Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Automated Certificate Management Environment (acme)

WGNameAutomated Certificate Management Environment
Acronymacme
Area Security Area(sec)
StateActive
Charter charter-ietf-acme-01Approved
Status update Show Changed 2018-07-19
Document dependencies
Additional resources Issue tracker, Wiki, Zulip Stream
Personnel ChairsMike Ounsworth,Yoav Nir
Area DirectorDeb Cooley
DelegateDeb Cooley
Mailing list Addressacme@ietf.org
To subscribehttps://www.ietf.org/mailman/listinfo/acme
Archivehttps://mailarchive.ietf.org/arch/browse/acme/
Chat Room address https://zulip.ietf.org/#narrow/stream/acme

Charter for Working Group

Historically, issuance of certificates for Internet applications
(e.g., web servers) has involved many manual identity validation steps
by the certification authority (CA). The ACME WG will specify
conventions for automated X.509 certificate management, including
validation of control over an identifier, certificate issuance,
certificate renewal, and certificate revocation. The initial focus of
the ACME WG will be on domain name certificates (as used by web
servers), but other uses of certificates can be considered as work
progresses.

ACME certificate management must allow the CA to verify, in an
automated manner, that the party requesting a certificate has authority
over the requested identifiers, including the subject and subject
alternative names. The processing must also confirm that the requesting
party has access to the private key that corresponds to the public key
that will appear in the certificate. All of the processing must be done
in a manner that is compatible with common service deployment
environments, such as hosting environments.

ACME certificate management must, in an automated manner, allow an
authorized party to request revocation of a certificate.

The ACME working group is specifying ways to automate certificate
issuance, validation, revocation and renewal. The ACME working
group is not reviewing or producing certificate policies or
practices.

The starting point for ACME WG discussions shall be draft-barnes-acme.

Milestones

DateMilestoneAssociated documents
Nov 2024Senddraft-ietf-acme-dns-account-challenge to the IESG for standards track publicationdraft-ietf-acme-dns-account-challenge
Jul 2024End user client and code signing certificates extension submitted to IESG or abandoneddraft-ietf-acme-client

Done milestones

DateMilestoneAssociated documents
DoneSend Renewal Information Extension to the IESG for standards track publicationrfc9773 (was draft-ietf-acme-ari)
DoneSenddraft-ietf-acme-onion the IESG for standards track publicationrfc9799 (was draft-ietf-acme-onion)
DoneDelay-Tolerant Networking (DTN) extensions submitted to IESGrfc9891 (was draft-ietf-acme-dtnnodeid)
DoneACME integration with with EST, BRSKI and TEAP use cases submitted to IESGdraft-ietf-acme-integrations
DoneProfile for delegated STAR certificates submitted to IESGrfc9115 (was draft-ietf-acme-star-delegation)
DoneTNAuthlist extension submitted to IESGrfc9447 (was draft-ietf-acme-authority-token)
rfc9448 (was draft-ietf-acme-authority-token-tnauthlist)
DoneS/MIME extension submitted to IESGrfc8823 (was draft-ietf-acme-email-smime)
DoneSubmit working group draft to IESG as Proposed Standardrfc8555 (was draft-ietf-acme-acme)
DoneInitial working group draft

[8]ページ先頭

©2009-2026 Movatter.jp