The Google Public Key Infrastructure (“Google PKI”), has been established by Google Trust Services LLC (“Google”), to enable reliable and secure identity authentication, and to facilitate the preservation of confidentiality and integrity of data in electronic transactions. This document is issued by Google to identify the practices and procedures that Google employs in issuing certificates from its Certificate Authorities within the Google PKI.
As of 2021-12-05, Google Trust Services no longer issues Organization Validated (OV) End-Entity certificates for TLS.
This document is the Google Certification Practice Statement (CPS). It has been published to describe procedural and operational practices that Google has adopted to implement the Google Certificate Policy (CP) and applicable requirements defined in governing industry standards.
The described practices relate to services and solutions used throughout the lifecycle of the CAs governed by this CPS and the certificates issued from them.
Google requires its affiliated entities, Applicants, Subscribers, and Relying Parties who are involved in issuing and managing digital certificates within the Google PKI hierarchy to adhere to this CPS. Other important documents that accompany this CPS include the CP and associated Subscriber and Relying Party Agreements.
This CPS is structured in accordance with the Internet Engineering Task Force (IETF) standard RFC 3647.
See Appendix D.
Compliance | Section(s) | Summary Description (See Full Text for Details) |
---|---|---|
2017-09-08 | 3.2.2.8 | CAs MUST check and process CAA records |
2018-08-01 | 3.2.2.4 | The validation method in Section 3.2.2.4.1 BR may no longer be used |
2018-10-14 | 4.9.1 | Revocation timelines extended |
2019-01-15 | 7.1.4.2.1 | All certificates containing an underscore character in any dNSName entry and having a validity period of more than 30 days MUST be revoked prior to January 15, 2019 |
2019-05-01 | 7.1.4.2.1 | underscore characters (“_”) MUST NOT be present in dNSName entries |
2019-08-01 | 3.2.2.5 | IP Address validation methods updated |
2020-06-03 | 3.2.2.4.6 | CAs may not perform certificate validations using method 3.2.2.4.6 |
2023-01-15 | 7.2.2 | Sharded or partitioned CRLs MUST have a distributionPoint |
2023-07-15 | 4.9.1.1 and 7.2.2 | New CRL entries (for specific types of revocations) MUST have a revocation reason code |
The term Certification Authority (CA) is an umbrella term that refers to all entities authorized to issue, manage, revoke, and renew certificates. Moreover it can refer to the infrastructure and key material from which such an entity issues and signs certificates.
This CPS covers all certificates issued and signed by the following CAs hereinafter referred to as 'Google CAs'.
GTS Root R1
Key: RSA 4096
Serial#: 6e:47:a9:c5:4b:47:0c:0d:ec:33:d0:89:b9:1c:f4:e1
Thumbprint: e1:c9:50:e6:ef:22:f8:4c:56:45:72:8b:92:20:60:d7:d5:a7:a3:e8
Valid until: Jun 22, 2036
GTS Root R1
Key: RSA 4096
Serial#: 02:03:e5:93:6f:31:b0:13:49:88:6b:a2:17
Thumbprint: E5:8C:1C:C4:91:3B:38:63:4B:E9:10:6E:E3:AD:8E:6B:9D:D9:81:4A
Valid until: Jun 22, 2036
GTS Root R2
Key: RSA 4096
Serial#: 6e:47:a9:c6:5a:b3:e7:20:c5:30:9a:3f:68:52:f2:6f
Thumbprint: d2:73:96:2a:2a:5e:39:9f:73:3f:e1:c7:1e:64:3f:03:38:34:fc:4d
Valid until: Jun 22, 2036
GTS Root R2
Key: RSA 4096
Serial#: 02:03:e5:ae:c5:8d:04:25:1a:ab:11:25:aa
Thumbprint: 9A:44:49:76:32:DB:DE:FA:D0:BC:FB:5A:7B:17:BD:9E:56:09:24:94
Valid until: Jun 22, 2036
GTS Root R3
Key: ECC 384
Serial#: 6e:47:a9:c7:6c:a9:73:24:40:89:0f:03:55:dd:8d:1d
Thumbprint: 30:d4:24:6f:07:ff:db:91:89:8a:0b:e9:49:66:11:eb:8c:5e:46:e5
Valid until: Jun 22, 2036
GTS Root R3
Key: ECC 384
Serial#: 02:03:e5:b8:82:eb:20:f8:25:27:6d:3d:66
Thumbprint: ED:E5:71:80:2B:C8:92:B9:5B:83:3C:D2:32:68:3F:09:CD:A0:1E:46
Valid until: Jun 22, 2036
GTS Root R4
Key: ECC 384
Serial#: 6e:47:a9:c8:8b:94:b6:e8:bb:3b:2a:d8:a2:b2:c1:99
Thumbprint: 2a:1d:60:27:d9:4a:b1:0a:1c:4d:91:5c:cd:33:a0:cb:3e:2d:54:cb
Valid until: Jun 22, 2036
GTS Root R4
Key: ECC 384
Serial#: 02:03:e5:c0:68:ef:63:1a:9c:72:90:50:52
Thumbprint: 77:D3:03:67:B5:E0:0C:15:F6:0C:38:61:DF:7C:E1:3B:92:46:4D:47
Valid until: Jun 22, 2036
Root R4
Key: ECC 256
Serial#: 2a:38:a4:1c:96:0a:04:de:42:b2:28:a5:0b:e8:34:98:02
Thumbprint: 69:69:56:2e:40:80:f4:24:a1:e7:19:9f:14:ba:f3:ee:58:ab:6a:bb
Valid until: Jan 19, 2038
Root R4
Key: ECC 256
Serial#: 02:03:e5:7e:f5:3f:93:fd:a5:09:21:b2:a6
Thumbprint: 6B:A0:B0:98:E1:71:EF:5A:AD:FE:48:15:80:77:10:F4:BD:6F:0B:28
Valid until: Jan 19, 2038
Prior to 11 August 2016, the Roots R4, GTS Root R1, GTS Root R2, GTS Root R3 and GTS Root R4 were operated by GMO GlobalSign, Inc. according to GMO GlobalSign, Inc.'s Certificate Policy and Certification Practice Statement. Between 11 August 2016 and 8 December 2016, Google Inc. operated these Roots according to Google Inc.'s Certification Practice Statement. As of 9 December 2016, Google Trust Services LLC operates these Roots under Google Trust Services LLC's Certificate Policy and Certification Practice Statement.
The CA certificates of the above listed CAs can be retrieved at https://pki.goog/repository/.
The CA certificates of the above listed CAs can be retrieved at https://pki.goog/repository/.
GTS CA 1C3
Key: RSA 2048
Serial#: 02:03:bc:53:59:6b:34:c7:18:f5:01:50:66
Thumbprint: 1E:7E:F6:47:CB:A1:50:28:1C:60:89:72:57:10:28:78:C4:BD:8C:DC
Valid until: Sep 30, 2027
GTS CA 1D4
Key: RSA 2048
Serial#: 02:00:8e:b2:02:33:36:65:8b:64:cd:db:9b
Thumbprint: 34:9C:38:5F:F8:E3:30:F2:0E:AD:73:3C:D3:6F:B4:35:FE:E0:B4:03
Valid until: Sep 30, 2027
GTS CA 1P5
Key: RSA 2048
Serial#: 02:03:bc:50:a3:27:53:f0:91:80:22:ed:f1
Thumbprint: 9C:0B:25:2A:67:8A:08:7F:BE:E4:96:A4:43:77:F7:55:6A:C6:05:E7
Valid until: Sep 30, 2027
GTS CA 2A1
Key: ECC 256
Serial#: 02:00:8e:b2:58:e7:b5:94:0c:1f:f9:00:44
Thumbprint: 79:03:AF:3E:5C:91:E5:EC:49:71:9B:18:18:0A:91:52:06:71:A1:DC
Valid until: Sep 30, 2025
GIAG4
Key: RSA 2048
Serial#: 01:f0:9c:57:54:57:97:60:87:2c:7c:24:73
Thumbprint: bd:1f:9a:24:e0:7d:4b:35:72:6e:d7:f0:65:7a:6f:d9:47:1a:06:72
Valid until: Dec 15, 2021
GIAG4x
Key: RSA 2048
Serial#: 02:03:f3:58:88:16:16:0e:0a:45:27:f2:a5
Thumbprint: B6:DB:76:76:B9:A0:32:F2:DD:5F:F5:80:9C:D5:5B:32:87:62:60:CC
Valid until: Sep 30, 2023
GIAG4 ECC
Key: RSA 2048
Serial#: 01:f0:9c:57:8a:e0:e9:fc:18:55:86:7c:64
Thumbprint: 67:5c:c5:44:ce:97:be:5f:a8:27:9e:6a:d7:1a:b6:3b:fb:4f:9a:ab
Valid until: Nov 1, 2028
GTSY1
Key: RSA 2048
Serial#: 01:f0:f7:9d:5e:78:27:fb:40:a9:12:b3:10
Thumbprint: cd:88:fa:9d:ca:57:2c:5b:8c:3e:ed:3d:a2:e2:62:45:75:46:3f:30
Valid until: Nov 1, 2028
GTSY2
Key: RSA 2048
Serial#: 01:f0:9c:5b:0e:a2:29:37:cf:9e:e4:41:6c
Thumbprint: ee:4b:6b:b1:8f:4c:d1:53:2e:59:1a:19:51:39:49:b1:bf:96:a8:fb
Valid until: Nov 1, 2028
GTSY3
Key: ECC 256
Serial#: 01:fe:a5:80:c2:58:a7:31:cb:c3:b3:9e:ab
Thumbprint: 76:2c:6a:94:dc:8a:51:34:84:84:9d:6a:60:10:27:7d:0f:ff:97:2a
Valid until: Nov 1, 2028
GTSY4
Key: ECC 256
Serial#: 01:fe:a5:81:44:7e:3b:fd:3b:b8:1c:24:98
Thumbprint: 6b:2b:4a:95:87:8c:f5:a9:42:f6:4c:f3:d5:45:f7:70:c8:2b:14:19
Valid until: Nov 1, 2028
GTS CA 1D8
Key: RSA 2048
Serial#: 02:19:c1:5a:c0:25:a1:b0:a5:c1:d9:d5:01
Thumbprint: 0B:F8:45:1E:D4:F9:EE:E2:6B:22:B0:50:45:82:50:BF:AC:C3:E1:B2
Valid until: Sep 30, 2027
GTS CA 2D3
Key: ECC 256
Serial#: 02:16:68:d8:d6:5b:c4:32:0e:5b:8e:5e:76
Thumbprint: E2:FD:A7:74:4E:46:30:C2:05:26:42:F2:A4:6A:60:28:CE:C4:0C:93
Valid until: Sep 30, 2027
GTS CA 2D4
Key: ECC 256
Serial#: 02:16:68:f1:cd:0a:2a:8f:84:7d:8a:ad:34
Thumbprint: 28:6E:1C:75:BA:D5:91:58:3E:A6:17:80:D6:04:BA:51:71:24:0C:A4
Valid until: Sep 30, 2027
GTS CA 2P2
Key: ECC 256
Serial#: 02:16:68:25:e1:70:04:40:61:24:91:f5:40
Thumbprint: 6C:BA:4F:13:68:C0:46:AA:0F:F4:B6:ED:7E:67:D5:4A:30:5B:E9:D7
Valid until: Sep 30, 2027
The CA certificates of the above listed CAs can be retrieved at https://pki.goog/repository/.
The following (only non-revoked and non-expired) externally operated subordinate CAs have a Google CA listed as the issuer of their CA certificate.
GTS LTSR
Key: ECC 256
Serial#: 01:f0:f7:9d:59:dd:6e:50:f7:42:73:71:50
Thumbprint: d5:8c:a7:a1:b4:1f:f8:fe:4d:63:7f:ee:ff:ae:50:4a:aa:ff:4f:6f
Valid until: Nov 1, 2042
GTS LTSX
Key: ECC 256
Serial#: 01:f4:0a:99:c9:b7:a8:55:70:4f:4f:b7:9d
Thumbprint: 86:01:b1:60:2d:dc:3b:a8:af:b9:92:82:83:d0:d7:d7:70:30:66:83
Valid until: Apr 1, 2029
Registration Authorities (RAs) are entities that approve and authenticate requests to obtain, renew, or revoke Certificates. RAs are generally responsible for identifying and authenticating Applicants for Certificates, verifying their authorization to request Certificates, approving individuals, entities, and/or devices to be named in Certificates, and authorizing and/or requesting a CA to issue, renew, or revoke a Certificate to an individual, entity or device.
All RA functions for the Google CAs listed in this CPS are performed by Google.
Subscribers use Google certificates to support their transactions and communications.
A Subscriber is an individual or organization for whom Google has issued a Certificate on the basis of a Certificate Application. Google may allow Applicants to submit a Certificate Application through the product of a Google Affiliate or directly through an appropriate API. OV certificates include the name of the Subscriber as part of the subject of the certificate.
All Subscribers are required to enter into an agreement that, with respect to each Google Certificate issued to them as a Subscriber, obligates them to:
A Relying Party is any individual or entity that acts in reliance on a Google Certificate to verify a digital signature and/or decrypt an encrypted document or message. Relying Parties may include Google and Google Affiliates, as well as unaffiliated individuals or entities.
Not applicable.
Appropriate Certificate uses under this CPS are all uses for the purpose of authentication, using digital signatures, encryption and access control which are consistent with the key usage extension fields of the respective Certificate and are not in violation of the CP, this CPS, applicable law or any agreement made between the Subscriber and Google.
Certificates are not proof of the trustworthiness or honesty of the subscriber nor do they indicate the subscriber's compliance with any law. By issuing a certificate Google merely confirms that it has used reasonable means to verify the information in the certificate before it was issued.
Certificates issued under this CPS are not intended and may not be used for any application requiring fail-safe performance such as (a) the operation of nuclear power facilities, (b) air traffic control systems, (c) aircraft navigation systems, (d) weapons control systems, or (e) any other system whose failure could lead to injury, death or environmental damage.
Google certificates may not be used for man-in-the middle purposes or where usage is prohibited by law.
The Google CA Policy Authority is responsible for the drafting, maintenance, and interpretation of this Certification Practice Statement.
Google Trust Services LLC
CA Policy Authority
1600 Amphitheatre Parkway
Mountain View, CA 94043
contact@pki.goog
Subscribers, Relying Parties, Application Software Suppliers, and other third parties may contact us concerning service outages, security issues or any other matter related to Certificates by using the contact form at https://pki.goog/ or by sending an email to contact@pki.goog.
Certificate Problem Reports and other requests for certificate revocation e.g. due to suspected Private Key compromises, Certificate misuse, or other types of fraud, compromise, misuse or inappropriate conduct have to be submitted following the process and instructions described in Section 4.9.3 of this CPS.
The Google CA Policy Authority determines the suitability and applicability of this CPS.
Google may modify this CPS at any time by posting a revised version in the Repository (https://pki.goog/).
New CPS versions are approved by the CA Policy Authority and become effective upon posting.
See Appendix A.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in these Requirements SHALL be interpreted in accordance with RFC 2119.
The CAs listed in this CPS are operated by
Google Trust Services LLC
1600 Amphitheatre Parkway
Mountain View, CA 94043
contact@pki.goog
Google maintains a Repository which comprises its root certificates, its current CP and CPS, Subscriber Agreements, Relying Party Agreements, and the most recent revocation information for certificates it has issued.
Additionally Google publishes all non-constrained Subordinate CA Certificates and all Cross Certificates it issues including a link to the CPS under which they were issued.
Google represents that it will adhere to the latest version of the CP published in the Repository.
The Repository can be accessed at https://pki.goog/repository/.
Google makes CRLs and OCSP responses for its CAs publicly available through online resources that can be reached 24 hours a day, 7 days a week and are designed to minimize downtime.
CA | CRL |
---|---|
GTS Root R1 | http://crl.pki.goog/gtsr1/gtsr1.crl |
GTS Root R2 | http://crl.pki.goog/gtsr2/gtsr2.crl |
GTS Root R3 | http://crl.pki.goog/gtsr3/gtsr3.crl |
GTS Root R4 | http://crl.pki.goog/gtsr4/gtsr4.crl |
Root R4 | http://crl.globalsign.net/root-r4.crl |
The OCSP responder can be reached under http://ocsp.pki.goog/, as specified in issued certificates.
Web pages that can be used by application software suppliers to test their software with subscriber certificates that chain up to each publicly trusted root certificate are listed at https://pki.goog/repository/.
Google conforms to the current version of the CA/Browser Forum's Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates published at http://www.cabforum.org.
CA Certificates are published prior to their usage for issuing to Subscribers.
CRLs are updated promptly upon the revocation of a Certificate, but in no case more than one (1) business day following revocation. The CRLs are periodically updated and reissued at least every seven (7) days, and their validity period is limited to ten (10) days.
Google reviews and updates this CPS annually and publishes the updated version typically within seven (7) days after its approval.
The Repository is publicly available. Google operates physical and logical security controls to protect the repository from unauthorized modification or deletion.
OV Certificates contain an X.501 distinguished name in the Subject name field, and incorporate the following attributes:
DV Certificates contain an X.501 distinguished name in the Subject name field, and incorporate the following optional attributes:
Both OV and DV certificates also incorporate the Subject Alternative Name (SAN) extension, which must contain the value of CN from the Subject (if present), and may contain other names that apply to the subject.
Domain names included in the CN or SAN attributes must identify one or more specific hosts. Google may issue wildcard Certificates, which identify a set of hosts, as well as Certificates which identify an IP Address.
Subscribers are not permitted to use pseudonyms.
No stipulation.
The CN attribute in root Certificates identifies the publisher and is unique.
Certificate Applicants are prohibited from requesting certificates that contain content which infringes on the intellectual property and commercial rights of others. Google does not determine whether Certificate Applicants have intellectual property rights in the name used in a Certificate Application nor does Google resolve any dispute concerning the ownership of a domain name or trademark. Google may reject any Certificate Application and revoke any Certificate because of such a dispute.
The Certificate Applicant must prove ownership of the private key by providing a PKCS #10 compliant certificate signing request, or a cryptographically equivalent proof.
For OV Certificates, the Applicant's identity and its address are validated by using one of the following:
For S/MIME certificates, Applicant information is validated by using one of the following:
An email challenge/response procedure which consists of sending a Random Value to the email address to be included in the Certificate to verify that the Applicant controls the email address.
A database maintained by the mail service provider which is periodically updated and considered a Reliable Data Source for identifying authorized certificate requesters.
By verifying domain control over the email domain using one of the procedures listed under section 3.2.2.
Google does not include DBA/Tradenames into Certificates. OV Certificates include the company name of the Subscriber.
If the countryName attribute of the subject is present, then Google verifies the country associated with the Subject using one of the following:
Prior to issuing a Certificate, Google validates that the Applicant has control over each FQDN listed in the Certificate by using at least one of the following approved methods as defined in the BR at the time of validation:
Validation for wildcard domain requests are completed using the DNS Change method.
For Certificates issued on or after 2021-12-01 and FQDNs not validated using the DNS Change method, Google does not issue Certificates for other FQDNs that end with all the Domain Labels of the validated FQDN unless Google performs a separate validation for that FQDN using an authorized method.
Google maintains records that indicate which validation method, including relevant BR version number, was used for each domain name.
In addition, Google may supplement its validation procedure with checks against internal data sources.
Google does not issue certificates for FQDNs that contain "onion" as the rightmost Domain Label.
IP address authentication is performed in accordance with the procedures set out in Section 3.2.2.5 BR.
For each IP Address listed in a Certificate, Google confirms that, as of the time of Certificate issuance, the Applicant has control over the IP Address by using at least one of the following approved methods as defined in the BR at the time of validation:
Google maintains a record of which IP validation method, including relevant BR version number, was used to validate every IP address.
Google has established and follows a documented procedure that determines if a wildcard character in a CN or subjectAltName of type DNS‐ID occurs in the first label position to the left of a "registry‐controlled" label or "public suffix" (e.g. ".com",".co.uk", see RFC 6454 Section 8.2 for further explanation). If the FQDN portion of the Wildcard Doman Name is "registry‐controlled" or is a "public suffix", Google refuses issuance unless the Applicant proves its rightful control of the entire Domain Namespace.
All data sources are evaluated for reliability, accuracy, and for their protection from alteration and falsification before they are used for I&A purposes.
Data sources are revalidated in accordance with the following terms.
Google's policy on checking CAA records is stated in Section 4.2.4.
Google does not issue IV Certificates to natural persons.
Google does not include unverified subject information in Subscriber Certificates.
Google uses a reliable method of communication with the Applicant or its representative.
The authority of Certificate Applicants to request Certificates on behalf of an organization is verified during the validation of the Applicant's identity.
Google may allow Applicants to specify in writing the individuals who may request Certificates on its behalf. Where such a specification has been made, Google does not accept certificate requests that are outside this specification but will upon written request provide the Applicant a list of its authorized certificate requesters.
For OV certificates, all domain names to be included in a Certificate must be owned by Google or a Google Affiliate. An OV Certificate will not be issued for domain names which do not meet this requirement.
All Cross Certificates that identify a Google CA as the Subject are listed in the Repository, provided that Google has arranged for or accepted the establishment of the trust relationship.
I&A procedures for re-key requests are the same as for initial Certificate applications. See Section 3.2.2.
See Section 3.2.2.
See Section 3.2.2.
Subscribers can use their ACME account key to authenticate and submit a revocation request via the Google ACME API.
Revocation requests which are not made via ACME are evaluated on a case by case basis. If identification and authentication procedures are required, Google selects these procedures based on the circumstances of the request and follows a documented process.
Identification and authentication is not required in cases where the revocation request is made by Google or where the request is made by reference to a revocation reason that is independent of the requester's identity.
Applications for an OV Certificate may be submitted by a representative employed by or contracted by, and authorized to act on behalf of, the applicant organization. In addition, applications for a DV Certificate can be submitted by any person through Google's ACME request workflow or through a Google product that offers a certificate request function.
Google maintains an internal database of all previously revoked Certificates and previously rejected certificate requests. That database is used to identify subsequent suspicious certificate requests.
Applicants seeking to obtain a Google Certificate must submit to Google a certificate application including a certificate request and provide at a minimum, the following:
One certificate request may be used for multiple Certificates to be issued to the same Applicant.
By executing the Subscriber Agreement, Subscribers warrant that all of the information contained in the certificate request is correct.
Google performs the applicable certificate validation procedures and as required verifies the completeness, accuracy and authenticity of the information provided by the Applicant prior to issuing a Certificate. The procedures include:
Google performs identification and authentication functions during the Certificate application process.
Certificate Applications are not approved unless Google has obtained all necessary information as specified in Section 4.1.2. If missing information cannot be readily obtained from a trusted internal data source, Google may ask the Applicant to provide the required information in an alternative form.
Data obtained for identification and authentication purposes from a trusted third party source, is confirmed with the Applicant before it is used.
Google maintains procedures to identify High Risk Certificate Requests that require additional verification activity prior to their approval. This includes maintaining an internal database of all Certificates that have previously been revoked and all certificate requests that have been rejected due to suspected phishing or other fraudulent usage or concerns. This information is used during identification and authentication to identify suspicious certificate requests.
Google only considers Certificate applications for which all required subscriber information has been provided and validated. All other applications will be rejected.
Certificate applications that contain a new gTLD are not approved while the gTLD is still under consideration by ICANN.
Applications for subordinate CAs are not approved unless the CA in question will be operated by Google or one of its affiliates and will be governed by the CP and this CPS.
Google does not issue publicly trusted SSL Certificates to Internal Names or Reserved IP Addresses
Where Google has entered into a written Service Level Agreement with the Applicant Google will process certificate applications in accordance with the Service Level Objectives defined therein. Otherwise certificate applications will be processed within a reasonable timeframe.
Google checks for a CAA record for each dNSName in the subjectAltName extension of the Certificate to be issued, according to the procedure in RFC 8659, following the processing instructions set down in RFC 8659 for any records found.
The following Issuer Domain Names in CAA "issue" or "issuewild" records are recognized as permitting Google to issue:
If Google issues, it does so within the TTL of the CAA record, or 8 hours, whichever is greater.
When processing CAA records, Google processes the issue, issuewild and iodef property tags as specified in RFC 8659, but does not act on the contents of the iodef property tag.
A Certificate is not issued if an unrecognized property has the critical flag set.
Google may decide not to check for a CAA record:
For certificates for which a Certificate Transparency pre‐certificate was created and logged in at least two public logs, and for which CAA was checked;
For certificates issued by a Technically Constrained Subordinate CA Certificate as set out in Baseline Requirements Section 7.1.5, where the lack of CAA checking is an explicit contractual provision in the contract with the Applicant.
When checking CAA records, a lookup failure is treated as permission to issue if:
Google documents potential issuance that was prevented by a CAA record in sufficient detail to provide feedback to the CA/B Forum on the circumstances.
CAA record checking results are logged in certificate lifecycle management event logs (see Section 5.4.1).
URL schemes in the iodef record other than mailto: or https: are not supported.
Google may decide to check for the existence of specific CAA parameters depending on the policy of the certificate that will be issued.
Google may choose to limit issuance according to RFC 8657.
Prior to issuing a Certificate Google processes the Certificate Application and performs the required I&A procedures in accordance with this CPS. Once these procedures have been completed, the Certificate is generated and the appropriate key usage extension added.
Prior to signing a Certificate Google performs conformance linting using appropriate tooling. Linting is done over the precertificate and the issued certificate. If linting reports a nonconformity, a report is generated and issuance is halted.
Certificate Issuance by a root CA requires a CA Engineer to deliberately issue a direct command in order to perform the certificate signing operation.
After issuing the Certificate, Google will notify the Applicant via email or an alternate means of communication and will provide the Applicant with appropriate instructions on how to obtain the Certificate. Delivery of the Certificate will be made via a designated Google service.
The Subscriber indicates acceptance of a Certificate by obtaining it.
By accepting a Certificate, the Subscriber agrees to be bound by the continuing responsibilities, obligations and duties imposed by the Subscriber Agreement and this CPS, and represents and warrants that:
Google publishes the CA certificates of all CAs it operates in the Repository.
Google may notify the public of the issuance of a certificate by submitting it to one or more publicly accessible Certificate Transparency logs.
See Section 9.6.3, provisions 2. and 4.
No stipulation.
Certificate renewal is the process whereby a new Certificate with an updated validity period is created for an existing Key Pair.
As a general rule, Google does not offer Certificate renewal. Whenever a Google Certificate expires, the Subscriber is required to generate a new Key Pair and request a new Certificate in accordance with this CPS.
No stipulation.
No stipulation.
No stipulation.
No stipulation.
No stipulation.
No stipulation.
Google treats certificate re-key requests as requests for the issuance of a new Certificate.
See Section 4.1.1.
See Section 4.2.
See Section 4.3.2.
See Section 4.4.1.
See Section 4.4.2.
See Section 4.4.3.
Google does not modify previously issued subscriber certificates. Any request for certificate modification will be treated as a request for the issuance of a new Certificate.
Google may modify CA Certificates in accordance with the BR and this CPS.
No stipulation.
See Section 4.1.1.
See Section 4.2.
See Section 4.3.2.
See Section 4.4.1.
See Section 4.4.2.
See Section 4.4.3.
Google supports Certificate Revocation. Certificate suspension is not used.
When a Certificate is Revoked, it is marked as revoked by having its serial number added to the CRL to indicate its status as revoked. In addition, a signed OCSP response indicating the revoked status is generated.
Certificates that have expired are not revoked.
Google will revoke a Subscriber Certificate within 24 hours and use the corresponding CRLReason (see Section 7.2.2) if one or more of the following occurs:
Google will revoke a certificate within 5 days and use the corresponding CRLReason if one or more of the following occurs:
Google will revoke a Subordinate CA Certificate within seven (7) days if one or more of the following occurs:
Certificate revocation can be requested by:
Google maintains capabilities to receive Certificate revocation requests 24/7.
Revocation requests made by the Subscriber and revocation requests made on the basis of a claimed key compromise must be submitted using the appropriate Google ACME API.
If the concerned certificate has not been requested via ACME, the request must be submitted using the communication method that was used for the certificate request or through an alternative communication method approved by Google.
All other revocation requests must be submitted in English using the contact form available at http://pki.goog/.
Information on how to select revocation reason codes is provided in Sections 4.9.1.1. and 7.2.2..
Certificate revocation requests are processed in accordance with Google's Certificate revocation procedures.
If Google determines that revocation is warranted, it updates the status information of the concerned Certificate. The certificate is deemed revoked when the updated status information has been published at the relevant CRL or OCSP responder.
The revocationDate field of a CRL may be backdated to enter keyCompromise as the CRLReason in the reasonCode extension. In these cases, the revocationDate field is set to the date when the certificate is first considered to be compromised.
Where deemed appropriate, Google may also forward the case to law enforcement.
Google may grant revocation grace periods.
Within 24 hours after receiving a Certificate Problem Report, Google will investigate the facts and circumstances related to a Certificate Problem Report and provide a preliminary report on its findings to both the Subscriber and the entity who filed the Certificate Problem Report.
After having investigated the facts and circumstances, Google will work with the Subscriber and any entity reporting the Certificate Problem Report or other revocation-related notice to establish whether or not the certificate will be revoked, and if so, a date which the CA will revoke the certificate.
Depending on the revocation reason and as set out in Section 4.9.1., Google will revoke the concerned Certificate no later than 24 hours or 5 days after having received the Certificate Problem Report.
The following criteria will be considered when selecting the revocation date:
Relying Parties are required to confirm the validity of each Certificate in the certificate chain by checking the applicable CRL or OCSP responder before relying on a Google Certificate.
For the status of Subscriber Certificates: For CAs for which Google publishes a CRL, that CRL is updated and reissued at least once every seven (7) days, and the value of the nextUpdate field is not more than ten (10) days beyond the value of the thisUpdate field.
For the status of Subordinate CA Certificates: Google updates and reissues CRLs at least (i) once every twelve (12) months and (ii) within 24 hours after revoking a Subordinate CA Certificate, and the value of the nextUpdate field is not more than twelve months beyond the value of the thisUpdate field.
See Section 2.2 for CRL locations.
No stipulation.
Google makes available OCSP status information for all certificates it issues. The OCSP responder locations are included in the respective certificates.
OCSP responses conform to RFC 6960 and/or RFC 5019. They are either:
The OCSP responder supports GET method for receiving OCSP requests. It does not respond with a "good" status on certificates which have not been issued.
For the status of Subscriber Certificates:
For the status of Subordinate CA Certificates, Google updates information provided via an Online Certificate Status Protocol:
The OCSP responder may provide definitive responses about "reserved" certificate serial numbers, as if there was a corresponding Certificate that matches the Precertificate [RFC 6962].
A certificate serial number within an OCSP request is one of the following three options:
Not applicable.
In case of a compromise of the Subscriber's private key, the Subscriber must immediately notify Google of the Private Key compromise event. Google will revoke the concerned certificate, and publish a CRL to inform relying parties that the certificate can no longer be trusted.
The subscriber is responsible for investigating the circumstances of any such compromise.
The acceptable methods that can be used by third parties as proof of key compromise are the following:
Google does not suspend certificates.
Not applicable.
Not applicable.
Not applicable.
Revocation entries on a CRL or OCSP Response are not removed until after the Expiry Date of the revoked Certificate.
Google operates and maintains its CRL and OCSP capability with resources sufficient to provide a response time of ten seconds or less under normal operating conditions.
Certificate Status Services are available 24x7, unless temporarily unavailable due to maintenance or service failure. Additionally Google maintains a continuous 24x7 ability to respond internally to high-priority Certificate Problem Reports.
No stipulation.
A subscriber's subscription ends when its Certificate expires or when the Certificate is revoked. A subscription also ends when the applicable subscriber agreement expires and is not renewed.
Google does not escrow private keys.
Not applicable.
Not applicable.
The Google CA infrastructure is located in and operated from secure Google facilities. Detailed security procedures are in place and followed that prohibit unauthorized access and entry into the areas of the facilities in which CA systems reside.
Google CA systems are located in a selected set of locations which have been evaluated for their physical security, as well as local legal considerations that may affect CA operations.
All CA systems are operated from buildings which are solidly constructed to prevent unauthorized entry.
Google has in place appropriate physical security controls to restrict access to all hardware and software used for providing CA Services. Access to such hardware and software is limited to those personnel performing in a trusted role as described in Section 5.2.1. Access is controlled through the use of electronic access controls, mechanical combination lock sets, deadbolts, or other security mechanisms. Such access controls are manually or electronically monitored for unauthorized intrusion at all times. Only authorized personnel will be allowed access, either physical or logical, to the CA systems.
Google enforces two-person access for all access to CA systems.
The Google CA servers are located inside of a locked cabinet or cage area in a locked server room. Access to the server room is controlled by badge readers. The private keys for the CAs are stored in hardware security modules that are validated to FIPS 140-2 Level 3 or higher and that are physically tamper-evident and tamper-resistant.
Google CA facilities are connected to a UPS system and emergency power generator. They are equipped with cooling systems to ensure reliable operations.
All Google CA facilities are equipped with controls which protect CA systems from damage resulting from water leakage.
All Google CA facilities are equipped with fire detection alarms and protection equipment.
No stipulation.
Google takes reasonable steps to ensure that all media used for the storage of information such as keys, Activation Data or its files are sanitized or destroyed before they are released for disposal.
Google maintains backup facilities for its CA infrastructure which also hold copies of the CA private keys for redundancy. The backup facilities have security controls which are equivalent to those operated at the primary facility.
All personnel who have access to or control over cryptographic operations of a Google CA that affect the issuance, use, and management of Certificates are considered as serving in a trusted role ("Trusted Role"). Such personnel include, but are not limited to, members of Google's Information Security Team.
CA Private Keys can only be backed up, stored, and recovered by personnel in trusted roles using, at least, dual control in a physically secured environment.
Google maintains controls to provide reasonable assurance that:
A documented procedure for appointing individuals to Trusted Roles and assigning responsibilities to them is followed;
The responsibilities and tasks assigned to Trusted Roles are documented and “separation of duties” for such Trusted Roles based on the risk assessment of the functions to be performed is implemented;
Only personnel assigned to Trusted Roles have access to Secure Zones and High Security Zones;
Individuals in a Trusted Role act only within the scope of such role when required for performing administrative tasks;
Employees and contractors observe the principle of “least privilege” when accessing, or when configuring access privileges on, Certificate Systems;
Trusted Roles use a unique credential created by or assigned to a single person for authentication to Certificate Systems;
Where Trusted Roles use a username and a password to authenticate, access controls are configured such that at a minimum they satisfy the following requirements:
Passwords have at least twelve (12) characters for accounts not publicly accessible (accessible only within Secure Zones or High Security Zones);
Passwords for accounts that are accessible from outside a Secure Zone or High Security Zone are configured to have at least eight (8) characters, use a combination of at least numeric and alphabetic characters, and may not be one of the user’s previous four passwords; and implement account lockout for failed access attempts; OR
Implement a documented password management and account lockout policy that the CA has determined provide at least the same level of protection against password guessing as the foregoing controls.
Trusted Roles log out of or lock workstations when no longer in use;
Workstations are configured with inactivity time-outs that log the user off or lock the workstation after a set time of inactivity without input from the user;
Review all system accounts at least every 90 days and deactivate any accounts that are no longer necessary for operations;
Revoke account access to Certificate Systems after no more than five (5) failed access attempts, provided that this security measure is supported by the Certificate System and does not weaken the security of this authentication control;
Disable all privileged access of an individual to Certificate Systems within 24 hours upon termination of the individual’s employment relationship with the CA;
Enforce multi-factor authentication for administrator access to Issuing Systems and Certificate Management Systems;
Restrict remote administration or access to an Issuing System, Certificate Management System, or Security Support System except when:
The remote connection originates from a device owned or controlled by the CA and from a pre-approved external IP address,
The remote connection is through a temporary, non-persistent encrypted channel that is supported by multi-factor authentication, and
The remote connection is made to a designated intermediary device meeting the following:
Located within the CA’s network,
Secured in accordance with these Requirements, and
Mediates the remote connection to the Issuing System.
Auditors of the infrastructure and certificate issuance are independent from the operators who approve and issue certificates using a Google CA.
To review their conformance with applicable policies and procedures, Google CAs undergo annual audits performed by independent auditors.
Google has implemented policies for verifying the identity and trustworthiness of its personnel. Furthermore, Google evaluates the performance of its CA staff to ensure that they perform their duties in a satisfactory manner.
All personnel operating the Google CAs are Google employees. There are no contractors or other third parties involved in the Certificate Management Process.
Google follows a set of established procedures for selecting and evaluating personnel who operate Google CAs or act in other information security roles.
All Google personnel who perform information verification duties receive skills-training that covers basic Public Key Infrastructure knowledge, authentication and vetting policies and procedures (including this CPS), common threats to the information verification process including phishing and other social engineering tactics.
Validation Specialists receive their skills-training prior to commencing their job role and Google requires them to pass an examination on the applicable information verification requirements.
Google maintains records of such training and ensures that personnel entrusted with Validation Specialist duties maintain an appropriate skill level.
Google requires personnel in Trusted Roles to maintain skill levels consistent with the CA training and performance management programs. To this end Google requires such personnel to undergo re-training at least annually.
No stipulation.
Google will impose sanctions, including suspension and termination if appropriate, on its employees acting in Trusted Roles if they perform unauthorized acts, abuse their authority, or for other appropriate reasons, at the discretion of the CA management.
Independent contractors must meet the same training requirements as Google employees working in the same role. Identification and authentication functions are not performed by independent contractors.
Training and documentation is provided to Google employees as necessary for them to perform competently in their job role.
Google records system and CA application events and creates certificate management logs from the data collected in accordance with internal audit procedures. The following events are recorded:
Log entries include the following elements:
Google collects event information and creates Certificate management logs using automated procedures. Where this is not possible, manual logging and record keeping methods may be used.
Audit logs are reviewed on an as-needed basis.
Google retains, for at least two years:
Multiple copies of audit logs are stored in different locations and protected by appropriate physical and logical access controls.
Google maintains formal procedures to ensure that audit logs are backed up and retained to keep them available as necessary for the CA service and as stipulated by applicable standards.
No stipulation.
Events that are deemed potential security issues involving the Certificate Authority infrastructure will be escalated to a permanent security monitoring team.
On an annual basis, Google's security team performs a Risk Assessment that:
System vulnerabilities are managed in accordance with a formal process that addresses the identification, review, response, and remediation of vulnerabilities.
Additionally, Google performs a Vulnerability Scan on public and private IP addresses belonging to the Certificate Systems on the following occasions:
Google performs a Penetration Test on its Certificate Systems at least once per year and after significant infrastructure changes.
Records to be archived are those specified in Section 5.4.1.
Google retains all documentation relating to certificate requests and the verification thereof, and all Certificates and revocation thereof, for at least seven years after any Certificate based on that documentation ceases to be valid, or longer as required by law.
Archived information is stored at multiple physical locations to protect it from loss.
Backup and recovery procedures exist to ensure that archived information can be restored if it has been lost or destroyed in one storage location.
Archived records such as log files are time-stamped by the CA systems which generate them. Time-stamps need not be cryptography-based.
No stipulation.
No stipulation.
The procedure for providing a new CA Certificate to a Subject following a re-key is the same as the procedure for initially providing the CA Certificate.
The Google CA infrastructure is operated from redundant production sites. If a disaster causes an outage at one site, the CA service can be provided from an alternate location.
Google maintains an Incident Response Plan and a Disaster Recovery Plan, which set out the procedures necessary to ensure business continuity, to notify affected stakeholders, and to reasonably protect Application Software Suppliers, Subscribers, and Relying Parties in the event of a disaster, security compromise, or business failure. Google annually tests, reviews, and updates its business continuity plan and its security plans and makes them available to its auditors upon request.
The business continuity plan includes:
Redundant CA sites are physically separated. If software or data at one site is corrupted, it can be restored from an alternate site via a secure connection.
Backups of all relevant software and data are made on a regular basis. They are stored off-site and can be retrieved electronically when necessary.
In the event that the Private Key of a Google CA is compromised, Google will:
Once the compromised key material has been replaced and a secure operation of the CA in question has been established, the CA may re-issue the revoked certificates following the procedure for initially providing the certificates.
Google employs and contracts security personnel who will use all reasonable means to monitor the CA facility after a natural or other type of disaster so as to protect sensitive materials and information against loss, additional damage, and theft.
To confirm that it possesses appropriate disaster recovery capabilities, Google performs periodic tests of its business continuity and disaster recovery plans.
When it is necessary to terminate operation a Google CA, the impact of the termination is to be minimized as much as possible in light of the prevailing circumstances. This includes:
If commercially reasonable, prior notice of the termination of a Google CA will be given at least 3 months before the termination date.
Key Pairs for Google CAs are generated pursuant to formal key generation procedures and inside of a FIPS 140-2 Level 3 certified Hardware Security Module from where the private key cannot be extracted in plaintext.
Requests for Subscriber Certificates are rejected if the Public Key does not meet the requirements set forth in Sections 6.1.5 and 6.1.6 or if it has a Private Key that is known to be weak.
Google does not generate Subscriber Private Keys for TLS server certificates.
Google does not archive Subscriber Private Keys.
Subscribers provide their public key to Google for certification through a PKCS#10 Certificate Signing Request. The preferred transfer method for sending this information is HTTP over Transport Layer Security (TLS).
The public keys of Google CAs are made available from the online Repository at https://pki.goog/repository/. Additionally the public keys of Google root CAs are delivered through their inclusion into the root programs of software and equipment manufacturers.
To prevent cryptanalytic attacks, all Google CAs use key sizes and cryptographic protocols which adhere to NIST recommendations and to the applicable provisions of the CP. See Appendix B for a list of permissible cryptographic algorithms and key sizes.
See Appendix B.
Root CA Private Keys are not used to sign Certificates except for the following:
All CA private keys used to sign certificates, CRLs, or any related information leverage hardware security modules meeting FIPS 140-2 Level 3 or higher or Common Criteria EAL4+ security specifications. Cryptography leveraged to protect this information is selected to withstand cryptanalytic attacks for the lifetime of the encrypted key.
CA Private Keys are kept in a physically secure location, and are never stored unencrypted outside of Hardware Security Modules.
All CA Key Pairs are generated in a pre-planned key generation ceremony and in accordance with a written ceremony script. Upon finalization of the ceremony, all participant sign off on the script, and thoroughly record any exceptions that may have occurred in the process.
Ceremony scripts and associated records are retained at least for the lifetime of the generated key pairs.
The Private Keys of Google CAs are not escrowed.
Backups of CA Private Keys are stored in a secure manner in accordance with applicable Google policy.
Private Keys belonging to Google CAs are not archived by parties other than Google.
Private Keys generated on behalf of a Subordinate CA are encrypted for transport to the Subordinate CA.
All transfers of Private Keys into or from a cryptographic module are performed in accordance with the procedures specified by the vendor of the relevant cryptographic module.
Private keys are stored in accordance with applicable instructions specified by the cryptographic module manufacturer.
Private keys are activated in accordance with applicable instructions specified by the cryptographic module manufacturer
Private keys are deactivated in accordance with applicable instructions specified by the cryptographic module manufacturer.
Private Keys are destroyed in accordance with applicable instructions specified by the cryptographic module manufacturer. In addition Google policy on destruction of highly confidential information is followed.
See Section 6.2.1.
No stipulation.
Certificates are valid starting at the moment of signing, unless otherwise specified in the certificate validity structure, until the end noted in the certificate expiration time.
Subscriber certificates are issued for a period of one year or less.
No stipulation.
Hardware Security Module keys are stored in the Hardware Security Module, and can only be used by authorized CA administrators upon authentication. Passphrases required to unlock the keys are stored in an encrypted form. Physical activation data such as smart cards, when applicable, are stored in a protected and secured environment.
No stipulation.
Google CA system information is protected from unauthorized access through a combination of operating system controls, physical controls and network controls. Network security controls are specified in Section 6.7.
CA systems enforce multi-factor authentication for all accounts capable of directly causing certificate issuance.
No stipulation.
Google uses software that has been formally tested for suitability and fitness for purpose. Hardware is procured through a managed process leveraging industry-standard vendors.
Google has established an Information Security Organization which implements and operates a framework of internal controls that comprises technical, organizational, and procedural measures.
System access is managed on an individual basis and at several levels including the assignment of operating system privileges to the user accounts of individuals performing in Trusted Roles.
Google's certificate systems are protected by a set of controls that implement the CA/Browser Forum's Network and Certificate System Security Requirements.
These controls include:
All logs contain synchronized time stamps.
Google Certificates conform to RFC 5280, Internet X.509 Public Key Infrastructure Certificate and CRL Profile. Certificate extensions and their criticality, as well as cryptographic algorithm object identifiers, are populated according to the IETF RFC 5280 standard.
Where stipulations of RFC 5280 are in conflict with applicable requirements of the CA/Browser Forum, the CA/Browser Form requirements are followed.
Google generate non‐sequential Certificate serial numbers greater than zero (0) containing at least 64 bits of output from a CSPRNG.
X.509 Subscriber Certificates issued by Google CAs conform to X.509 version 3.
See Appendix C.
See Appendix C.
For every valid Certification Path (as defined by RFC 5280, Section 6) chaining to a Google Root CA:
By issuing a Certificate, Google represents that it followed the procedure set forth in Section 3.2 of this CPS to verify that, as of the issuance date, all of the Subject Information was accurate.
Wildcard names may be used for wildcard certificates.
Google's processes relating to I&A and Certificate issuance prevent an OU attribute from including a name, DBA, tradename, trademark, address, location, or other text that refers to a specific natural person or Legal Entity unless this information has been verified in accordance with Section 3.2 and the Certificate also contains subject:organizationName, subject:localityName, and subject:countryName attributes, also verified in accordance with Section 3.2.2.1.
All attributes, when present within the subject field, contain information that has been verified.
Subject attributes of SSL certificates do not contain only metadata such as '.', '‐', and ' ' (i.e. space) characters, and/or any other indication that a value is absent, incomplete, or a field is not applicable. dNSName entries are in the "preferred name syntax", as specified in RFC 5280, and do not contain underscore characters ("_").
The commonName of SSL certificates contains a single IP address or Fully‐Qualified Domain Name that is one of the values contained in the Certificate’s subjectAltName extension.
The commonName of CA certificates is an identifier for the certificate such that the certificate’s Name is unique across all certificates issued by the issuing certificate.
No stipulation.
Root CA Certificates do not contain the certificatePolicies extension.
End-entity Certificates include one or more of the following Object Identifiers, depending on the method of validation used.
CA/Browser Forum Baseline Requirements:
Google Trust Services Policies:
Certificates do not contain the PolicyConstraints extension.
No stipulation.
No stipulation.
CRLs issued by Google CAs conform to RFC 5280 standards.
No stipulation.
If a CRL entry is for a Root CA or Subordinate CA Certificate, including Cross Certificates, the reasonCode CRL entry extension is present and not marked critical.
If a CRL entry is for a Subscriber Certificate, the reasonCode CRL entry extension subject is present subject to the following requirements.
The CRLReason indicated is not unspecified (0) or certificateHold (6). If the reason for revocation is unspecified, Google omits reasonCode entry extension, if allowed by the previous requirements.
If a reasonCode
CRL entry extension is present, the CRLReason
indicates the
most appropriate reason for revocation of the Certificate.
CRLReason will be included in the reasonCode
extension of the CRL entry
corresponding to a Subscriber Certificate that is revoked after July 15, 2023,
unless the CRLReason is "unspecified (0)". Revocation reason code entries for
Subscriber Certificates revoked prior to July 15, 2023, will not be updated or
changed.
Only the following CRLReasons will be present in the CRL reasonCode
extension
for Subscriber Certifificates:
Tools that Google provides to the Subscriber allow for these options to be easily specified when the Subscriber requests revocation of their Certificate, with the default value being that no revocation reason is provided (i.e. the default corresponds to the CRLReason “unspecified (0)” which results in no reasonCode extension being provided in the CRL). For revocation requests made via ACME, the reason code can be selected during the ACME workflow.
The privilegeWithdrawn reasonCode is not available to the Subscriber as a revocation reason option, because the use of this reasonCode is determined by Google and not the Subscriber.
When Google obtains verifiable evidence of Key Compromise for a Certificate whose CRL entry does not contain a reasonCode extension or has a reasonCode extension with a non-keyCompromise reason, Google may update the CRL entry to enter keyCompromise as the CRLReason in the reasonCode extension. Additionally, Google may update the revocation date in a CRL entry when it is determined that the private key of the certificate was compromised prior to the revocation date that is indicated in the CRL entry for that certificate.
issuingDistributionPoint` (OID 2.5.29.28)
Effective 2023-01-15, if a CRL does not contain entries for all revoked
unexpired certificates issued by the CRL issuer, then it MUST contain a critical
Issuing Distribution Point extension and MUST populate the distributionPoint
field of that extension.
All Google CAs support OCSP, and their responders conform to the RFC 6960 standard.
If an OCSP response is for a Root CA or Subordinate CA Certificate and that certificate has been revoked, then the revocationReason field within the RevokedInfo of the CertStatus is present.
The CRLReason indicated contains a value permitted for CRLs, as specified in Section 7.2.2 of this document.
No stipulation.
The singleExtensions of an OCSP response does not contain the reasonCode (OID 2.5.29.21) CRL entry extension.
Compliance Audits are conducted at least annually.
Compliance audits of Google CAs are performed by a public accounting firm that possesses the following qualifications and skills:
Compliance audits of Google CAs are performed by a public accounting firm that is independent of the subject of the audit.
Annual compliance audits of Google CAs include an assessment of the controls Google has implemented to ensure the secure operation of its CAs. In particular they cover an assessment of Google's compliance with the relevant version of the WebTrust Principles and Criteria for Certification Authorities as published by CPA Canada.
If a material deficiency in the design or operation of a control is identified during an audit, Google's CA Policy Authority determines whether remediating actions are required and how these will be implemented. Google seeks the input of its auditor regarding the remediation plans it makes and implements the remediation action within a commercially reasonable period of time.
The Audit Report is made publicly available no later than three months after the end of the audit period. Google is not required to make publicly available any general audit findings that do not impact the overall audit opinion. In the event of a delay greater than three months, and if so requested by an Application Software Supplier, Google will provide an explanatory letter signed by its Auditor.
The Audit Report states explicitly which CA systems, sites and operational activity it covers.
Google monitors its adherence to the CP and this CPS by performing self audits on at least a quarterly basis against a randomly selected sample of the greater of one certificate or at least three percent of the Certificates issued by it during the period commencing immediately after the previous self-audit sample was taken.
Google requires all Subordinate CAs that it cross signs as well as all Delegated Third Parties to undergo an annual audit which meets the criteria specified in Section 8.1.
Google may charge Subscribers for the issuance, management and renewal of Certificates. Google does not charge for the revocation of certificates it has issued.
Google may charge a reasonable fee for access to its Certificate databases.
Google does not charge a fee as a condition of making the CRLs required by this CPS available in a Repository or otherwise available to Relying Parties. Google may however charge a fee for providing customized CRLs, OCSP services, or other value-added revocation and status information services. Google does not permit access to revocation information, Certificate status information, or time stamping in its Repository by third parties that provide products or services that utilize such Certificate status information without Google's prior express written consent.
Google does not charge a fee for access to this CPS. Any use made for purposes other than simply viewing the document, such as reproduction, redistribution, modification, or creation of derivative works, shall be subject to a license agreement with Google.
No stipulation.
Google maintains general liability insurance coverage.
No stipulation.
No stipulation.
The following Applicant and Subscriber related information is considered confidential information.
Certificates and revocation data are not considered confidential information. Furthermore information is not considered confidential if its disclosure is mandated pursuant to the CP or this CPS.
Google, its contractors and agents use a reasonable degree of care when processing and protecting confidential information.
Google follows its Privacy Policy which is available at: https://www.google.com/policies/privacy/
See Section 9.4.1.
See Section 9.4.1.
See Section 9.4.1.
See Section 9.4.1.
See Section 9.4.1.
See Section 9.4.1.
Google, or its licensors, own the intellectual property rights in the Google CA services, including the Certificates, trademarks used in providing Certificate services and this CPS.
Certificate and revocation information are the exclusive property of Google. Google grants permission to reproduce and distribute certificates on a non‐exclusive and royalty‐free basis, provided that they are reproduced and distributed in full. Google does not allow derivative works of its Certificates or products without prior written permission.
Private and Public Keys remain the property of the Subscribers who rightfully hold them. All secret shares (distributed elements) of the Google Private Keys are the property of Google.
Google provides the following limited warranty to the Certificate Beneficiaries at the time of Certificate issuance: (a) it issued the Certificate substantially in compliance with this CPS; b) the information contained within the Certificate accurately reflects the information provided to Google by the Applicant in all material respects; and (c) it has taken reasonable steps to verify that the information within the Certificate is accurate. The steps Google takes to verify the information contained in a Certificate are set forth in this CPS.
Domain-validated and organization-validated TLS Certificates conform to the CA/Browser Forum ("CABF") Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates. By issuing such a Certificate, Google represents and warrants to the Certificate Beneficiaries that, during the period when the Certificate is valid, Google has complied with this Section and its CPS in issuing and managing the Certificate.
The Certificate warranties to Certificate Beneficiaries are as follows:
Right to Use Domain Name or IP Address: That, at the time of issuance, Google (i) implemented a procedure for verifying that the Applicant either had the right to use, or had control of, the domain name(s) and IP address(es) listed in the Certificate's subject field and subjectAltName extension (or, only in the case of domain names, was delegated such right or control by someone who had such right to use or control); (ii) followed the procedure when issuing the Certificate; and (iii) accurately described the procedure in this CPS;
Authorization for Certificate: That, at the time of issuance, Google (i) implemented a procedure for verifying that the Subject authorized the issuance of the Certificate and that the Applicant is authorized to request the Certificate on behalf of the Subject; (ii) followed the procedure when issuing the Certificate; and (iii) accurately described the procedure in this CPS;
Accuracy of Information: That, at the time of issuance, Google (i) implemented a procedure for verifying the accuracy of all of the information contained in the Certificate; (ii) followed the procedure when issuing the Certificate; and (iii) accurately described the procedure in this CPS;
Identity of Applicant: That, if the Certificate contains Subject identity information, Google (i) implemented a procedure to verify the identity of the Applicant in accordance with Sections 3.1.1.1 and 3.2.2.1; (ii) followed the procedure when issuing the Certificate; and (iii) accurately described the procedure in this CPS;
Subscriber Agreement: That, if Subscriber is not a Google Affiliate, the Subscriber and Google are parties to a legally valid and enforceable Subscriber Agreement that satisfies the requirements of this Section, or, if Subscriber is a Google Affiliate, the Applicant acknowledged and accepted Google's Certificate terms of use, notice of which is provided by Google to Applicant during the Certificate issuance process;
Status: Google maintains a 24 x 7 publicly-accessible Repository with current information regarding the status (valid or revoked) of all unexpired Certificates; and
Revocation: Google will revoke the Certificate for any of the reasons specified in this CPS.
No stipulation.
Google requires, as part of the Subscriber Agreement or Terms of Use Agreement, that the Applicant make the commitments and warranties in this Section for the benefit of the CA and the Certificate Beneficiaries.
Prior to the issuance of a Certificate, Google obtains, for its express benefit and that of the Certificate Beneficiaries, either:
Google implements a process to ensure that each Subscriber or Terms of Use Agreement is legally enforceable against the Applicant. In either case, the Agreement must apply to the Certificate to be issued pursuant to the certificate request. Google may use an electronic or "click-through" Agreement provided that it has determined that such agreements are legally enforceable. A separate Agreement may be used for each certificate request, or a single Agreement may be used to cover multiple future certificate requests and the resulting Certificates, so long as each Certificate that the CA issues to the Applicant is clearly covered by that Subscriber or Terms of Use Agreement.
The Subscriber or Terms of Use Agreement contains provisions imposing on the Applicant itself (or made by the Applicant on behalf of its principal or agent under a subcontractor or hosting service relationship) the following obligations and warranties:
Subscriber Agreements may include additional representations and warranties.
Relying Parties represent and warrant that: (a) they have read, understand and agree to this CPS; (b) they have verified both the relevant Google CA's Certificate and any other certificates in the certificate chain using the relevant CRL or OCSP; (c) they will not use a Certificate if the Certificate has expired or been revoked; (d) they have sufficient information to make an informed decision as to the extent to which they choose to rely on the information in a Certificate; (e) they have studied the applicable limitations on the usage of Certificates and agree to Google's limitations on liability related to the use of Certificates; (f) they are solely responsible for deciding whether or not to rely on information in a Certificate; and (g) they are solely responsible for the legal and other consequences of their failure to perform the Relying Party obligations in this CPS.
Relying Parties also represent and warrant that they will take all reasonable steps to minimize the risk associated with relying on a digital signature, including only relying on a Certificate after considering:
Applicable law and the legal requirements for identification of a party, protection of the confidentiality or privacy of information, and enforceability of the transaction;
The intended use of the Certificate as listed in the Certificate or this CPS;
The data listed in the Certificate;
The economic value of the transaction or communication;
The potential loss or damage that would be caused by an erroneous identification or a loss of confidentiality or privacy of information in the application, transaction, or communication;
The Relying Party's previous course of dealing with the Subscriber;
The Relying Party's understanding of trade, including experience with computer‐based methods of trade; and
Any other indicia of reliability or unreliability pertaining to the Subscriber and/or the application, communication, or transaction.
No stipulation.
EXCEPT AS EXPRESSLY STATED IN SECTION 9.6.1 OF THIS CPS, ALL CERTIFICATES AND ANY RELATED SOFTWARE AND SERVICES ARE PROVIDED "AS IS" AND "AS AVAILABLE." TO THE MAXIMUM EXTENT PERMITTED BY LAW, GOOGLE DISCLAIMS ALL OTHER WARRANTIES, BOTH EXPRESS AND IMPLIED, INCLUDING, WITHOUT LIMITATION, ANY IMPLIED WARRANTY OF MERCHANTABILITY, ANY WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OF ACCURACY OF INFORMATION PROVIDED WITH RESPECT TO CERTIFICATES ISSUED BY GOOGLE, THE CRL, AND ANY PARTICIPANT'S OR THIRD PARTY'S PARTICIPATION IN THE GOOGLE PKI, INCLUDING USE OF KEY PAIRS, CERTIFICATES, THE CRL OR ANY OTHER GOODS OR SERVICES PROVIDED BY GOOGLE TO THE PARTICIPANT.
EXCEPT AS EXPRESSLY STATED IN SECTION 9.6.1 OF THIS CPS, GOOGLE DOES NOT WARRANT THAT ANY SERVICE OR PRODUCT WILL MEET ANY EXPECTATIONS OR THAT ACCESS TO CERTIFICATES WILL BE TIMELY OR ERROR‐FREE.
Google does not guarantee the availability of any products or services and may modify or discontinue any product or service offering at any time. A fiduciary duty is not created simply because an individual or entity uses Google's services.
TO THE EXTENT PERMITTED BY APPLICABLE LAW, GOOGLE SHALL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, EXEMPLARY OR PUNITIVE DAMAGES, INCLUDING BUT NOT LIMITED TO DAMAGES FOR LOST DATA, LOST PROFITS, LOST REVENUE OR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, HOWEVER CAUSED AND UNDER ANY THEORY OF LIABILITY, INCLUDING BUT NOT LIMITED TO CONTRACT OR TORT (INCLUDING PRODUCTS LIABILITY, STRICT LIABILITY AND NEGLIGENCE), AND WHETHER OR NOT IT WAS, OR SHOULD HAVE BEEN, AWARE OR ADVISED OF THE POSSIBILITY OF SUCH DAMAGE AND NOTWITHSTANDING THE FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY STATED HEREIN. GOOGLE'S AGGREGATE LIABILITY UNDER THIS CPS IS LIMITED TO $500.
To the extent permitted by applicable law, Relying Parties shall indemnify Google for their: (a) violation of any applicable law (b) breach of representations and obligations as stated in this CPS; (c) reliance on a Certificate that is not reasonable under the circumstances; or (d) failure to check the status of such Certificate to determine if the Certificate is expired or revoked.
New versions of this CPS supersede all previous versions and become effective upon publication in the Repository.
This CPS and any amendments remain in effect until replaced by a newer version.
Upon termination of this CPS, Participants are nevertheless bound by its terms for all Certificates issued for the remainder of the validity periods of such Certificates.
Unless otherwise specified by agreement between the parties, Participants shall use commercially reasonable methods to communicate with each other, taking into account the criticality and subject matter of the communication.
Google may change this CPS at any time in its sole discretion and without prior notice to Subscribers or Relying Parties. The CPS and any amendments thereto are available in the Repository. Amendments to this CPS will be evidenced by a new version number and date, except where the amendments are purely clerical.
Google may provide additional notice (such as in the Repository or on a separate website) in the event that it makes any material changes to its CPS. Google is responsible for determining what constitutes a material change of the CPS. Google does not guarantee or set a notice‐and‐comment period.
No stipulation.
No stipulation
This CPS is governed by the laws of the State of California of the United States of America, excluding (i) its choice of laws principles, and (ii) the United Nations Convention on Contracts for the International Sale of Goods. All Participants hereby submit to the exclusive jurisdiction and venue of the federal or state courts in Santa Clara County, California.
This CPS is subject to applicable national, state, local and foreign laws, rules, regulations, ordinances, decrees, and orders including, but not limited to, restrictions on exporting or importing software, hardware, or technical information. Google licenses its CAs in each jurisdiction that it operates where licensing is required by the law of such jurisdiction for the issuance of Certificates.
No stipulation.
Relying Parties and Subscribers may not assign their rights or obligations under this CPS, by operation of law or otherwise, without Google's prior written approval. Any such attempted assignment shall be void. Subject to the foregoing, this CPS shall be binding upon and inure to the benefit of the parties hereto, their successors and permitted assigns.
If any provision of this CPS shall be held to be invalid, illegal, or unenforceable, the validity, legality, or enforceability of the remainder of this CPS shall not in any way be affected or impaired hereby.
Google may seek indemnification and attorneys' fees from a party for damages, losses, and expenses related to that party's conduct. Google's failure to enforce a provision of this CPS does not waive Google's right to enforce the same provision later or right to enforce any other provision of this CPS. To be effective, waivers must be in writing and signed by Google.
Google shall not be liable for any default or delay in the performance of its obligations hereunder to the extent and while such default or delay is caused, directly or indirectly, by fire, flood, earthquake, elements of nature or acts of God, acts of war, terrorism, riots, civil disorders, rebellions or revolutions in the United States, strikes, lockouts, or labor difficulties or any other similar cause beyond the reasonable control of Google.
No stipulation.
Automatic Certificate Management Environment (ACME): A communications protocol for automating interactions between Certificate Authorities and their Subscribers.
Activation Data: Data, other than keys, that is required to access or operate cryptographic modules (e.g., a passphrase or a Personal Identification Number or "PIN").
API: An interface that allows users to programmatically access the features of a system, application, or service.
Applicant: The natural person or Legal Entity that applies for (or seeks renewal of) a Certificate. Once the Certificate is issued, the Applicant is referred to as the Subscriber. For Certificates issued to devices, the Applicant is the entity that controls or operates the device named in the Certificate, even if the device is sending the actual certificate request.
Application Software Supplier: A supplier of Internet browser software or other relying-party application software that displays or uses Certificates and incorporates Root Certificates.
Attestation Letter: A letter attesting that Subject Information is correct written by an accountant, lawyer, government official, or other reliable third party customarily relied upon for such information.
Audit Period: In a period-of-time audit, the period between the first day (start) and the last day of operations (end) covered by the audit opinion.
Audit Report: A report from a Qualified Auditor stating the Qualified Auditor's opinion on whether an entity's processes and controls comply with the mandatory provisions of the BR.
Authorization Domain Name: The FQDN used to obtain authorization for a given
FQDN to be included in a Certificate. The CA may use the FQDN returned from a
DNS CNAME lookup as the FQDN for the purposes of domain validation. If a
Wildcard Domain Name is to be included in a Certificate, then the CA MUST remove
"*.
" from the left-most portion of the Wildcard Domain Name to yield the
corresponding FQDN. The CA may prune zero or more Domain Labels of the FQDN from
left to right until encountering a Base Domain Name and may use any one of the
values that were yielded by pruning (including the Base Domain Name itself) for
the purpose of domain validation.
Base Domain Name: The portion of an applied‐for FQDN that is the first Domain Name node left of a registry‐controlled or public suffix plus the registry‐controlled or public suffix (e.g. "example.co.uk" or "example.com"). For FQDNs where the right‐most Domain Name node is a gTLD having ICANN Specification 13 in its registry agreement, the gTLD itself may be used as the Base Domain Name.
Baseline Requirements (BR): CA/Browser Forum Baseline Requirements for the Issuance and Management of Publicly Trusted Certificates, available at https://cabforum.org/baseline-requirements-documents/
CAA: From RFC 8659 (http://tools.ietf.org/html/rfc8659): "The Certification Authority Authorization (CAA) DNS Resource Record allows a DNS domain name holder to specify one or more Certification Authorities (CAs) authorized to issue certificates for that domain name. CAA Resource Records allow a public CA to implement additional controls to reduce the risk of unintended certificate mis‐issue.”
CA Services: Services relating to the creation, issuance, or management of Certificates provided by Google under this CPS.
Certificate: An electronic document that uses a digital signature to bind a public key and an identity.
Certification Authority (CA): An organization that is responsible for the creation, issuance, revocation, and management of Certificates. The term applies equally to both Roots CAs and Subordinate CAs. The term CA can depending on the context also refer to the infrastructure used by that organization to provide CA Services.
Client Authentication Certificate: A Certificate intended to be issued to individuals (as well as devices not acting in the capacity of a server), solely for the purpose of identifying that the holder of the Private Key is in fact the individual or device named in the Certificate's subject field.
Certificates: The Certificates that a Google CA is authorized to issue pursuant to this CPS. See Google Certificate.
Certificate Beneficiaries: any of the following parties:
(i) The Subscriber that is a party to the Subscriber or Terms of Use Agreement for the Certificate;
(ii) all Application Software Suppliers with whom the Root CA has entered into a contract for inclusion of its Root Certificate in software distributed by such Application Software Supplier; and
(iii) all Relying Parties who reasonably rely on a valid Certificate.
Certificate Data: Certificate requests and data related thereto (whether obtained from the Applicant or otherwise) in the CA's possession or control or to which the CA has access.
Certificate Management Process: Processes, practices, and procedures associated with the use of keys, software, and hardware, by which the CA verifies Certificate Data, issues Certificates, maintains a Repository, and revokes Certificates.
Certification Practice Statement (CPS): This document.
Certificate Policy (CP): Google's Certificate Policy.
Certificate Problem Report: Complaint of suspected Key Compromise, Certificate misuse, or other types of fraud, compromise, misuse, or inappropriate conduct related to Certificates.
Certificate Profile: A set of documents or files that defines requirements for Certificate content and Certificate extensions in accordance with Section 7, e.g. a Section in a CA’s CPS or a certificate template file used by CA software.
Certificate Revocation List (CRL): A regularly updated time-stamped list of revoked Certificates that is created and digitally signed by the CA that issued the Certificates.
Certification Authority: An organization that is responsible for the creation, issuance, revocation, and management of Certificates. The term applies equally to both Root CAs and Subordinate CAs.
CN: Common Name
Country: Either a member of the United Nations OR a geographic region recognized as a Sovereign State by at least two UN member nations.
Cross Certificate: A certificate that is used to establish a trust relationship between two Root CAs.
CSPRNG: A random number generator intended for use in a cryptographic system.
DBA: Doing Business As
Domain Label: From RFC 8499 (http://tools.ietf.org/html/rfc8499): "An ordered list of zero or more octets that makes up a portion of a domain name. Using graph theory, a label identifies one node in a portion of the graph of all possible domain names."
Domain Name: An ordered list of one or more Domain Labels assigned to a node in the Domain Name System.
Domain Namespace: The set of all possible Domain Names that are subordinate to a single node in the Domain Name System.
Domain Name Registrant: Sometimes referred to as the "owner" of a Domain Name, but more properly the person(s) or entity(ies) registered with a Domain Name Registrar as having the right to control how a Domain Name is used, such as the natural person or Legal Entity that is listed as the "Registrant" by WHOIS or the Domain Name Registrar.
Domain Name Registrar: A person or entity that registers Domain Names under the auspices of or by agreement with: (i) the Internet Corporation for Assigned Names and Numbers (ICANN), (ii) a national Domain Name authority/registry, or (iii) a Network Information Center (including their affiliates, contractors, delegates, successors, or assigns).
Domain Validated (DV) Certificate: A Certificate which verifies that the Subscriber controls the domain names and IP addresses included in the Certificate.
Expiry Date: The "Not After" date in a Certificate that defines the end of a Certificate's validity period.
Fully-Qualified Domain Name (FQDN): A Domain Name that includes the Domain Labels of all superior nodes in the Internet Domain Name System.
FIPS: (US Government) Federal Information Processing Standard
Google: Google Trust Services LLC (a Delaware corporation).
Google Affiliate: An entity that is controlled with or by or is under common control with Google.
Google CA: A CA operated by Google in accordance with this CPS and listed in Section 1.3.1 of this CPS.
Google Certificate: A certificate issued by a Google CA under this CPS.
Google PKI: The Google Public Key Infrastructure established, operated and maintained by Google for publicly trusted certificates.
Government Entity: A government-operated legal entity, agency, department, ministry, branch, or similar element of the government of a country, or political subdivision within such country (such as a state, province, city, county, etc.).
High Risk Certificate Request: A Request that the CA flags for additional scrutiny by reference to internal criteria and databases maintained by the CA, which may include names at higher risk for phishing or other fraudulent usage, names contained in previously rejected certificate requests or revoked Certificates, names listed on the Miller Smiles phishing list or the Google Safe Browsing list, or names that the CA identifies using its own risk-mitigation criteria.
Identification and Authentication (I&A): The process for ascertaining and confirming through appropriate inquiry and investigation the identity and authority of a person or entity. See Section 3.2
Incorporating Agency: The government agency in the jurisdiction in which an entity is incorporated under whose authority the legal existence of the entity was established (e.g., the government agency that issued the Certificate of Incorporation).
Individual Validated (IV) Certificate: A Certificate which has been issued to a natural person and includes the Subscriber's name.
Information Security Team: Google employees who belong to the Privacy & Security organization.
Internal Name: A string of characters (not an IP address) in a Common Name or Subject Alternative Name field of a Certificate that cannot be verified as globally unique within the public DNS at the time of certificate issuance because it does not end with a Top Level Domain registered in IANA's Root Zone Database.
IP Address: A 32‐bit or 128‐bit number assigned to a device that uses the Internet Protocol for communication.
IP Address Contact: The person(s) or entity(ies) registered with an IP Address Registration Authority as having the right to control how one or more IP Addresses are used.\
IP Address Registration Authority: The Internet Assigned Numbers Authority (IANA) or a Regional Internet Registry (RIPE, APNIC, ARIN, AfriNIC, LACNIC).
Issuing CA: In relation to a particular Certificate, the CA that issued the Certificate. This could be either a Root CA or a Subordinate CA.
Key Compromise: A Private Key is said to be compromised if its value has been disclosed to an unauthorized person or an unauthorized person has had access to it.
Key Pair: Two mathematically related numbers, referred to as a Public Key and its corresponding Private Key, possessing properties such that: (i) the Public Key may be used to verify a Digital Signature generated by the corresponding Private Key; and/or (ii) the Public Key may be used to encrypt an electronic record that can be decrypted only by using the corresponding Private Key.
LDH Label: From RFC 5890 (http://tools.ietf.org/html/rfc5890): "A string consisting of ASCII letters, digits, and the hyphen with the further restriction that the hyphen cannot appear at the beginning or end of the string. Like all DNS labels, its total length must not exceed 63 octets."
Non-Reserved LDH Label: From RFC 5890
(http://tools.ietf.org/html/rfc5890): "The set of valid LDH labels that do not
have '--
' in the third and fourth positions."
Legal Entity: An association, corporation, partnership, proprietorship, trust, government entity or other entity with legal standing in a country's legal system.
NIST: (US Government) National Institute of Standards and Technology
OCSP: Online Certificate Status Protocol
OID: Object Identifier
Object Identifier: A unique alphanumeric or numeric identifier registered under the International Organization for Standardization's applicable standard for a specific object or object class.
OCSP Responder: An online server operated under the authority of the CA and connected to its Repository for processing Certificate status requests. See also, Online Certificate Status Protocol.
Online Certificate Status Protocol: An online Certificate-checking protocol that enables relying-party application software to determine the status of an identified Certificate. See also OCSP Responder.
Operational Period: The intended term of validity of a Google Certificate, including beginning and ending dates. The Operational Period is indicated in the Certificate's "Validity" field. See also Expire.
Organization Validated (OV) Certificate: A Certificate which includes the Subscriber's organization name.
Participants: The persons authorized to participate in the Google PKI, as identified in Section 1.3. This term includes the Google CAs, and each Subscriber and Relying Party operating under the authority of the Google PKI.
P-Label: A XN-Label that contains valid output of the Punycode algorithm (as defined in RFC 3492, Section 6.3) from the fifth and subsequent positions.
Private Key: The key of a Key Pair that is kept secret by the holder of the Key Pair, and that is used to create Digital Signatures and/or to decrypt electronic records or files that were encrypted with the corresponding Public Key.
Public Key: The key of a Key Pair that may be publicly disclosed by the holder of the corresponding Private Key and that is used by a Relying Party to verify Digital Signatures created with the holder's corresponding Private Key and/or to encrypt messages so that they can be decrypted only with the holder's corresponding Private Key.
Public Key Cryptography: A type of cryptography, also known as asymmetric cryptography, that uses a unique Key Pair in a manner such that the Private Key of that Key Pair can decrypt an electronic record encrypted with the Public Key, or can generate a digital signature, and the corresponding Public Key, to encrypt that electronic record or verify that Digital Signature.
Public Key Infrastructure (PKI): A set of hardware, software, people, procedures, rules, policies, and obligations used to facilitate the trustworthy creation, issuance, management, and use of Certificates and keys based on Public Key Cryptography.
Qualified Auditor: A natural person or Legal Entity that meets the requirements of Section 8.2.
RA: See Registration Authority.
Registration Authority (RA): Any Legal Entity that is responsible for identification and authentication of subjects of Certificates, but is not a CA, and hence does not sign or issue Certificates. An RA may assist in the certificate application process or revocation process or both. When "RA" is used as an adjective to describe a role or function, it does not necessarily imply a separate body, but can be part of the CA.
Reliable Data Source: An identification document or source of data used to verify Subject Identity Information that is generally recognized among commercial enterprises and governments as reliable, and which was created by a third party for a purpose other than the Applicant obtaining a Certificate.
Reliable Method of Communication: A method of communication, such as a postal/courier delivery address, telephone number, or email address, that was verified using a source other than the Applicant Representative.
Relying Party: Any natural person or Legal Entity that relies on a Valid Certificate. An Application Software Supplier is not considered a Relying Party when software distributed by such Supplier merely displays information relating to a Certificate.
Registration Process: The process, administered by the CA or an RA, that a Subscriber uses to apply for and obtain a Google Certificate.
Reissuance: The process of acquiring a new Google Certificate and associated Key Pair to replace an existing Google Certificate and associated Key Pair, prior to the Expiration of the existing Google Certificate and associated Key Pair's Operational Period.
Relying Party: A recipient of a Certificate who acts in reliance on the Certificate and/or digital signatures verified using the Certificate.
Repository: An online accessible database in the Google PKI containing this CPS, the CRL for revoked Google Certificates, and any other information specified by Google.
Request Token: A value derived in a method specified by the CA and used to demonstrate domain control.
The Request Token incorporates the key used in the certificate request.
A Request Token may include a timestamp to indicate when it was created and other information to ensure its uniqueness.
A Request Token that includes a timestamp remains valid for no more than 30 days from the time of creation and is treated as invalid if its timestamp is in the future. A Request Token that does not include a timestamp is valid for a single use and Google does not re-use it for a subsequent validation.
Reserved IP Address: An IPv4 or IPv6 address that is contained in the address block of any entry in either of the following IANA registries:
Revocation: The process of requesting and implementing a change in the status of a Certificate from valid to Revoked.
Revoked: A Certificate status designation that means the Certificate has been rendered permanently Invalid.
Root CA: The top level Certification Authority whose Root Certificate is distributed by Application Software Suppliers and that issues Subordinate CA Certificates.
Root Certificate: The self-signed Certificate issued by the Root CA to identify itself and to facilitate verification of Certificates issued to its Subordinate CAs.
Subject: The natural person, device, system, unit, or Legal Entity identified in a Certificate as the Subject. The Subject is either the Subscriber or a device under the control and operation of the Subscriber.
Subject Identity Information: Information that identifies the Certificate Subject. Subject Identity Information does not include a Domain Name listed in the subjectAltName extension or the Subject commonName field.
Subordinate CA: A Certification Authority whose Certificate is signed by the Root CA, or another Subordinate CA.
Subscriber: The individual or organization that is named as the Subject of a Certificate and that has agreed to the terms of a Subscriber Agreement with Google.
Subscriber Agreement: The contract between Google and a Subscriber whereby the Subscriber agrees to the terms required by this CPS with respect to each Certificate issued to the Subscriber and naming the Subscriber as the Subject.
Subsidiary Company: A company that is controlled by or under common control of a Parent Company.
Technically Constrained Subordinate CA Certificate: A Subordinate CA certificate which uses a combination of Extended Key Usage settings and Name Constraint settings to limit the scope within which the Subordinate CA Certificate may issue Subscriber or additional Subordinate CA Certificates.
TLS: Transport Layer Security
Token: A hardware device (such as a smart card) used to store a Key Pair and associated Certificate and to perform cryptographic functions.
Validation Specialist: Someone who performs the information verification duties specified by these Requirements.
Validity Period: From RFC 5280 (http://tools.ietf.org/html/rfc5280): "The period of time from notBefore through notAfter, inclusive."
WHOIS: Information retrieved directly from the Domain Name Registrar or registry operator via the protocol defined in RFC 3912, the Registry Data Access Protocol defined in RFC 7482, or an HTTPS website.
Wildcard Certificate: A Certificate containing at least one Wildcard Domain Name in the Subject Alternative Names in the Certificate.
Wildcard Domain Name: A string starting with "*." (U+002A ASTERISK, U+002E FULL STOP) immediately followed by a Fully-Qualified Domain Name.
XN-Label: From RFC 5890 (http://tools.ietf.org/html/rfc5890): "The class of labels that begin with the prefix "xn--" (case independent), but otherwise conform to the rules for LDH labels."
AICPA, American Institute of Certified Public Accountants
CA, Certificate Authority
CAA, Certificate Authority Authorization
ccTLD, Country Code Top‐Level Domain
CICA, Canadian Institute of Chartered Accountants
CP, Certificate Policy
CPS, Certification Practice Statement
CRL, Certificate Revocation List
DBA, Doing Business As
DNS, Domain Name System
FIPS, (US Government) Federal Information Processing Standard
FQDN, Fully-Qualified Domain Name
IM, Instant Messaging
IANA, Internet Assigned Numbers Authority
ICANN, Internet Corporation for Assigned Names and Numbers
ISO, International Organization for Standardization
NIST, (US Government) National Institute of Standards and Technology
OCSP, Online Certificate Status Protocol
OID, Object Identifier
PKI, Public Key Infrastructure
RA, Registration Authority
S/MIME, Secure MIME (Multipurpose Internet Mail Extensions) SSL Secure Sockets Layer
TLD, Top‐Level Domain
TLS, Transport Layer Security
VOIP, Voice Over Internet Protocol
ETSI EN 319 403, Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment ‐ Requirements for conformity assessment bodies assessing Trust Service Providers.
ETSI EN 319 411‐1, Electronic Signatures and Infrastructures (ESI); Policy and security requirements for Trust Service Providers issuing certificates; Part 1: General requirements.
ETSI TS 102 042, Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates.
FIPS 140‐2, Federal Information Processing Standards Publication ‐ Security Requirements For Cryptographic Modules, Information Technology Laboratory, National Institute of Standards and Technology, May 25, 2001.
FIPS 140-3, Federal Information Processing Standards Publication - Security Requirements For Cryptographic Modules, Information Technology Laboratory, National Institute of Standards and Technology, March 22, 2019.
Internet Draft: ACME IP Identifier Validation Extension, R. Shoemaker, July 2018, https://tools.ietf.org/html/draft-ietf-acme-ip-04.
ISO 21188:2006, Public key infrastructure for financial services ‐‐ Practices and policy framework. Network and Certificate System Security Requirements, v.1.0, 1/1/2013.
Network and Certificate System Security Requirements, Version 1.7, available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-Network-Security-Guidelines-v1.7.pdf.
NIST SP 800‐89, Recommendation for Obtaining Assurances for Digital Signature Applications, http://csrc.nist.gov/publications/nistpubs/800‐89/SP‐800‐89_November2006.pdf.
RFC2119, Request for Comments: 2119, Key words for use in RFCs to Indicate Requirement Levels. S. Bradner. March 1997.
RFC3492, Request for Comments: 3492, Punycode: A Bootstring encoding of Unicode for Internationalized Domain Names in Applications (IDNA). A. Costello. March 2003.
RFC3647, Request for Comments: 3647, Internet X.509 Public Key Infrastructure: Certificate Policy and Certification Practices Framework. S. Chokhani, et al, November 2003.
RFC3912, RFC3912, Request for Comments: 3912, WHOIS Protocol Specification. L. Daigle. September 2004.
RFC3986, Request for Comments: 3986, Uniform Resource Identifier (URI): Generic Syntax. T. Berners-Lee, et al. January 2005.
RFC5019, Request for Comments: 5019, The Lightweight Online Certificate Status Protocol (OCSP) Profile for High-Volume Environments. A. Deacon, et al. September 2007.
RFC5280, Request for Comments: 5280, Internet X.509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile. D. Cooper, et al. May 2008.
RFC5890, Request for Comments: 5890, Internationalized Domain Names for Applications (IDNA): Definitions and Document Framework. J. Klensin. August 2010.
RFC5952, Request for Comments: 5952, A Recommendation for IPv6 Address Text Representation. S. Kawamura, et al. August 2010.
RFC6960, Request for Comments: 6960, X.509 Internet Public Key Infrastructure Online Certificate Status Protocol ‐ OCSP. Santesson, Myers, Ankney, Malpani, Galperin, Adams, June 2013.
RFC6962, Request for Comments: 6962, Certificate Transparency. B. Laurie, et al. June 2013.
RFC7482, Request for Comments: 7482, Registration Data Access Protocol (RDAP) Query Format. A. Newton, et al. March 2015.
RFC7301, Request for Comments: 7301, Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension. Friedl, Popov, Langley, Stephan, July 2014.
RFC8659, Request for Comments: 8659, DNS Certification Authority Authorization (CAA) Resource Record, Hallam-Baker, Stradling, Hoffman-Andrews, November 2019.
RFC8737, Request for Comments: 8737, Automated Certificate Management Environment (ACME) TLS Application-Layer Protocol Negotiation (ALPN) Challenge Extension. Shoemaker, February 2020.
RFC8659, Request for Comments: 8659, DNS Certification Authority Authorization (CAA) Resource Record. P. Hallam-Baker, et al. November 2019.
WebTrust for Certification Authorities, SSL Baseline with Network Security, Version 2.5, available at https://www.cpacanada.ca/-/media/site/operational/ms-member-services/docs/webtrust/wt100bwtbr-25-110120-finalaoda.pdf.
X.509, Recommendation ITU-T X.509 (08/2005) | ISO/IEC 9594-8:2005, Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks.
The following algorithms and key lengths are permissible for subscriber certificates:
Type | Permissible values |
---|---|
Digest Algorithm | SHA-256, SHA-384 or SHA-512 |
RSA | 2048 bits or longer |
ECC | NIST P-256, P-384 |
The following additional requirements apply to RSA keys:
The validity of all ECDSA keys is confirmed using either the ECC Full Public Key Validation Routine or the ECC Partial Public Key Validation Routine.
This appendix sets out the Profiles of Certificates issued from Google CAs. Fields and extensions not mentioned herein shall be set in accordance with RFC 5280.
Google does not issue Certificates that contain a keyUsage flag, extendedKeyUsage value, Certificate extension, or other data not specified in the corresponding certificate profile unless it is aware of a reason for including the data in the respective Certificate.
Moreover Google does not issue Certificates with:
Extensions that do not apply in the context of the public Internet (such as an extendedKeyUsage value for a service that is only valid in the context of a privately managed network), unless:
such value falls within an OID arc for which the Applicant demonstrates ownership, or
the Applicant can otherwise demonstrate the right to assert the data in a public context; or
semantics that, if included, will mislead a Relying Party about the certificate information verified by the Google Internet Authority (such as including extendedKeyUsage value for a smart card, where the Google Internet Authority is not able to verify that the corresponding Private Key is confined to such hardware due to remote issuance).
Internal Names or Reserved IP Addresses in the Common Name or Subject Alternative Name field.
The following EKUs may be enabled:
Certificates do not combine server authentication with code signing uses unless the uses are separated by application of Extended Key Usages (“EKU”s) at the intermediate CA certificate level that are reflected in the whole certificate chain.
Effective 1 January 2016, Google does not issue any new Subscriber certificates or Subordinate CA certificates using the SHA‐1 hash algorithm.
Google indicates an RSA key using the rsaEncryption (OID: 1.2.840.113549.1.1.1) algorithm identifier. The parameters are be present, and are an explicit NULL. Google does not use a different algorithm to indicate an RSA key.
When encoded, the AlgorithmIdentifier for RSA keys is byte‐for‐byte identical with the following hex‐encoded bytes: 300d06092a864886f70d0101010500
Google indicates an ECDSA key using the id‐ecPublicKey (OID: 1.2.840.10045.2.1) algorithm identifier. The parameters use the namedCurve encoding.
When encoded, the AlgorithmIdentifier for ECDSA keys is byte‐for‐byte identical with the following hex‐encoded bytes:
All objects signed by a Google CA Private Key conform to the following requirements on the use of the AlgorithmIdentifier or AlgorithmIdentifier‐derived type in the context of signatures.
In particular, the requirements appliy to all of the following objects and fields:
No other encodings are used for these fields.
Google uses one of the following signature algorithms and encodings. When encoded, the AlgorithmIdentifier is byte‐for‐byte identical with the specified hex‐encoded bytes.
Google uses the appropriate signature algorithm and encoding based upon the signing key used.
For purposes of clarification, a Precertificate, as described in RFC 6962 – Certificate Transparency, is not considered to be a "certificate" subject to the requirements of RFC 5280 ‐ Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.
Field | Content |
---|---|
issuer | Matches subject |
validity:not after | At least 8 but less or equal to 25 years after the certificate was issued or the validity:notBefore date – whichever is later. |
subject | Contains countryName, organizationName and commonName. commonName attribute identifies the publisher, is unique, readable and in a language appropriate for the market of the respective CA. |
extension:subjectKeyIdentifier | 160-bit SHA-1 hash of subjectPublicKey [RFC 5280] |
extension:basicConstraints | marked critical, cA is TRUE |
extension:keyUsage | marked critical, keyCertsign and cRLSign are set, digitalSignature may be set, other bits are not set |
Field | Content |
---|---|
validity:not after | Not later than notAfter date of signing certificate |
subject | Contains countryName, organizationName and commonName |
extension:subjectKeyIdentifier | 160-bit SHA-1 hash of subjectPublicKey [RFC 5280] |
extension:authorityKeyIdentifier | not marked critical, matches subjectKeyIdentifier of signing certificate; authorityCertIssuer and authorityCertSerialNumber not present |
extension:certificatePolicies | not marked critical, contains at least one policyIdentifier |
extension:basicConstraints | marked critical, cA is TRUE, pathLenConstraint field may be present |
extension:cRLDistributionPoints | not marked critical, contains HTTP URL of CRL service |
extension:keyUsage | marked critical, keyCertsign, and cRLSign bits are set, digitalSignature may be set, all other bits are not set |
extension:authorityInfoAccess | not marked critical, contains HTTP URL of the Issuing CA's certificate and the HTTP URL of Issuing CA's OCSP responder |
extension:extkeyUsage | not marked critical, must include id-kp-serverAuth; may include id-kp-clientAuth; must not include id-kp-emailProtection, id-kp-codeSigning, id-kp-timeStamping or anyExtendedKeyUsage; should not include other values [RFC 5280] |
Field | Content |
---|---|
validity:not after | Not later than notAfter date of signing certificate |
subject | Contains countryName, organizationName and commonName |
extension:subjectKeyIdentifier | 160-bit SHA-1 hash of subjectPublicKey [RFC 5280] |
extension:authorityKeyIdentifier | not marked critical, matches subjectKeyIdentifier of signing certificate; authorityCertIssuer and authorityCertSerialNumber not present |
extension:certificatePolicies | not marked critical, contains at least one policyIdentifier |
extension:basicConstraints | marked critical, cA is TRUE, pathLenConstraint field may be present |
extension:cRLDistributionPoints | not marked critical, contains HTTP URL of CRL service |
extension:keyUsage | marked critical, keyCertsign, and cRLSign bits are set, digitalSignature may be set, all other bits are not set |
extension:extkeyUsage | not marked critical, id-kp-emailProtection must be set, should not include other values [RFC 5280] |
extension:authorityInfoAccess | not marked critical, contains the HTTP URL of the Issuing CA's certificate and the HTTP URL of Issuing CA's OCSP responder |
extension:nameConstraints | optional. if present, marked critical, contains at least one permittedSubtrees field [RFC 5280] |
Field | Content |
---|---|
validity:not after | Not more than 365 days after the later of validity:notBefore or the date the certificate was issued |
subject | Contains countryName, locality (to the extent such field is required under Section 7.1.4.2.2 BR), stateOrProvinceName (to the extent such field is required under Section 7.1.4.2.2 BR), organizationName. May contain commonName. If the subject contains a commonName attribute, the value must be one of the values in the subjectAlternativeName extension. |
extension:subjectKeyIdentifier | not marked critical, 160-bit SHA-1 hash of subjectPublicKey [RFC 5280] |
extension:authorityKeyIdentifier | not marked critical, matches subjectKeyIdentifier of signing certificate; authorityCertIssuer and authorityCertSerialNumber not present |
extension:certificatePolicies | not marked critical, contains at least one policyIdentifier |
extension:basicConstraints | is either absent or cA is FALSE |
extension:authorityInfoAccess | not marked critical, contains the HTTP URL of the Issuing CA's certificate and the HTTP URL of Issuing CA's OCSP responder |
policyQualifiers:policyQualifierId | optional. if present, not marked critical and id‐qt 1 [RFC 5280] |
extension:cRLDistributionPoints | not marked critical, contains HTTP URL of CRL service |
extension:subjectAltName | not marked critical, must contain at least one name and all names must be of type dNSName or iPAddress |
extension:keyUsage | optional. if present, marked critical, digitalSignature bit must be set, nonRepudiation, keyEncipherment or keyAgreement may be set, other bits are not set. |
extension:extkeyUsage | not marked critical, must include either id-kp-serverAuth or id-kp-clientAuth, or both [RFC 5280] |
extension:signedCertificateTimestampList | optional. if present, not marked critical, only in final certificates, contains one or more Signed Certificate Timestamps (SCTs) per RFC 6962 |
extension:ctPoison | optional. if present, marked critical, indicates that this is a precertificate which will be used to get SCTs for the final certificate per RFC 6962 |
Field | Content |
---|---|
validity:not after | Not more than 365 days after the later of validity:notBefore or the date the certificate was issued |
subject | May be an empty sequence. May contain commonName. Must not contain other attributes. If the subject contains a commonName attribute, the value must be one of the values in the subjectAlternativeName extension. |
extension:subjectKeyIdentifier | not marked critical, 160-bit SHA-1 hash of subjectPublicKey [RFC 5280] |
extension:authorityKeyIdentifier | not marked critical, matches subjectKeyIdentifier of signing certificate; authorityCertIssuer and authorityCertSerialNumber not present |
extension:certificatePolicies | not marked critical, contains at least one policyIdentifier |
extension:basicConstraints | is either absent or cA is FALSE |
extension:authorityInfoAccess | not marked critical, contains HTTP URL of the Issuing CA's certificate and the HTTP URL of Issuing CA's OCSP responder |
policyQualifiers:policyQualifierId | optional. if present, not marked critical and id‐qt 1 [RFC 5280] |
extension:cRLDistributionPoints | not marked critical, contains HTTP URL of CRL service |
extension:subjectAltName | must contain at least one name and all names must be of type dNSName or iPAddress. Must be marked critical if Subject is empty, not marked critical otherwise. |
extension:keyUsage | optional. if present, marked critical, digitalSignature bit must be set, nonRepudiation, keyEncipherment or keyAgreement may be set, other bits are not set. |
extension:extkeyUsage | not marked critical, must include either id-kp-serverAuth or id-kp-clientAuth, or both [RFC 5280] |
extension:signedCertificateTimestampList | optional. if present, not marked critical, only in final certificates, contains one or more Signed Certificate Timestamps (SCTs) per RFC 6962 |
extension:ctPoison | optional. if present, marked critical, indicates that this is a precertificate which will be used to get SCTs for the final certificate per RFC 6962 |
Field | Content |
---|---|
validity:not after | Not more than 90 days after the later of validity:notBefore or the date the certificate was issued |
subject | May be an empty sequence. May contain commonName. If the subject contains a commonName attribute, the value must be one of the values in the subjectAlternativeName extension. |
extension:subjectKeyIdentifier | not marked critical, 160-bit SHA-1 hash of subjectPublicKey [RFC 5280] |
extension:authorityKeyIdentifier | not marked critical, matches subjectKeyIdentifier of signing certificate; authorityCertIssuer and authorityCertSerialNumber not present |
extension:certificatePolicies | not marked critical, contains at least one policyIdentifier |
extension:basicConstraints | is either absent or cA is FALSE |
extension:authorityInfoAccess | not marked critical, contains HTTP URL of the Issuing CA's certificate and the HTTP URL of Issuing CA's OCSP responder |
policyQualifiers:policyQualifierId | optional. if present, not marked critical and id‐qt 1 [RFC 5280] |
extension:cRLDistributionPoints | not marked critical, contains HTTP URL of CRL service |
extension:subjectAltName | must contain at least one name and all names must be of type dNSName. Must be marked critical if Subject is empty, not marked critical otherwise. |
extension:keyUsage | optional. if present, marked critical, digitalSignature bit must be set, nonRepudiation, keyEncipherment or keyAgreement may be set, other bits are not set. |
extension:extkeyUsage | not marked critical, must include either id-kp-serverAuth or id-kp-clientAuth, or both [RFC 5280] |
extension:signedCertificateTimestampList | optional. if present, not marked critical, only in final certificates, contains one or more Signed Certificate Timestamps (SCTs) per RFC 6962 |
extension:ctPoison | optional. if present, marked critical, indicates that this is a precertificate which will be used to get SCTs for the final certificate per RFC 6962 |
extension:canSignHttpExchanges | not marked critical, must have the value NULL |
Field | Content |
---|---|
validity:not after | Not more than 365 days after the later of validity:notBefore or the date the certificate was issued |
subject | May be an empty sequence. May contain commonName. If the subject contains a commonName attribute, the value must be one of the values in the subjectAlternativeName extension. |
extension:subjectKeyIdentifier | not marked critical, 160-bit SHA-1 hash of subjectPublicKey [RFC 5280] |
extension:authorityKeyIdentifier | not marked critical, matches subjectKeyIdentifier of signing certificate; authorityCertIssuer and authorityCertSerialNumber not present |
extension:certificatePolicies | not marked critical, contains at least one policyIdentifier |
extension:basicConstraints | is either absent or cA is FALSE |
extension:authorityInfoAccess | not marked critical, contains HTTP URL of the Issuing CA's certificate |
policyQualifiers:policyQualifierId | optional. if present, not marked critical and id‐qt 1 [RFC 5280] |
extension:cRLDistributionPoints | not marked critical, contains HTTP URL of CRL service |
extension:subjectAltName | marked critical, must contain at least one name and all names must be of type rfc822Name. |
extension:keyUsage | marked critical, digitalSignature bit must be set, keyEncipherment may be set for RSA certificates, keyAgreement may be set for ECDSA certificates, other bits are not set. |
extension:extkeyUsage | not marked critical, id-kp-emailProtection must be set, should not include other values [RFC 5280] |
Version | Date | Change owner | Note |
---|---|---|---|
1.0 | 2016-12-09 | CA Policy Authority | Initial publication |
1.1 | 2016-12-14 | CA Policy Authority | Updated certificate profiles |
1.2 | 2016-12-27 | CA Policy Authority | Added additional note on previous operation of R2 and R4 |
1.3 | 2017-01-11 | CA Policy Authority | Added additional note on previous operation of Root CAs |
1.4 | 2017-02-15 | CA Policy Authority | Updated contact information |
1.5 | 2017-02-26 | CA Policy Authority | Added GIAG3 subordinate |
1.6 | 2017-04-07 | CA Policy Authority | Removed revoked EV/G2 subCAs |
1.7 | 2017-05-29 | CA Policy Authority | Updated certificate profiles and OCSP terms |
1.8 | 2017-06-16 | CA Policy Authority | Added new subCAs created in 2017-06-15 ceremony |
1.9 | 2017-09-08 | CA Policy Authority | Aligned with new version of CA/B Forum Requirements |
2.0 | 2017-12-04 | CA Policy Authority | Updated Section on Certificate Validation |
2.1 | 2018-01-31 | CA Policy Authority | Clarified contact information |
2.2 | 2018-03-08 | CA Policy Authority | Wording improvements |
2.3 | 2018-08-01 | CA Policy Authority | Replaced method for validation of domain authorization or control |
2.4 | 2018-08-24 | CA Policy Authority | Updated permissible crypto algorithms |
2.5 | 2018-09-11 | CA Policy Authority | Added BR references for IP address authentication |
2.6 | 2018-10-23 | CA Policy Authority | Updated revocation timelines as per CA/B Forum Ballot SC6 |
2.7 | 2018-11-06 | CA Policy Authority | Added new CAs created in 2018-10-29 ceremony |
2.8 | 2019-01-07 | CA Policy Authority | Added prohibition of underscore characters in dNSName entries |
2.9 | 2019-04-05 | CA Policy Authority | Update LTSX info |
2.10 | 2019-05-08 | CA Policy Authority | Updates for DV issuance |
2.11 | 2019-05-20 | CA Policy Authority | General updates and wording improvements |
2.12 | 2019-08-01 | CA Policy Authority | Updated IP Address validation methods |
2.13 | 2019-09-30 | CA Policy Authority | Updated certificate profile definitions |
2.14 | 2019-10-02 | CA Policy Authority | Removed revoked GIAG3, GTSX and GlobalSign EV CA G2 subCAs |
2.15 | 2020-01-31 | CA Policy Authority | Updated re-issued GTSY3 and GTSY4 |
2.16 | 2020-02-03 | CA Policy Authority | Updated section on indemnities |
2.17 | 2020-06-02 | CA Policy Authority | Updated validation methods in Section 3.2.2.4 |
2.18 | 2020-06-18 | CA Policy Authority | Added GTS Root R1 cross sign |
2.19 | 2020-07-28 | CA Policy Authority | Updated certificate profiles for SXG issuance |
2.20 | 2020-08-06 | CA Policy Authority | Distinguished between Subscriber- and CA Certificates in Section 4.8 |
2.21 | 2020-08-13 | CA Policy Authority | Added reissued roots and new subCAs created in 2018-08-13 ceremony |
2.22 | 2020-08-21 | CA Policy Authority | Removed obsolete Google PKI Policy OID in Section 7.1.6 |
3.0 | 2021-03-19 | CA Policy Authority | Updated various sections following annual CPS review |
3.1 | 2021-04-07 | CA Policy Authority | Added methods that can be used as proof of private key compromise |
3.2 | 2021-04-13 | CA Policy Authority | Added ACME IP Address validation methods |
3.3 | 2021-04-22 | CA Policy Authority | Remove 3.2.2.4.10 as a validation method |
3.4 | 2021-04-26 | CA Policy Authority | Add 3.2.2.4.20 as a validation method |
4.0 | 2021-08-11 | CA Policy Authority | Updated various sections following full CPS review |
4.1 | 2021-09-24 | CA Policy Authority | Update sections on OCSP and ADN validation policy |
4.2 | 2021-09-24 | CA Policy Authority | Update section on OCSP handling of certificates |
4.3 | 2021-09-24 | CA Policy Authority | Removed old references to organizationalUnitName |
4.4 | 2021-09-24 | CA Policy Authority | Clarified logging practices |
4.5 | 2021-10-04 | CA Policy Authority | Add CAA ACME limitations from RFC 8657 |
4.6 | 2022-01-06 | CA Policy Authority | Updated various sections based on ballot SC48, and removed expired CAs (R2) and subCAs (GTS CA 1O1 and GTS CA 1D2) |
4.7 | 2022-03-25 | CA Policy Authority | Fixed typographic errors |
4.8 | 2022-04-26 | CA Policy Authority | Updated S/MIME Certificate profile |
4.9 | 2022-09-29 | CA Policy Authority | Updated sections on Certificate revocation processes |
4.10 | 2022-10-06 | CA Policy Authority | Add intermediate CAs issued in 2022-10-05 Ceremony |
4.11 | 2022-10-26 | CA Policy Authority | Clarified language on submitting certificate revocation requests |
4.12 | 2023-02-16 | CA Policy Authority | Clarified that CT Poison and SCT extensions are used in our certificates |
4.13 | 2023-02-21 | CA Policy Authority | Updated various sections based on ballot SC-56 and SC-58 |
4.14 | 2023-04-18 | CA Policy Authority | SC-61: New CRL Entries must have a Revocation Reason Code |