>It won't always be the case that your directory structure will map
>_exactly_ to your certificate heirarchy.

So you need a general filtering of subjectDN to LDAPDN, I guess.
We've come across this issue. Our circumstances are a little different
from yours, since the product (here) is a repository, not using an external
directory. So we can say things like "we will rewrite the DN to be
c/o/ou/l/cn allowing multiple ou's and ignoring all other attrbiutes."
Whereas your code probably has to allow flexibility in rewrite rules.

>But if you want to use something like Verisign to get your certificates,
>their certs are pretty nasty looking and I would _not_ want my directory to

>look like that. :)

Yeah, the longer CA folks have been in business, the more they do things
beyond
the PKIX profile. (No surprise in that.)

>Either as an RDN in the cert, or an extended attribute.  Verisign's
>low-assurance CA sticks your email in there.

It's amazing what people put in their DN's. We've seen certs that have a
copyright
notice in them.

It's an interesting exercise to find the official oid of the email rdn. :)
        /r$
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to