You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# 535 Enhancements to Adding, Revoking, and Removing Non-Root Certificates (#548)
* Allow add/remove/revoke cert operations for Vendor accounts with matching Subject/SKID
* Update tests to handle the removal of non-root certificates
* Fix validations for the 'Add X.509 Certificate' transaction
* Change signer to Vendor for non-root certificate gRPC/REST tests
* Update documentation for add/revoke/remove transactions
Copy file name to clipboardexpand all lines: docs/transactions.md
+12-11
Original file line number
Diff line number
Diff line change
@@ -905,13 +905,17 @@ already present on the ledger.
905
905
906
906
The certificate is immutable. It can only be revoked by either the owner or a quorum of Trustees.
907
907
908
+
- Who can send: Vendor account
909
+
- PAA (Root certificates) are VID-scoped:
910
+
- the vid field in the subject of the root certificate, as well as in the intermediate/leaf X509 certificates and the Vendor account's VID certificate, must be the same.
911
+
- Non-VID scoped PAAs (Root certificates):
912
+
- if the intermediate/leaf X509 certificate is VID-scoped, then the `vid` field in the certificate must match the corresponding PAA's `vid` field on the ledger, or the intermediate/leaf X509 certificate must not be VID-scoped.
913
+
-`vid` field associated with the corresponding PAA on the ledger must be equal to the Vendor account's VID.
908
914
- Parameters:
909
915
- cert: `string` - PEM encoded certificate. The corresponding CLI parameter can contain either a PEM string or a path to a file containing the data.
@@ -1041,7 +1043,6 @@ Publishing the revocation distribution endpoint doesn't automatically remove PAI
1041
1043
and DACs (leaf certificates) added to DCL if they are revoked in the CRL identified by this distribution point.
1042
1044
[REVOKE_X509_CERT](#revoke_x509_cert) needs to be called to remove an intermediate or leaf certificate from the ledger.
1043
1045
1044
-
1045
1046
- Who can send: Vendor account
1046
1047
-`vid` field in the transaction (`VendorID`) must be equal to the Vendor account's VID
1047
1048
- VID-scoped PAAs (Root certs) and PAIs (Intermediate certs): `vid` field in the `CRLSignerCertificate`'s subject must be equal to the Vendor account's VID
@@ -1140,7 +1141,7 @@ This transaction adds a NOC root certificate owned by the Vendor.
1140
1141
- no existing certificate with the same `<Certificate's Issuer>:<Certificate's Serial Number>` combination.
1141
1142
- if certificates with the same `<Certificate's Subject>:<Certificate's Subject Key ID>` combination already exist:
1142
1143
- the existing certificate must be NOC root certificate
1143
-
- the sender's VID must match the vid field of the existing certificates.
1144
+
- the sender's VID must match the `vid` field of the existing certificates.
1144
1145
- the signature (self-signature) and expiration date must be valid.
1145
1146
- Parameters:
1146
1147
- cert: `string` - The NOC Root Certificate, encoded in X.509v3 PEM format. Can be a PEM string or a file path.
0 commit comments