![]() |
IBM Trust Authority 3.1 Features Checklist
� |
|
Format(s) supported |
X509 v3 |
Extensions allowed?� Standard/private |
Yes - standard and private |
Multiple keys/certificates per user? Specify Yes/No and the number allowed or no limit |
Yes - no limit, also no additional charge for unlimited certificates per user� |
Can certificates be customised?� Method? |
Yes - creation of certificate template allows users to request the certs.� |
Revocation methods: |
|
CRL? |
Yes� |
OCSP? |
Yes, via Valicert� |
CRT (Certificate Revocation Trees)? |
Yes, via Valicert� |
CRL Distribution Points? |
No |
Scalability: |
� |
Modularity Brief description of architecture (i.e. CA/RA on separate machines, etc) |
CA/Audit Server on one machine,� RA Server on second machine, Directory on a third machine.� Each machine can be multiprocessor system on NT or UNIX.� Registrar systems run as java applications on RA applications to allow the RA to work anywhere and reduce� workload on RA Server. |
Installation options |
Components installed on one machine, or on separate machines as mentioned above.� Since pricing is user based, you may install as many servers as required to meet your needs. |
Capacity Max no. of certificates per CA |
SecureWay Directory tested with over 30 million entries. |
Security: |
� |
Communications to client |
128bit SSL |
Communications between CA/RA |
Signed messages from CA to RA using PKIX CMP protocols over TCP/IP. |
CA/RA protection (tokens. Passwords, ACLs, etc.) |
Password or Smartcard authentication for RA Administrators.� Access Control Lists for administrator privileges.� Software modules signed by IBM.� KeyStores in hardware or triple DES encrypted. |
Hardware protection of CA root keys?� Specify Yes/No and method |
Yes, IBM 4758 Cryptographic Coprocessor on AIX, certified as FIPS 140-1 Level 4.�� Yes, Smartcards for both AIX and NT. |
PKI topologies: |
� |
Cross certification methods allowed |
PKIX-CMP for bi-directional cross certification� |
If hierarchies are allowed: |
� |
What depth?� |
No limit |
At what levels can CAs be cross-certified? |
At any level of the hierarchy |
Is it possible to join a hierarchy after installation to support mergers, acquisitions, or joining a trust alliance? |
Yes, and the root key is preserved. |
Multiple RA allowed per CA?� Specify Yes/No and the limit |
No.� |
Registration mechanisms (for each, specify Yes/No, and whether out of box or via tool kits): |
� |
Face to face |
Yes, out of the box� |
Bulk/automated |
Yes, via toolkits� |
Web |
Yes, out of the box� |
|
Yes, out of the box (RA accepts email) |
VPN |
Yes, out of the box� (PKCS 10/7) |
Other (specify) |
Pre-registration via RA, user download certificate from client |
Device certification direct to CA or requires admin intervention? |
Admin intervention required at VPN (RA can automatically approve cert request) |
Can RA interface be customised easily? Method? |
Yes, customise via scripting, additional fields added to registration application via Java Server Pages (html) |
Tool kits available? |
Yes.� SecureWay Toolbox includes a complete CDSA compliant cryptographic toolkit and complete PKIX toolkit. |
Directory support: |
� |
Own directory only or third party? Which third party directories? |
Own Directory.� Also LDAP compliant, so it should interoperate with any LDAP compliant directory. |
Own directory provided out of the box? |
Yes, at no additional charge |
Can new objects be created on the fly by the PKI? |
Yes |
Smartcard/token support: |
� |
Which devices/standards? |
Any PKCS #11 or MS CAPI compliant card� |
Client protection? |
Trust Authority Client can use real smartcards (via PKCS #11) or virtual smartcard |
CA Administrator protection? |
Operating System control only |
RA Administrator protection? |
Any PKCS #11 or� MS CAPI compliant card |
Key management: |
� |
Automatic key update? |
No.� Planned for 1Q 2000 release |
Automatic key histories? |
No.� Planned for 1Q 2000 release |
Key backup and recovery? |
No.� Planned for 1Q 2000 release |
Management interface: |
� |
CA Administration GUI/command line |
Command line |
Logging/reporting Built-in reporting or third party? |
Minimal reporting built in.� DB2 Report Writers available from multiple third parties. |
Policy-based management? |
Yes, via business process framework, certificate profiles and policy exits. |
Multiple CA administrators? |
Yes. |
Multiple RA administrators? |
Yes. |
Can different administrators be assigned different tasks? |
Yes, for example, one administrator assigned to certificate approvals, and another to certificate revocations. |
Interoperability: |
� |
Standards supported: |
� |
CA |
������ X.509v3 certificates ������ Certificate revocation lists (CRLv2) ������ Key lengths up to 1024 bits for encryption and key exchange keys ������ Key lengths up to 2048 bits for CA signing keys ������ RSA algorithms for encryption and signing ������ MD5 and SHA-1 hash algorithms ������ PKIX CMP and CMMF via TCP/IP for communications with the Registration Authority SecureWay Directory LDAP version 3.0, with RFC 1779 syntax ������ ODBC for communications to database |
RA |
������ Secure Sockets Layer (SSL) version 2 and version 3, with client authentication ������ PKCS #10 browser and server certificate request format, with a PKCS #7 response� format or as raw, binary or Base 64 encoded certificate ������ PKIX CMP certificate format, with a PKIX CMP response ������ IPSec certificate format ������ S/MIME certificate format ������ Browser certificates for: w����� Microsoft Internet Explorer versions 4.x and 5.x w����� Netscape Navigator and Netscape Communicator versions 3.x and 4.x ������ Server certificates for: w����� Netscape Enterprise Server w����� Microsoft Internet Information Server w����� IBM HTTP Server w����� Apache Server w����� Any which requests via PKCS #10/7 standards ������ Smartcard certificates (PKCS #11 interface) for: w����� Trust Authority Client application w����� Netscape Navigator and Netscape Communicator versions 3.x and 4.x ������ LDAP standard for communications with the Directory ������ PKIX CMP and� CMMF via TCP/IP for communications with the Certificate Authority ������ PKIX CMP CMMF via TCP/IP for communications with the Client application ������ PKCS #11 for interface to smartcard key store ������ ODBC for communications to database |
Crypto hardware |
�IBM 4758 Cryptographic Coprocessor Hardware w����� FIPS 140 level 4 requirements for resistance to����������� physical attacks� w����� Support for industry-accepted cryptography standards: w����� DES for encryption/decryption w����� RSA for signing/signature verification w����� PKCS #1 block type 00 w����� PKCS #1 block type 01 w����� PKCS #1 block type 02 w����� MD5 and SHA-1 hash algorithms w����� X9.9 and X9.23 ANSI w����� ISO 9796� Common Cryptographic Architecture (CCA) Provides services for the 4758 coprocessor, including the secure generation of RSA key pairs with modulus lengths as long as 2048 bits, and: w����� SET (Secure Electronic Transaction) w����� DES for encryption and decryption w����� RSA for signing and signature verification w����� MD5 and SHA-1 hash algorithms �Smartcards via PKCS #11 or MS CAPI interface |
Directories |
SecureWay Directory (LDAP) |
Certificate protocols |
������ X509 V3 for certificates, including: ������ Standard Extensions These are the extensions defined in RFC2459, such as key usage, private key usage period, subject alternative name, basic constraints, and name constraints. ������ Common Extensions - Extensions that are unique to Trust Authority, such as host identity mapping. This extension associates the subject of a certificate with a corresponding identity on a host system. ������ User Defined Extensions - Extensions that an application can use to identify an online validation service that supports the issuing CA. ������ PKCS #10 browser and server certificate request format, with a PKCS #7 response� format or as raw, binary or Base 64 encoded certificate ������ PKIX CMP certificate format, with a PKIX CMP response ������ IPSec certificate format ������ S/MIME certificate format ������ Browser certificates for: w����� Microsoft Internet Explorer versions 4.x and 5.x w����� Netscape Navigator and Netscape Communicator versions 3.x and 4.x ������ Server certificates for: w����� Netscape Enterprise Server w����� Microsoft Internet Information Server ������ Smartcard certificates (PKCS #11 or MS CAPI compliant)� |
Others |
� |
Third Party Application Support |
� |
Specify key partners or applications that support your PKI products |
Equifax (US) and Datakom (Austria) as Trusted Third Parties.�� Over 50 ISVs recruited for IBM PKI offerings.� Email, VPN and other applications.� Key applications include Deloitte & Touche Litigation Support System, GemPlus Smartcards, Lotus Notes/Domino, Microsoft Outlook and Exchange, Entegrity SDP, etc. |
Is this support via generic methods or proprietary tool kits? |
Primarily via generic methods, although some use proprietary toolkits. |
Other notable points/USPs: |
� |
Please provide any additional information which may be pertinent |
First PKI Offering by any vendor based on the IETF PKIX Reference Implementation (Jonah),.which was donated to the Internet community by IBM� The PKIX Reference Implementation is available from www.mit.edu/pfl �available in English, French, German, Spanish, Italian, Brazilian Portuguese, Japanese, Korean, Traditional Chinese and Simplified Chinese |
Click here to return to the Review
Send mail to [email protected] with
|