Microsoft Root Certificate Program Application Nov

Microsoft Root Certificate Program
Preliminary Application
Thank you for applying for the Microsoft Root Certificate program. The information below will help Microsoft
to analyze your application to ensure that your certificate authority meets the program's requirements. For
more information, please visit http://aka.ms/rootcert
1. GENERAL INFORMATION
.1
Certificate Authority ("CA") Name
.2
What is the name as it appears on the root cert
.3
CA Mailing Address
.4
CA Website URL
.5
Operations Contact E-mail Address
.6
CA Business Phone Number
.7
Is this a new or an existing CA entity?
New
Existing
.8
What type of CA is this?
Government
Commercial
.8.1
If this is a government CA, please list your
statutory authority to issue certificates
2. CONTACTS
Primary Contact
.1
Name
.2
Email
.3
Phone Number
Alternate Contact
.4
Name
.5
Email
.6
Phone Number
3. CA PURPOSE
.1
Business Purpose
.2
Benefits to Microsoft Customers
4. Operational Details
.1
Will this CA allow subordinate CAs?
Yes
No
.2
Will this CA issue certs to the general public?
Yes
No
.3
If No, then who will the CA issue certificates to?
.4
Number of Roots Requested
.5
Certificate Policy (CP) URL
.6
Certification Practice Statement (CPS) URL
.7
Paste Root Cert
Thumbprint
.8
.9
Enter The Test URL’s For Each Root Cert
.10
Does this CA Issue EV certificates?
Yes
No
.11
.12
If yes, enter the EV OIDs for all EV certs
Extended Key Usage (EKU) Types Required
See http://aka.ms/auditreqs for information about the audit requirements for each of the EKU types below
Server Authentication (non-EV SSL)
Server Authentication (non-EV SSL) and Client Authentication only
Server Authentication (EV SSL)
Server Authentication (EV SSL) and Client Authentication only
EV Code Signing
Non-EV Code Signing and Time stamping
Secured Email (S/MIME)
Client Authentication (without Server Authentication)
Document Signing
Encrypting File System
5. Audit History
.1
Has the CA been audited?
.2
If so, who was the auditor?
.3
.4
Yes
No
Which audit standard was applied? Select from the table below
Note: If this is a new CA that has not been audited, please select the audits you
intend to complete from the list below.
Enter the audit certification URLs
EKU Type
Server Authentication (non-EV SSL)
OR
Acceptable Audit Standards
Server Authentication (non-EV SSL)
and Client Authentication only
EKU Type
Acceptable Audit Standards
OR
Audit
Complete
Audit Report Letter
Date
Audit
Complete
Audit Report Letter
Date
WebTrust Principles and Criteria for Certification
Authorities – Extended Validation SSL – Version
1.4.5
Server Authentication (EV SSL) and
Client Authentication only
ETSI TS 102 042 V2.4.1 or later (EVCP or EVCP+
policies) - Electronic Signatures and Infrastructures
(ESI); Policy requirements for certification
authorities issuing public key certificates
EKU Type
Acceptable Audit Standards
WebTrust Principles and Criteria for Certification
Authorities – Extended Validation Code Signing
EV Code Signing
Audit Report Letter
Date
WebTrust Principles and Criteria for Certification
Authorities – SSL Baseline with Network Security –
Version 2
ETSI TS 102 042 V2.4.1 or later (DVCP, OVCP or PTCBR policies) - Electronic Signatures and
Infrastructures (ESI); Policy requirements for
certification authorities issuing public key
certificates
Server Authentication (EV SSL)
Audit
Complete
ETSI TS 102 042 V2.4.1 or later (EVCG policy) Electronic Signatures and Infrastructures (ESI);
Policy requirements for certification authorities
issuing public key certificates
EKU Type
Non-EV Code Signing and Time
stamping
Acceptable Audit Standards
Audit
Complete
Audit Report Letter
Date
Audit
Complete
Audit Report Letter
Date
Audit
Complete
Audit Report Letter
Date
ETSI TS 102 042 V2.4.1 or later (EVCG policy) Electronic Signatures and Infrastructures (ESI);
Policy requirements for certification authorities
issuing public key certificates
OR
Secured Email (S/MIME)
Principles and Criteria for Certification Authorities
2.0
OR
Client Authentication (without
Server Authentication)
ETSI TS 102 042 V2.4.1 or later (LCP, NCP, NCP+
policies) - Electronic Signatures and Infrastructures
(ESI); Policy requirements for certification
authorities issuing public key certificates
EKU Type
Acceptable Audit Standards
Document Signing
OR
Encrypting File System
EKU Type
ETSI TS 102 042 V2.4.1 or later (LCP, NCP, NCP+
policies) - Electronic Signatures and Infrastructures
(ESI); Policy requirements for certification
authorities issuing public key certificates
ETSI TS 101 456 V1.4.3 or later - Electronic
Signatures and Infrastructure (ESI); Policy
requirements for certification authorities issuing
qualified certificates
Acceptable Audit Standards
Government equivalency audit