February 12, 2002
Practical Aspects of Modern Cryptography
34
Even more extensions
nPolicy mappings
nConvert one policy ID into another
nBasic constraints
nIs the cert a CA cert?’
nLimits on path length beneath this cert
nName constraints
nLimits on types of certs this key can issue
nPolicy constraints
nAnti-matter for policy mappings