Skip to main content

Using LDAP Directories for Management of PKI Processes

  • Conference paper
Public Key Infrastructure (EuroPKI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3093))

Included in the following conference series:

  • 453 Accesses

Abstract

We present a framework for extending the functionality of LDAP servers from their typical use as a public directory in public key infrastructures. In this framework the LDAP servers are used for administrating infrastructure processes. One application of this framework is a method for providing proof-of-possession, especially in the case of encryption keys. Another one is the secure delivery of software personal security environments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ITU-T Recommendation X.509. Information Technology-Open Systems Interconnection-The Directory: Public-key and Attribute Certificate Frameworks (March 2000)

    Google Scholar 

  2. Asokan, N., Niemi, V., Laitinen, P.: On the Usefulness of Proof-of-Possession. In: Proceedings of the 2nd Annual PKI Research Workshop, Gaithersburg MD, USA, April 2003, pp. 122–127 (2003)

    Google Scholar 

  3. Chadwick, D.W.: Secure Directories. In: Proceedings of the NATO Advanced Networking Workshop on Advanced Security Technologies in Networking (June 2000)

    Google Scholar 

  4. Dierks, T., Allen, C.: The TLS Protocol Version 1.0. Request for Comments 2246 (January 1999)

    Google Scholar 

  5. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  6. Hodges, J., Morgan, R.: Lightweight Directory Access Protocol (v3): Technical Specification. Request for Comments 3377 (September 2002)

    Google Scholar 

  7. Hodges, J., Morgan, R., Wahl, M.: Lightweight Directory Access Protocol (v3): Extension for Transport Layer Security. Request for Comments 2830 (May 2000)

    Google Scholar 

  8. Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Request for Comments 3280 (April 2002)

    Google Scholar 

  9. Java Naming and Directory Interface, February 8 (2004), http://java.sun.com/products/jndi/

  10. Myers, J.: Simple Authentication and Security Layer (SASL). Request for Comments 2222 (October 1997)

    Google Scholar 

  11. Myers, M., Adams, C., Solo, D., Kemp, D.: Internet X.509 Certificate Request Message Format. Request for Comments 2511 (March 1999)

    Google Scholar 

  12. Myers, M., Liu, X., Schaad, J., Weinstein, J.: Certificate Management Messages over CMS. Request for Comments 2797 (April 2000)

    Google Scholar 

  13. OpenLDAP Project, February 7 (2004), http://www.openldap.org

  14. RSA Laboratories. PKCS#10 v1.7: Certification Request Syntax Standard (May 2000)

    Google Scholar 

  15. RSA Laboratories. PKCS#12 v1.0: Personal Information Exchange Syntax (June 1999)

    Google Scholar 

  16. Smith, M.: Definition of the inetOrgPerson LDAP Object Class. Request for Comments 2798 (April 2000)

    Google Scholar 

  17. Wahl, M., Alvestrand, H., Hodges, J., Morgan, R.: Authentication Methods for LDAP. Request for Comments 2829 (May 2000)

    Google Scholar 

  18. XML Key Management Specification (XKMS), February 8 (2004), http://www.w3.org/TR/2001/NOTE-xkms-20010330/

  19. ITU-T Recommendation X.500. Information Technology - Open Systems Interconnection - The Directory: Overview of Concepts, Models and Service (February 2001)

    Google Scholar 

  20. ITU-T Recommendation X.509. Information Technology-Open Systems Interconnection-The Directory: Public-key and Attribute Certificate Frameworks (March 2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Karatsiolis, V., Lippert, M., Wiesmaier, A. (2004). Using LDAP Directories for Management of PKI Processes. In: Katsikas, S.K., Gritzalis, S., López, J. (eds) Public Key Infrastructure. EuroPKI 2004. Lecture Notes in Computer Science, vol 3093. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25980-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25980-0_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22216-3

  • Online ISBN: 978-3-540-25980-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics