Federated Trust

Roadmap to Subordination

Subordination of an Enterprise PKI to Federated Trust is known as CertiPath Standard Service. In order to initiate the activity required to achieve subordination to the CertiPath Root, the applying organization must submit an Application for Subordination. This application must be submitted along with the following documentation for CertiPath Policy Management Authority approval:

  • Certification Practices Statement for the Principal CA that will be subordinated to the CertiPath Root
  • Key Recovery Practices Statement that demonstrates compliance with the CertiPath Key Recovery Policy (as appropriate)
  • Architectural Diagram detailing the components of the applicant’s PKI.

Additional documentation must be submitted prior to completion of the mapping activity:

  • Third Party Auditor Operational Compliance Analysis letter asserting that the Principal CA’s operations meet the requirements set forth in the associated CP/CPS.
  • Certificate Artifacts for Interoperability Testing

Upon successful completion of the document review and the interoperability testing, the results are submitted to the Policy Management Authority for final review and approval to subordinate. For more information or to initiate the subordination process, please contact CertiPath.

About CertiPath

CertiPath focuses on the use of digital identity in the modern connected world. Trusted digital identities are one of the most important components to securing your network, data and buildings but achieving ubiquitous trust online has been a challenge for 30 years.

Contact Us
  • Address: 1900 Reston Metro Plaza
    Suite 303, Reston, VA 20190, USA
  • Toll Free: 1.855.758.0075
  • Phone: 1.703.793.7870
  • Email: info@certipath.com
© 2016 CertiPath®. All rights reserved. CertiPath® and the CertiPath® logo are trademarks of CertiPath®. Privacy  ⁄  Terms of Use