I'm not certain that using the subjectAltNames field is the "proper" 
thing to do. 

The problem I see is that you may wish to use a certificate at more 
than one site, with possibly different usernames.

Even if you can store an arbitrarily long list of local usernames
in *any* of the fields in a certificate, you must still maintain
a local list to check to see if the identity claimed by the local
username is acceptable, and which certificate subject is associated
with it.

Perhaps a file mapping a certificate subject name to a local
username is a better solution. The certificate can be used at sites
with different usernames that aren't known at certificate issue time,
and doesn't require extra baggage in the certificate. 

> 
> >One approach would be to use the email field.
> 
> No no no no no no  no no!
> 
> There is no such thing as an "email" field.  Many older
> CA's (eg., the early Verisign's) used this RDN, which
> was defined in PKCS9.  *That's wrong.*
> 
> The proper thing to do is use the subjectAltNames
> extension.
>       /r$
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    [EMAIL PROTECTED]
> Automated List Manager                           [EMAIL PROTECTED]
> 

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to