that list".

NOTE: According RFC3280, if this extension is critical, the path validation software MUST be able to interpret this extension (including the optional qualifier), or MUST reject the certificate. Therefore openOSI always mark this extension as NON CRITICAL

XML format

	<asn1-notation>\{iso(1) identified-organization(3) dod(6) internet(1) private(4) enterprise(1) openosi(27630) cps(1) intermediate(3)\</asn1-notation>
	<description> Certificate policy with intermediate certification practices statement </description>
	<information>More <i>information</i> can be found in <a href="http://openosi.org/openosi/display/oid/">openOSI INTERMEDIATE CPS</a> </information>
</oid> (openOSI Object Identifier name space) (openOSI Object Identifier name space) (openOSI Object Identifier name space)

Site powered by a free Open Source Project / Non-profit License (more) of Confluence - the Enterprise wiki.
Learn more or evaluate Confluence for your organisation.
Powered by Atlassian Confluence, the Enterprise Wiki. (Version: 2.4.2 Build:#703 Mar 12, 2007) - Bug/feature request - Contact Administrators