> If you are including a value in there that is meant to be read by a person,
> then yes. If you are including a value in there that is meant to be
> interpretted and acted upon by a Relying Party computer program, then no -
> but then, as I said in my previous message, if you include a private
> extension, the chances of either of these being possible with a
> non-proprietary client is approximately nil. If your certificates are only
> ever being used by a proprietary client in a closed community, then feel free
> to add Private Extensions. If not, then it would probably be better to find a
> way to express what you want to convey using one of the standard extensions.

ah, now that clears things up. Thanks Patrick.

I am toying with the efficacy to use certificate attributes to make
application decisions (access control, look and feel, etc), so yes, a
private, closed system.

My idea, not a new one by any means, is to separate user provisioning
from application logic. I want to have an authoritative source of the
user and their role, and based on that, the application does something
special. I know there are probably easier ways to do this like assign
a user a role in the app, but I may want to have the user access
multiple apps and using a certificate seems like a good option. I will
certainly use the standard options where I can. I am reading through
the IETF PKIX docs even as we speak.

Oil
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to