CA:Root Certificate Requests: Difference between revisions

From MozillaWiki
Jump to navigation Jump to search
m (formatting fixes)
(redirect to new page)
 
(6 intermediate revisions by 3 users not shown)
Line 1: Line 1:
If you are an official representative of a Certificate Authority and you wish to apply to have your CA's root certificate(s) included in Mozilla
#REDIRECT [[CA/Application_Process]]
products, you should do these steps:
 
# Read through [http://www.mozilla.org/projects/security/certs/policy Mozilla CA certificate policy] to determine if your CA is eligible and to learn all the requirements for the certificate to be included in Mozilla products
# If you don't already have an account with [https://bugzilla.mozilla.org Mozilla's bug and enhancement request tracking system bugzilla.mozilla.org], then [https://bugzilla.mozilla.org/createaccount.cgi register for an account].
# [https://bugzilla.mozilla.org/enter_bug.cgi?product=mozilla.org&component=CA%20Certificates Submit an Enhancement request bug] in the bug tracking system, requesting that your CA's root certs be added to Mozilla products. 
:The form for the Enhancement request should be filled out with these values:
<pre>
Reporter:      (your account email address)
Product:        mozilla.org
Version:        Other
Component:      CA Certificates
Severity:      Enhancement
Platform:      ALL
OS:            ALL
Summary:        Add (your CA name) Root Certificate
Description:    (see below)
</pre>
:In the Description box, copy and past the boilerplate shown below, and then fill it in with your CA's details.  There is one section below requesting information about the CA itself, and one section that should be repeated for each of the Root CA certificates that you wish to have included in Mozilla products.  Feel free to expand any answer area as needed.
<pre>
CA Details
----------
 
CA Name:    [                                                    ]
 
Website URL: [http://                                              ]
 
CA Summary:
  [ A one Paragraph Summary of your CA,                            ]
  [ including the following:                                      ]
  [ - General nature (e.g., commercial, government,                ]
  [                  academic/research, nonprofit)                ]
  [ - Primary geographical area(s) served                          ]
  [ - Number and type of subordinate CAs                          ]
 
Audit Type (WebTrust, ETSI etc.):  [                              ]
 
Auditor:  [                                                        ]
 
Auditor Website URL: [http://                                      ]
 
Audit Document URL(s):
  [http://                                                        ]
  [http://                                                        ]
 
URL of certificate hierarchy diagram (if available):
  [http://                                                        ]
 
Certificate Details
-------------------
(To be completed once for each root certificate; note that we only
include root certificates in the store, not intermediates.)
 
Certificate Name:  [ a short name, 60 characters max, no ':'      ]
 
Summary Paragraph:
  [ including the following:                                      ]
  [ - End entity certificate issuance policy,                      ]
  [  i.e. what you plan to do with the root                      ]
 
Root certificate download URL (on CA website):
  [http://                                                         ]
  [alternatively, paste a copy of the certificate in "PEM" format  ]
 
Certificate SHA1 Fingerprint (in hexadecimal):
  [ XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX XX    ]
 
Key size (for RSA, modulus length) in bits: [                      ]
 
Valid From (YYYY-MM-DD): [                                        ]
Valid To (YYYY-MM-DD):  [                                        ]
 
CRL HTTP URL (if any):
  [http://                                                        ]
 
CRL issuing frequency for subordinate CA certificates: [      days ]
CRL issuing frequency for subordinate EE certificates: [      days ]
 
OCSP responder URL (if any):
  [http://                                                        ]
 
Class: [domain-validated, identity/organizationally-validated or EV ]
 
Certificate Policy URL:
  [http://                                                        ]
 
CPS URL:
  [http://                                                        ]
 
Requested Trust Indicators: [ email and/or SSL and/or code signing ]
 
URL of a sample website using a certificate chained to this root
(if applying for SSL):
  [https://                                                        ]
</pre>
# Submit your enhancement request and note the bug number.
# Watch your email mailbox for email from bugzilla-daemon@mozilla.org containing additional requests for information.

Latest revision as of 23:14, 26 September 2018