Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
This protocol refers to four databases as tables, each table with rows and columns hosted by the CA. There are two main tables: one for requests and one for CRLs. The Request table has two auxiliary tables: one for a list of attributes for a particular request, and one for a list of extensions for a particular request.
The following list contains additional details about the four tables:
Request table: The Request table holds the history of all requests to the CA, both completed and pending, one row per request.
Attribute table: The Attribute table holds the attributes, as specified in [RFC2986], that are contained within a specified certificate request.
Extension table: The Extension table holds the X.509 extensions, as specified in [X509], that are contained within a specified certificate request.
CRL table: The CRL table holds the revocation data and status for the CA. The CA maintains a CRL database in the form of a table that holds all CRLs (both base and delta, as defined in [RFC3280] section 5) that have been issued.
Methods of this protocol refer to the preceding four tables, which are specified in section 3.1.1.