Le jeudi 30 octobre 2014 19:17:41 UTC+1, Kathleen Wilson a écrit :
IdenTrust has applied to include the IdenTrust Commercial Root CA 1
and IdenTrust Public Sector Root CA 1 root certificates, and turn on
the Websites and Email trust bits for both. The IdenTrust Commercial
Root CA 1 root
Am 07.11.2014 um 14:35 schrieb Erwann Abalea:
Intermediate certificates include EKU OIDs for IPSec {Tunnel, User, End
System},
which is weird; why would anyone want a *public* certificate to authentify
against a virtual *private* network?
If an organisation is already using a proper PKI, why
If the WebTrust EV audit criteria includes the Baseline Requirements audit
criteria and, In other words, the WebTrust EV audit statement will also
suffice as the WebTrust BR audit statement, why is required for CAs to pay
for three seals? Maybe it is enough to hold WT4CA and WTEV.
Even more, if
On 11/7/14, 2:07 AM, Chema López wrote:
If the WebTrust EV audit criteria includes the Baseline Requirements audit
criteria and, In other words, the WebTrust EV audit statement will also
suffice as the WebTrust BR audit statement, why is required for CAs to pay
for three seals? Maybe it is
On Fri, November 7, 2014 1:26 pm, Kathleen Wilson wrote:
On 11/7/14, 2:07 AM, Chema López wrote:
If the WebTrust EV audit criteria includes the Baseline Requirements
audit
criteria and, In other words, the WebTrust EV audit statement will
also
suffice as the WebTrust BR audit
5 matches
Mail list logo