/usr/share/pki/ca/profiles/ca/AdminCert.cfg is in pki-ca 10.6.0-1ubuntu2.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 | desc=This certificate profile is for enrolling Administrator's certificates suitable for use by clients such as browsers.
visible=true
enable=true
enableBy=admin
auth.instance_id=
name=Manual Administrator Certificate Enrollment
input.list=i1,i2,i3
input.i1.class_id=certReqInputImpl
input.i2.class_id=submitterInfoInputImpl
input.i3.class_id=subjectDNInputImpl
output.list=o1
output.o1.class_id=certOutputImpl
policyset.list=adminCertSet
policyset.adminCertSet.list=1,2,3,4,5,6,7,8
policyset.adminCertSet.1.constraint.class_id=subjectNameConstraintImpl
policyset.adminCertSet.1.constraint.name=Subject Name Constraint
policyset.adminCertSet.1.constraint.params.pattern=.*
policyset.adminCertSet.1.constraint.params.accept=true
policyset.adminCertSet.1.default.class_id=userSubjectNameDefaultImpl
policyset.adminCertSet.1.default.name=Subject Name Default
policyset.adminCertSet.1.default.params.name=
policyset.adminCertSet.2.constraint.class_id=validityConstraintImpl
policyset.adminCertSet.2.constraint.name=Validity Constraint
policyset.adminCertSet.2.constraint.params.range=365
policyset.adminCertSet.2.constraint.params.notBeforeCheck=false
policyset.adminCertSet.2.constraint.params.notAfterCheck=false
policyset.adminCertSet.2.default.class_id=validityDefaultImpl
policyset.adminCertSet.2.default.name=Validity Default
policyset.adminCertSet.2.default.params.range=365
policyset.adminCertSet.2.default.params.startTime=0
policyset.adminCertSet.3.constraint.class_id=keyConstraintImpl
policyset.adminCertSet.3.constraint.name=Key Constraint
policyset.adminCertSet.3.constraint.params.keyType=RSA
policyset.adminCertSet.3.constraint.params.keyParameters=1024,2048,3072,4096
policyset.adminCertSet.3.default.class_id=userKeyDefaultImpl
policyset.adminCertSet.3.default.name=Key Default
policyset.adminCertSet.4.constraint.class_id=noConstraintImpl
policyset.adminCertSet.4.constraint.name=No Constraint
policyset.adminCertSet.4.default.class_id=authorityKeyIdentifierExtDefaultImpl
policyset.adminCertSet.4.default.name=Authority Key Identifier Default
policyset.adminCertSet.5.constraint.class_id=noConstraintImpl
policyset.adminCertSet.5.constraint.name=No Constraint
policyset.adminCertSet.5.default.class_id=authInfoAccessExtDefaultImpl
policyset.adminCertSet.5.default.name=AIA Extension Default
policyset.adminCertSet.5.default.params.authInfoAccessADEnable_0=true
policyset.adminCertSet.5.default.params.authInfoAccessADLocationType_0=URIName
policyset.adminCertSet.5.default.params.authInfoAccessADLocation_0=
policyset.adminCertSet.5.default.params.authInfoAccessADMethod_0=1.3.6.1.5.5.7.48.1
policyset.adminCertSet.5.default.params.authInfoAccessCritical=false
policyset.adminCertSet.5.default.params.authInfoAccessNumADs=1
policyset.adminCertSet.6.constraint.class_id=keyUsageExtConstraintImpl
policyset.adminCertSet.6.constraint.name=Key Usage Extension Constraint
policyset.adminCertSet.6.constraint.params.keyUsageCritical=true
policyset.adminCertSet.6.constraint.params.keyUsageDigitalSignature=true
policyset.adminCertSet.6.constraint.params.keyUsageNonRepudiation=true
policyset.adminCertSet.6.constraint.params.keyUsageDataEncipherment=true
policyset.adminCertSet.6.constraint.params.keyUsageKeyEncipherment=true
policyset.adminCertSet.6.constraint.params.keyUsageKeyAgreement=false
policyset.adminCertSet.6.constraint.params.keyUsageKeyCertSign=false
policyset.adminCertSet.6.constraint.params.keyUsageCrlSign=false
policyset.adminCertSet.6.constraint.params.keyUsageEncipherOnly=false
policyset.adminCertSet.6.constraint.params.keyUsageDecipherOnly=false
policyset.adminCertSet.6.default.class_id=keyUsageExtDefaultImpl
policyset.adminCertSet.6.default.name=Key Usage Default
policyset.adminCertSet.6.default.params.keyUsageCritical=true
policyset.adminCertSet.6.default.params.keyUsageDigitalSignature=true
policyset.adminCertSet.6.default.params.keyUsageNonRepudiation=true
policyset.adminCertSet.6.default.params.keyUsageDataEncipherment=true
policyset.adminCertSet.6.default.params.keyUsageKeyEncipherment=true
policyset.adminCertSet.6.default.params.keyUsageKeyAgreement=false
policyset.adminCertSet.6.default.params.keyUsageKeyCertSign=false
policyset.adminCertSet.6.default.params.keyUsageCrlSign=false
policyset.adminCertSet.6.default.params.keyUsageEncipherOnly=false
policyset.adminCertSet.6.default.params.keyUsageDecipherOnly=false
policyset.adminCertSet.7.constraint.class_id=noConstraintImpl
policyset.adminCertSet.7.constraint.name=No Constraint
policyset.adminCertSet.7.default.class_id=extendedKeyUsageExtDefaultImpl
policyset.adminCertSet.7.default.name=Extended Key Usage Extension Default
policyset.adminCertSet.7.default.params.exKeyUsageCritical=false
policyset.adminCertSet.7.default.params.exKeyUsageOIDs=1.3.6.1.5.5.7.3.2,1.3.6.1.5.5.7.3.4
policyset.adminCertSet.8.constraint.class_id=signingAlgConstraintImpl
policyset.adminCertSet.8.constraint.name=No Constraint
policyset.adminCertSet.8.constraint.params.signingAlgsAllowed=SHA1withRSA,SHA256withRSA,SHA512withRSA,MD5withRSA,MD2withRSA,SHA1withDSA,SHA1withEC,SHA256withEC,SHA384withRSA,SHA384withEC,SHA512withEC
policyset.adminCertSet.8.default.class_id=signingAlgDefaultImpl
policyset.adminCertSet.8.default.name=Signing Alg
policyset.adminCertSet.8.default.params.signingAlg=-
|