frag.cnf (2146B)
1 # strict policy for signing intermediate certificates 2 # see policy format for `man ca` 3 [ CA_policy_strict ] 4 countryName = match 5 stateOrProvinceName = match 6 organizationName = match 7 organizationalUnitName = optional 8 commonName = supplied 9 emailAddress = optional 10 11 # loose policy for signing generic certificates (signed by intermediate certs) 12 # see policy format for `man ca` 13 [ CA_policy_loose ] 14 countryName = optional 15 stateOrProvinceName = optional 16 localityName = optional 17 organizationName = optional 18 organizationalUnitName = optional 19 commonName = supplied 20 emailAddress = optional 21 22 # extensions for the root ca certificate (`man x509v3_config`) 23 [ v3_ca ] 24 subjectKeyIdentifier = hash 25 authorityKeyIdentifier = keyid:always,issuer 26 basicConstraints = critical, CA:true 27 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 28 29 # extensions for intermediate ca certificates (`man x509v3_config`) 30 [ v3_intermediate_ca ] 31 subjectKeyIdentifier = hash 32 authorityKeyIdentifier = keyid:always,issuer 33 basicConstraints = critical, CA:true, pathlen:0 34 keyUsage = critical, digitalSignature, cRLSign, keyCertSign 35 36 # extensions for client certificates (`man x509v3_config`) 37 [ client_cert ] 38 subjectKeyIdentifier = hash 39 authorityKeyIdentifier = keyid,issuer 40 basicConstraints = CA:false 41 keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment 42 extendedKeyUsage = clientAuth, emailProtection 43 nsCertType = client, email 44 nsComment = "Generated Client Certificate" 45 46 # extensions for server certificates (`man x509v3_config`) 47 [ server_cert ] 48 subjectKeyIdentifier = hash 49 authorityKeyIdentifier = keyid,issuer:always 50 basicConstraints = CA:false 51 keyUsage = critical, digitalSignature, keyEncipherment 52 extendedKeyUsage = serverAuth 53 nsCertType = server 54 nsComment = "Generated Server Certificate" 55 56 # extensions for the revocation list (`man x509v3_config`) 57 [ crl_ext ] 58 authorityKeyIdentifier = keyid:always 59 60 # extensions for OSCP signing certificates (`man ocsp`) 61 [ ocsp ] 62 subjectKeyIdentifier = hash 63 authorityKeyIdentifier = keyid,issuer 64 basicConstraints = CA:false 65 keyUsage = critical, digitalSignature 66 extendedKeyUsage = critical, OCSPSigning