Alliance for Empowerment

Multi-Organization Public Key Infrastructure

Certificate Policy v1.0 Internal

Certificate Policy (CP)

Alliance for Empowerment Inc. — Multi-Organization PKI — RFC 3647 Framework

Document ID
A4E-PKI-CP-001
Version
1.0 — Production Release
Effective Date
2026-05-01
Review Date
2027-05-01
Classification
Public (Internal Network)
Policy Authority
Brian Vicente, Network Coordinator
OID Arc
1.3.6.1.4.1.65571
Hosted At
http://10.0.1.232/pki/docs/cp.html
This CP is structured per RFC 3647 and aligned with NIST SP 800-57 Rev.6, NIST SP 800-131A Rev.3, FIPS 203/204/205, SP 800-232, ISC2 CCSP Domain 3, CompTIA Security+/CySA+, CA/Browser Forum BR, and ITU-T X.690 ASN.1 DER encoding rules. The PKI is currently an internal trust hierarchy; the path to public trust is described in Section 11.

1. Introduction

1.1 Overview

This Certificate Policy (CP) defines the rules, assurance levels, and obligations governing the Alliance for Empowerment Multi-Organization PKI. It covers all certificates issued to, or on behalf of, Alliance for Empowerment Inc. (Alliance), Able-2 Enhancing Potential Inc. (Able-2), and Capabilities Inc. (Capabilities). The PKI operates as a private, internal three-tier hierarchy. One offline Root CA serves as the single trust anchor. Three Enterprise Issuing CAs operate online, one per organization. step-ca instances serve as Registration Authorities (RAs) and hold no CA private keys.

1.2 Policy OID Identification

PolicyOIDScopeCPS URL
Multi-Org Root Policy1.3.6.1.4.1.65571.2.1All three orgspki.alliance.internal/cps/multi-org-cps.html
Alliance Policy1.3.6.1.4.1.65571.2.2Alliance for Empowermentpki.alliance.internal/cps/alliance-cps.html
Able-2 Policy1.3.6.1.4.1.65571.2.3Able-2 Enhancing Potentialpki.able2.internal/cps/able2-cps.html
Capabilities Policy1.3.6.1.4.1.65571.2.4Capabilities Inc.pki.capabilities.internal/cps/capabilities-cps.html

1.3 PKI Participants

RoleHostIPOrg
Offline Root CAPKI-ROOT10.0.1.244Shared (air-gapped)
Alliance Issuing CAPKI-ALLIANCE10.0.1.246Alliance
Able-2 Issuing CAPKI-ABLE210.0.1.6Able-2
Capabilities Issuing CAPKI-CAPE10.0.1.249Capabilities
Alliance RA (step-ca)step-alliance.alliance.internal10.0.1.247Alliance
Able-2 RA (step-ca)step-able2.able2.internal10.0.1.9Able-2
Capabilities RA (step-ca)step-cape.capabilities.internal10.0.1.250Capabilities
PKI Web / CRL / OCSP / Docsthe-orc10.0.1.232Shared
Alliance DCalliance-dc01.alliance.internal10.0.1.245Alliance
Able-2 DCable2-dc01.able2.internal10.0.1.5Able-2
Capabilities DCcape-dc01.capabilities.internal10.0.1.248Capabilities

1.4 Certificate Usage

Certificate TypeEKU OIDPermitted Use
TLS Server1.3.6.1.5.5.7.3.1HTTPS, LDAPS, RDP, internal services
TLS Client1.3.6.1.5.5.7.3.2VPN, 802.1X, user auth, device auth
S/MIME1.3.6.1.5.5.7.3.4Email signing and encryption
Code Signing1.3.6.1.5.5.7.3.3Internal scripts, PowerShell, applications
OCSP Signing1.3.6.1.5.5.7.3.9OCSP responder on the-orc
Smart Card Logon1.3.6.1.4.1.311.20.2.2Windows domain authentication
802.1X / Wi-Fi1.3.6.1.5.5.7.3.1+.3.2UniFi WPA2-Enterprise
Device Identity1.3.6.1.5.5.7.3.2Intune-managed device auth
Prohibited Uses: Certificates issued under this CP SHALL NOT be used for public Internet TLS prior to public trust program inclusion and CT log submission. The Root CA SHALL NOT issue end-entity certificates directly. Certificates SHALL NOT be used outside NameConstraints permitted subtrees.

2. Publication and Repository

ResourceAlliance URLAble-2 URLCapabilities URL
CP / CPSpki.alliance.internal/cps/pki.able2.internal/cps/pki.capabilities.internal/cps/
Root CRLpki.alliance.internal/CRL/root.crlpki.able2.internal/CRL/root.crlpki.capabilities.internal/CRL/root.crl
Issuing CRLpki.alliance.internal/CRL/alliance-issuing.crlpki.able2.internal/CRL/able2-issuing.crlpki.capabilities.internal/CRL/cape-issuing.crl
OCSPpki.alliance.internal/OCSPpki.able2.internal/OCSPpki.capabilities.internal/OCSP
Root CertAvailable at all three /Certs/Alliance-Root-CA.crt endpoints
  • CRLs published within 24 hours of any revocation; Root CRL on 26-week schedule with 2-week overlap; issuing CA CRLs on 2-week schedule with 12-hour overlap
  • CP/CPS documents updated within 30 days of any material policy change
  • Availability target: 99.9% uptime for all HTTP endpoints on the-orc

3. Identification and Authentication

3.1 Distinguished Name Conventions

All certificates comply with RFC 5280 §4.1.2.6. SAN is mandatory for all TLS certificates per RFC 5280 §4.2.1.6 and CA/B Forum BR §7.1.4.2. CN alone is insufficient.

FieldRoot CAIssuing CAEnd-Entity
CNAlliance Multi-Org Root CA[Org] Issuing CAFQDN or UPN/email
OAlliance for Empowerment Inc.Alliance for Empowerment Inc.Issuing org legal name
L/ST/CPine City / New York / USPine City / New York / USOptional / Optional / US

3.2 NameConstraints Permitted Subtrees

OrganizationDNS PermittedEmail Permitted
Alliance.alliance.internal • .wearealliance.org • .o365.wearealliance.org@wearealliance.org
Able-2.able2.internal • .able-2.org@able-2.org
Capabilities.capabilities.internal • .capabilities.org@capabilities.org
Excluded (ALL orgs).onmicrosoft.com • .mail.onmicrosoft.comMicrosoft-managed; not under org control

4. Certificate Lifecycle Requirements

Certificate TypeMaximum ValidityCompliance Basis
Root CA20 yearsNIST SP 800-57 Rev.6 §5.3.6
Issuing CA10 yearsNIST SP 800-57 Rev.6 (½ root lifetime)
TLS Server / Client2 yearsNIST SP 800-57, CA/B Forum BR
S/MIME / Code Signing2 yearsNIST SP 800-57
ACME-issued (step-ca)90 daysRFC 8555 best practice
SCEP-issued (step-ca)1 yearRFC 8894
OCSP Signing2 yearsRFC 6960
Revocation ReasonCRLReason CodeResponse Timeline
keyCompromise1Within 24 hours
affiliationChanged / superseded / cessationOfOperation3,4,5Within 5 business days
Unspecified0Within 5 business days

5. Physical, Procedural, and Personnel Controls

  • Root CA physical: PKI-ROOT is air-gapped; NIC disconnected at all times except signing ceremony; housed in locked server room; accessible only via XenCenter/Hyper-V console by PKI admin
  • Key ceremony: Initiated by PKI administrator; all CSRs reviewed before submission; NIC attached only during ceremony; all events logged with timestamps and serial numbers; VM shut down after ceremony
  • Issuing CAs: Online but hardened; RDP restricted to PKI admin; Atera RMM monitoring on certsvc; template objects on PKI-ALLIANCE, not on Root CA
  • Personnel: PKI admin access exclusive to Network Coordinator; no shared credentials; all CA actions logged via Windows Security Event Log (Event IDs 4886/4887/4888/4890)

6. Technical Security Controls

CA TierAlgorithmKey SizeHashStandard
Root CARSA4096-bitSHA-256NIST SP 800-57 Rev.6, FIPS 186-5
Issuing CAsRSA4096-bitSHA-256NIST SP 800-57 Rev.6, FIPS 186-5
End-Entity (Phase 1)RSA or ECDSA2048+ / P-256 / P-384SHA-256NIST SP 800-57 Rev.6
End-Entity (Phase 2+)ML-DSA / SLH-DSA (hybrid)Per FIPS 204/205SHA-3FIPS 204, 205
P-521 is prohibited for TLS Server certificates. Chrome and Edge do not support ECDSA P-521. All browser-facing TLS certificates MUST use P-256, P-384, or RSA-2048+. P-521 may only be used for non-browser-facing certificates where client compatibility has been explicitly verified.

7. Certificate and CRL Profiles

7.1 Root CA Profile

ExtensionValueCritical
Basic ConstraintsCA=TRUE, PathLength=2YES
Key UsagekeyCertSign, cRLSignYES
Name ConstraintsPermitted subtrees per Section 3.2YES
Certificate PoliciesOIDs 1.3.6.1.4.1.65571.2.1–.2.4 + CPS URLsNO
CDP / AIAAbsent (offline self-signed root — RFC 5280 compliant)

7.2 Issuing CA Profile

ExtensionValueCritical
Basic ConstraintsCA=TRUE, PathLength=0YES
Key UsagedigitalSignature, keyCertSign, cRLSign (DER: 03 02 01 86)YES
CDPhttp://pki.[org].internal/CRL/[org]-issuing.crlNO
AIA OCSPhttp://pki.[org].internal/OCSPNO
AIA CA Issuerhttp://pki.[org].internal/Certs/Alliance-Root-CA.crtNO
digitalSignature in issuing CA KeyUsage: RFC 5280 §4.2.1.3 permits digitalSignature alongside keyCertSign and cRLSign when the CA key is also used for OCSP signing or RA auth. Required for step-ca RA compatibility. Omitting it causes ASN1 bad tag value errors.

8. Compliance and Audit

StandardScopeStatus
NIST SP 800-57 Rev.6Key management lifecycle✓ Compliant
NIST SP 800-131A Rev.3Algorithm transition✓ Compliant
FIPS 203 (ML-KEM)Post-quantum KEM▶ Roadmap Phase 2
FIPS 204 (ML-DSA)Post-quantum signatures▶ Roadmap Phase 2
FIPS 205 (SLH-DSA)Hash-based signatures▶ Roadmap Phase 2
SP 800-232 (Ascon)Lightweight AEAD — IoT/edge▶ Roadmap Phase 3
RFC 5280X.509 certificate profile✓ Compliant
RFC 3647CP/CPS framework✓ This document
RFC 9618X.509 policy validation✓ Compliant
RFC 8555 / ACMEAutomated cert management✓ step-ca
RFC 8894 / SCEPDevice enrollment✓ step-ca
ITU-T X.690ASN.1 DER encoding✓ Compliant
ISC2 CCSP Domain 3PKI & cryptography✓ Compliant
CompTIA Security+ / CySA+Security baseline✓ Compliant
CA/B Forum BRBaseline Requirements (internal ref)✓ Applied
FIPS 140-3Module validation▶ Planned — HSM Phase 2
RFC 9162 / CT LogsCertificate Transparency▶ Public trust phase only

9. Business and Legal Matters

  • Policy authority: Brian Vicente, Network Coordinator, Alliance for Empowerment Inc., Pine City, New York
  • Contact: pki-admin@wearealliance.org
  • Inter-org responsibilities: Each issuing CA is operated by its respective org; Root CA is operated by Alliance on behalf of all three organizations
  • Liability: This PKI is operated for internal organizational purposes only. No warranties are expressed or implied for relying parties outside the three organizations
  • Privacy: Subject information is limited to what is operationally required; log data retained per organizational data retention policy
  • Termination: CA decommissioning requires minimum 90-day advance notice, final CRL publication with extended NextUpdate, key destruction ceremony, and documented runbook entry

10. Post-Quantum Cryptographic Agility

The Alliance Multi-Org PKI is designed with crypto-agility as a first-class architectural principle. NIST finalized FIPS 203 (ML-KEM), FIPS 204 (ML-DSA), and FIPS 205 (SLH-DSA) in August 2024. SP 800-232 (Ascon) covers lightweight AEAD for IoT/edge. These are reserved in OID arc 1.3.6.1.4.1.65571.5.x and roadmapped below — not active in v1.0 production.
PhaseTimelineAlgorithmStandardStatus
1 — Classical2026 (current)RSA-4096 / SHA-256; ECDSA P-256/P-384FIPS 186-5, SP 800-57Active
2 — Hybrid2026–2027RSA + ML-DSA-65 dual; ML-KEM-768 TLSFIPS 203, 204Planned
3 — PQC Primary2027+ML-DSA-65 CA key; SLH-DSA fallbackFIPS 204, 205Planned
3 — IoT/Edge2027+Ascon-128 / Ascon-128aSP 800-232Planned
4 — RSA Sunset2028–2030RSA-2048 EOL; RSA-4096 CA re-keySP 800-131APlanned

11. Browser Compatibility and Public Trust Path

BrowserTrust MechanismStatus
Chrome / EdgeWindows CTL via GPO deployment✓ Supported
Firefoxenterprise_roots.enabled or policies.json via GPO✓ Supported
Safari (macOS / iOS)macOS Keychain / iOS MDM via Intune✓ Supported
Chrome (Android)Intune MDM profile✓ Supported

11.1 Future Public Trust Roadmap

  1. Internal PKI stabilization — CRL/AIA/OCSP operational; step-ca RA live (current phase)
  2. WebTrust / ETSI audit — Third-party audit of CA operations, key ceremony, CP/CPS
  3. Mozilla Root Program — CA inclusion policy application; triggers Chrome/Apple/Microsoft consideration
  4. Cross-certification (faster path) — Cross-cert from existing publicly trusted CA (DigiCert/Sectigo)
  5. CT log submission — RFC 9162; step-ca supports CT logging natively for public TLS

12. OID Registry

OIDNamePurpose
1.3.6.1.4.1.65571.1.1Root CARoot CA identifier
1.3.6.1.4.1.65571.1.2–.1.4Issuing CAsAlliance/Able-2/Capabilities issuing CAs
1.3.6.1.4.1.65571.2.1–.2.4PoliciesMulti-Org, Alliance, Able-2, Capabilities policies
1.3.6.1.4.1.65571.3.1–.3.8Certificate TemplatesTLS Server/Client, S/MIME, Code Signing, OCSP, Smart Card, 802.1X, Device, CA-Signing
1.3.6.1.4.1.65571.4.1–.4.2Custom ExtensionsOrg Identifier (.4.1), Device Class (.4.2)
1.3.6.1.4.1.65571.5.1–.5.3ML-KEM-512/768/1024FIPS 203 — PQC KEM (128/192/256-bit)
1.3.6.1.4.1.65571.5.4–.5.6ML-DSA-44/65/87FIPS 204 — PQC DSA (128/192/256-bit)
1.3.6.1.4.1.65571.5.7–.5.8SLH-DSA-SHA2-128s/256sFIPS 205 — hash-based signatures
1.3.6.1.4.1.65571.5.9–.5.10Ascon-128 / Ascon-128aSP 800-232 — lightweight AEAD IoT/edge