Properties for specifying the path validation options.
Require Explicit Policy
Select this option to specify that the
path must be valid for at least one of the certificate policies
in the user initial policy set. When this option is deselected,
the path validity is not required. By default, the option is deselected.
Inhibit ANY Policy
Select this option to specify that a policy
object identifier (OID) must be processed if it is included in a
certificate. When deselected, any policy can be selected. By default,
the option is deselected.
Check All Paths
Select this option to require all paths to a
trust anchor must be validated. When this option is deselected,
all paths to a trust anchor are not validated. By default, the option
is deselected.
Inhibit Policy Mapping
Determines whether policy mapping is allowed
in the certification path. If selected, policy mapping is allowed.
This option is not selected by default.
LDAP Server
Sets the URL or path of the Lightweight Directory
Access Protocol (LDAP) server used to retrieve information about
the certificate revocation list (CRL). The LDAP server searches
for CRL information using the distinguished name (DN) according
to the rules specified in RFC
3280, section 4.2.1.14. For example, you can type www.ldap.com for
the URL or ldap://ssl.ldap.com:200 for the path
and port.
Follow URIs in Certificate AIA
Select this option to specify
to follow any URIs specified in the certificate’s Authority Information
Access (AIA) extension for path discovery. The AIA extension specifies
where to find up-to-date certificates. When this option is deselected,
no URIs are processed in the AIA extension from the certificate.
By default, the option is deselected.
Basic Constraints Extension required in CA Certificates
Select
this option to specify that the certificate authority (CA) Basic
Constraints certificate extension must be present for CA certificates.
Some early German certified root certificates (7 and earlier) are
not compliant to RFC 3280 and do not contain the basic
constraint extension. If it is known that a user's EE certificate chains
up to such a German root, deselect this option. When this option
is deselected, the presence of the CA Basic Constraints certificate
in CA certificates is not required. By default, the value is selected.
Require Valid Certificate Signature During chain building
Select
this option to require that all Digital Signature Algorithm (DSA)
signatures on certificates be valid before a chain is built. For
example, in a chain CA > ICA > EE where the signature for
EE is not valid, the chain building stops at ICA. EEs are not included
in the chain. When this option is deselected, the entire chain is
built regardless of whether an invalid DSA signature is encountered.
By default, the option is deselected.