certificate_authorities: {
test_ca: {
ca_cert: {
cert: 'spec/fixtures/test_ca.cer',
key: 'spec/fixtures/test_ca.key'
},
ocsp_cert: {
:pkcs12: 'spec/fixtures/test_ca_ocsp.p12',
:password: 'r509'
},
ocsp_location: 'URI:http://ocsp.domain.com',
ocsp_chain: 'spec/fixtures/test_ca_ocsp_chain.txt',
ocsp_start_skew_seconds: 3600,
ocsp_validity_hours: 168,
cdp_location: 'URI:http://crl.domain.com/test_ca.crl',
crl_list: 'spec/fixtures/test_ca_crl_list.txt',
crl_number: 'spec/fixtures/test_ca_crl_number.txt',
crl_validity_hours: 168, #7 days
message_digest: 'SHA1', #SHA1, SHA256, SHA512 supported. MD5 too, but you really shouldn't use that unless you have a good reason
profiles: {
server: {
basic_constraints: "CA:FALSE",
key_usage: [digitalSignature,keyEncipherment],
extended_key_usage: [serverAuth],
certificate_policies: [ [ "policyIdentifier=2.16.840.1.9999999999.1.2.3.4.1", "CPS.1=http://example.com/cps"] ],
subject_item_policy: {
CN: "required",
O: "required",
OU: "optional",
ST: "required",
C: "required",
L: "required"
}
},
client: {
basic_constraints: "CA:FALSE",
key_usage: [digitalSignature,keyEncipherment],
extended_key_usage: [clientAuth],
certificate_policies: [ [ "policyIdentifier=2.16.840.1.9999999999.1.2.3.4.2", "CPS.1=http://example.com/cps"] ]
},
email: {
basic_constraints: "CA:FALSE",
key_usage: [digitalSignature,keyEncipherment],
extended_key_usage: [emailProtection],
certificate_policies: [ [ "policyIdentifier=2.16.840.1.9999999999.1.2.3.4.3", "CPS.1=http://example.com/cps"] ]
},
clientserver: {
basic_constraints: "CA:FALSE",
key_usage: [digitalSignature,keyEncipherment],
extended_key_usage: [serverAuth,clientAuth],
certificate_policies: [ [ "policyIdentifier=2.16.840.1.9999999999.1.2.3.4.4", "CPS.1=http://example.com/cps"] ]
},
codesigning: {
basic_constraints: "CA:FALSE",
key_usage: [digitalSignature],
extended_key_usage: [codeSigning],
certificate_policies: [ [ "policyIdentifier=2.16.840.1.9999999999.1.2.3.4.5", "CPS.1=http://example.com/cps"] ]
},
timestamping: {
basic_constraints: "CA:FALSE",
key_usage: [digitalSignature],
extended_key_usage: [timeStamping],
certificate_policies: [ [ "policyIdentifier=2.16.840.1.9999999999.1.2.3.4.6", "CPS.1=http://example.com/cps"] ]
},
subroot: {
basic_constraints: "CA:TRUE,pathlen:0",
key_usage: [keyCertSign,cRLSign],
extended_key_usage: [],
certificate_policies: [ ]
}
}
}
}