!!! Overview[1] The extensions defined for [X.509v3] [certificates] provide methods for associating additional [attributes] with users or [Public Keys] and for managing [relationships] between [Certificate Authorities|Certificate Authority]. The [X.509v3] [certificate] format also allows communities to define private extensions to carry information unique to those communities. !! critical or non-critical Each [{$pagename}] in a certificate is designated as either critical or non-critical. A [certificate]-using system [MUST] reject the certificate if it encounters a __critical__ extension it does not recognize or a critical extension that contains information that it cannot process. A non-critical extension [MAY] be ignored if it is not recognized, but [MUST] be processed if it is recognized. !! [{$pagename}] usage The following sections present recommended extensions used within Internet certificates and standard locations for information. Communities may elect to use additional extensions; however, caution ought to be exercised in adopting any critical extensions in certificates that might prevent use in a general context. Each extension includes an [OID] and an [ASN.1] structure. When an [{$pagename}] appears in a [certificate], the [OID] appears as the field extnID and the corresponding [ASN.1] [DER] encoded structure is the value of the octet string extnValue. A [certificate] __MUST NOT__ include more than one instance of a particular extension. For example, a certificate may contain only one [authority key identifier extension|AuthorityKeyIdentifier] ([Section 4.2.1.1|https://tools.ietf.org/html/rfc5280#section-4.2.1.1]). An extension includes the [Boolean] critical, with a default value of FALSE. The text for each extension specifies the acceptable values for the critical field for CAs conforming to this profile. Conforming [CAs|Certificate Authority] [MUST] support [{$pagename}]: * key identifiers - [Authority Key Identifier|AuthorityKeyIdentifier] and [Subject Key IDentifier|SubjectKeyIdentifier] ([Sections 4.2.1.1|https://tools.ietf.org/html/rfc5280#section-4.2.1.1] and [4.2.1.2|https://tools.ietf.org/html/rfc5280#section-4.2.1.2]) * [basic constraints|BasicConstraints] ([Section 4.2.1.9|https://tools.ietf.org/html/rfc5280#section-4.2.1.9]) * [KeyUsage] ([Section 4.2.1.3|https://tools.ietf.org/html/rfc5280#section-4.2.1.3]) * [Certificate Policies] ([Section 4.2.1.4|https://tools.ietf.org/html/rfc5280#section-4.2.1.4])) If the CA issues certificates with an empty sequence for the [subject field], the CA [MUST] support the [Subject Alternative Name] extension ([Section 4.2.1.6|https://tools.ietf.org/html/rfc5280#section-4.2.1.6]). Support for the remaining extensions is __OPTIONAL__. Conforming CAs MAY support extensions that are not identified within this specification; certificate issuers are cautioned that marking such extensions as critical may inhibit interoperability. At a minimum, applications conforming to this profile __MUST__ recognize the following extensions: * [KeyUsage] ([Section 4.2.1.3|https://tools.ietf.org/html/rfc5280#section-4.2.1.3]) * [Certificate Policies] ([Section 4.2.1.4|https://tools.ietf.org/html/rfc5280#section-4.2.1.4]) * [Subject Alternative Name] ([Section 4.2.1.|https://tools.ietf.org/html/rfc5280#section-4.2.1.6]) * [basicConstraints] ([Section 4.2.1.9|https://tools.ietf.org/html/rfc5280#section-4.2.1.9]) * [nameConstraints] ([Section 4.2.1.10|https://tools.ietf.org/html/rfc5280#section-4.2.1.10]) * [policyConstraints] ([Section 4.2.1.11|https://tools.ietf.org/html/rfc5280#section-4.2.1.11]) * [extendedKeyUsage] ([Section 4.2.1.12|https://tools.ietf.org/html/rfc5280#section-4.2.1.12]) * [inhibitAnyPolicy] ([Section 4.2.1.14|https://tools.ietf.org/html/rfc5280#section-4.2.1.14]). In addition, applications conforming to this profile __SHOULD__ recognize the [authority|AuthorityKeyIdentifier] and [Subject Key IDentifier|SubjectKeyIdentifier] ([Sections 4.2.1.1|https://tools.ietf.org/html/rfc5280#section-4.2.1.1] and [4.2.1.2|https://tools.ietf.org/html/rfc5280#section-4.2.1.1]) and policy mappings (Section 4.2.1.5|https://tools.ietf.org/html/rfc5280#section-4.2.1.5]) extensions. !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile|https://tools.ietf.org/html/rfc5280#page-26|target='_blank'] - based on information obtained 2015-05-24 * [#2] - [4.1.1.9 Extensions|https://tools.ietf.org/html/rfc5280#section-4.1.1.9|target='_blank'] - based on information obtained 2018-07-19 * [#3] - [4.1.2 Certificate Extensions|https://tools.ietf.org/html/rfc5280#section-4.2|target='_blank'] - based on information obtained 2018-07-19