X.509 Certificate Name Constraints
The X.509-certificate-name-constraints extension can be used in a sub-CA certificate for specifying a name space within which all subject names in EE certificates must be located.
In a Windows domain this feature can be used for restricting the pattern of UPN subject alternative names that are allowed in certificates issued by PrivX CA. The target hosts validate the EE certificates and if the UPN does not fit into the name constraints the certificate validation fails.
The following steps are required to use X.509 certificate name constraints with the PrivX CA:
- Generate a certificate-signing request (CSR) for the PrivX CA private key.
- Attach name constraints to the CSR.
- Create a sub-CA certificate by signing the CSR with your windows CA.
- Import the signed sub CA certificate back to PrivX.
Generating a Certificate-Signing Request for PrivX CA Key
Follow the instructions in Trusted CA for Certificate Authentication to generate a certificate signing request for the CA key.
Attaching Name Constraints to the CSR
On the windows CA server:
- Create a policy.inf document similar to the following template:
[Version]
Signature= "$Windows NT$"
[RequestAttributes]
CertificateTemplate = SubCA
[NameConstraintsExtension]
Include = NameConstraintsPermitted
Exclude = NameConstraintsExcluded
Critical = True
[NameConstraintsPermitted]
UPN = @example.com
NoDefault = TRUE
[NameConstraintsExcluded]
UPN = Administrator@example.com
The example template specifies a name constraint that allows UPN subject alternative names that have a domain part @example.com
, and explicitly disallows Administrator@example.com
. The NoDefault = TRUE
is required for compatibility reasons with PrivX.
See https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/constraints-what-they-are-and-how-they-amp-8217-re-used/ba-p/1129048 for more information.
- Attach the name constraints to the CSR by executing the following command:
$ certreq -policy privx-im-ca.req policy.inf privx-im-ca-constraints.req
The CSR in privx-im-ca-constraints.req
includes the name constraints.
Signing the CSR
Sign the CSR with the windows CA to create the PrivX sub CA certificate.
Importing the Signed Sub CA certificate
Follow the instructions in Trusted CA for Certificate Authentication to import the signed sub-CA certificate to PrivX.