The X.509v3 certificate format also allows communities to define private extensions to carry information unique to those communities.
A non-critical extension MAY be ignored if it is not recognized, but MUST be processed if it is recognized.
Each extension includes an OID and an ASN.1 structure. When an Certificate Extensions appears in a certificate, the OID appears as the field extnID and the corresponding ASN.1 DER encoded structure is the value of the octet string extnValue. A certificate MUST NOT include more than one instance of a particular extension.
For example, a certificate may contain only one authority key identifier extension (Section 4.2.1.1). An extension includes the Boolean critical, with a default value of FALSE. The text for each extension specifies the acceptable values for the critical field for CAs conforming to this profile.
Conforming CAs MUST support Certificate Extensions:
If the CA issues certificates with an empty sequence for the Certificate Subject field, the Certificate Authority MUST support the Subject Alternative Name extension (Section 4.2.1.6).
Support for the remaining extensions is OPTIONAL. Conforming CAs MAY support extensions that are not identified within this specification; certificate issuers are cautioned that marking such extensions as critical may inhibit interoperability.
At a minimum, applications conforming to this profile MUST recognize the following extensions:
In addition, applications conforming to this profile SHOULD recognize the authority and Subject Key IDentifier (Sections 4.2.1.1 and 4.2.1.2
) and policy mappings (Section 4.2.1.5|https://tools.ietf.org/html/rfc5280#section-4.2.1.5]) extensions.