{"draft":"draft-wallace-using-ta-constraints-02","doc_id":"RFC5937","title":"Using Trust Anchor Constraints during Certification Path Processing","authors":["S. Ashmore","C. Wallace"],"format":["ASCII","HTML"],"page_count":"8","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IETF - NON WORKING GROUP","abstract":"This document describes how to use information associated with a\r\ntrust anchor public key when validating certification paths. This\r\ninformation can be used to constrain the usage of a trust anchor.\r\nTypically, constraints are used to limit the certificate policies and\r\nnames that can appear in certification paths validated using a trust\r\nanchor. This document is not an Internet Standards Track \r\nspecification; it is published for informational purposes.","pub_date":"August 2010","keywords":["TA"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC5937","errata_url":null}