Loren Data Corp.

'

 
 

COMMERCE BUSINESS DAILY ISSUE OF MAY 17,1999 PSA#2347

Defense Information Systems Agency, DITCO-NCR, 701 South Court House Road, Arlington, VA 22204-2199

D -- INTERIM EXTERNAL CERTIFICATE AUTHORITY (IECA) REQUEST FOR IECA CANDIDATES DUE 052899 POC IECA Customer Support Center, (703) 848-2898 INTERIM EXTERNAL CERTIFICATE AUTHORITY (IECA) REQUEST FOR IECA CANDIDATES..MAY 10, 1999 ..STATEMENT OF INTENT The Paperless Contracting Wide-Area Work Flow (WAWF) Electronic Document Access (EDA), and Defense Travel System (DTS) applications and other DOD Public Key Infrastructure (PKI) External Certificate Authority (ECA) programs must issue PKI client certificates to their non-Department of Defense (DOD) users by June 1999. Therefore, the DOD is releasing a "Request for IECA Candidates" to support the DOD PKI IECA. Interested U.S. companies are encouraged to serve as IECAs. DOD will begin accepting IECA Candidate Packages on the published date of this announcement until the tenth working day thereafter. Mandatory IECA testing, application interoperability testing and IECA Candidate Package review will begin when the DOD receives its first IECA candidate's package. The IECA duration will be one year from the date a Memorandum of Agreement (MOA) is signed by DOD. This release supercedes July 13th, 1998, "Request For Information" "External Certification Authorities" (ECAs). INTRODUCTION The Defense Information Systems Agency (DISA) and the National Security Agency (NSA) are taking steps to establish a DOD PKI. The DOD PKI will be used for certificate and key management and to provide directory services for the storage and archiving of certificates and certificate revocation lists (CRLs). The DOD PKI is intended to be sufficient to support internal DOD business practices As public key cryptography continues to be adopted as part of the overall security solution for a variety of applications, both inside and outside of the DOD, there exists an increased need for interoperable PKIs. Recognizing the need to interoperate with Certificate Authorities (CAs) outside of the DOD domain, DOD plans to establish trust relationships with CAs that achieve a satisfactory assurance level. These (ECAs) will provide non-DOD personnel with certificate services that interoperate with the DOD PKI. Contractors, vendors and other interested parties may use certificates obtained from an accredited ECA to transact electronic business with DOD entities. The DOD will require that all accredited ECAs achieve an assurance level equivalent to or greater than the DOD PKI class 3 policy (Certificate Policy) THE INTERIM EXTERNAL CERTIFICATE AUTHORITY (IECA) In an effort to more quickly establish the ECA capability, IECAs will not operate under the DOD Root CA. The IECA will follow the same submission process as the ECA; support the same or equivalent certificate policy, provide the same level of assurance in their operations, and assign subject distinguished names. However, IECAs may only issue client certificates to identified non-DOD users of the EDA, WAWF, DTS applications and other as identified DOD PKI/ECA programs IECAs will provide certification services to a limited number of DOD contractors that support specified programs requiring PKI support in the near term. These programs include, but are not limited to EDA, WAWF and DTS. IECAs mayhave the opportunity to transition to an ECA SUPPORTING DOCUMENTATION The DOD PKI ECA Web Page (www.disa.mil/infosec/pkieca) contains the DOD PKI supporting documentation. This documentation includes: DOD Medium Assurance Public Key Infrastructure Functional Specification (Draft), (Version 0.3, October 20, 1998), IECA Candidate Pass/Fail Criteria, (Version 1.0, May 5, 1999), X.509 Certificate Policy, Modified for IECAs, (Draft) (May 4, 1999), Guidelines for External Certification Authority Interoperability with the Department of Defense Public Key Infrastructure (Draft) (ECA Guidelines), (Version 0.7, April 29, 1999), Interim External Certificate Authority X.509 Certificate Compliance Test Plan, (May 5, 1999) and Memorandum Of Agreement (MOA) between the DOD and the Interim External Certificate Authority. In addition two illustrations; Diagram 1: Interim and Objective ECA and Diagram 2: IECA Candidate Process are provided. Both the ECA Guidelines and the IECA Pass/Fail criteria were written for the ObjectiveECA under the DOD Root but identify the streamlined requirements for IECA Candidates. Combining the Interim and the Objective ECA documentation was intended to allow the IECA providers to recognize where their operations will need to change when transitioning to the fully developed ECA under the DOD Root. [Note: The ECA Guidelines take precedence over the DOD PKI Functional Specification Document.] ..CUSTOMER SUPPORT The DOD PKI ECA Web site contains the IECA Candidate Package, DOD PKI ECA Customer Support email address and a phone number for potential IECAs who have questions or issues with the IECA Candidate Package or process. The DOD PKI ECA Web address is www.disa.mil/infosec/pkieca. As they become available, the Joint Electronic Commerce Program Office Web Site, www.acq.osd.mil/ec, DTS Web Site, www.dtic.mil/travelink/industry, the Electronic Commerce Resource Centers (ECRC) Web Site, www.ecrc.ctc.com and other program sites requiring IECA support will be linked to the DOD PKI ECA Web page to provide widest dissemination of information to DOD IECAs and its users. In addition, this site will list accepted IECAs, lessons learned, and frequently asked questions (FAQ's) from users and vendors with their responses .IECA CANDIDATE PACKAGE Each IECA Candidate is required to submit an IECA Candidate Package consisting of the IECA Candidates Certificate Practice Statement, System documentation and architecture, sample certificates and CRLs, X.509 Version 3 Standard Profile, and a signed MOA. Supporting documentation and details can be found on the DISA PKI ECA Web Site. All IECA Candidate Packages shall be sent by courier (e.g., FedEx, UPS, etc.) in hardcopy and, where applicable, in magnetic form (3 inch floppy) to DOD PKI IECA Candidate Processing Office, Suite 100 West, 7927 Jones Branch Drive, McLean, VA 22102-3305 .IECA CANDIDATE PROCESS All IECA Candidate Packages will be accepted by the DOD, however, the DOD will permit only the first three IECA Candidates who submit a complete IECA candidate package, pass all the required criteria to operate as an IECA, and who can efficiently service at competitive rates the WAWF, EDA, DTS and other DOD programs. Any IECA Candidate, who does not meet all required qualifications, may be removed from processing .DOD PKI REVIEW PROCESS The DOD will review IECA Candidate Packages submitted by candidate ECAs. The review committee composed of members from DISA, NSA and PKI and legal experts will ensure that the IECA Candidate's Certificate Practice Statement complies with the DOD Certificate Policy, and the system documentation and architecture support DOD policy and documentation. If the IECA Candidate's package is compliant, and includes a properly signed DOD IECA MOA, the committee will recommend that the DOD Chief Information Officer (CIO) sign the IECA Candidate's MOA and allow the IECA to operate. The IECAs must be capable of providing certificates within five days of notification of acceptance from the DOD .COMPLIANCE AND INTEROPERABILITY TESTING The IECA Candidate's X.509 certificate will be tested by the DOD Joint Interoperability Test Command (JITC) for compliance to the DOD X.509 Version 3 Standard profile. The IECA Candidate will be permitted to test two times with the JITC before they are removed from the candidate list. A report of findings with recommendations will be provided to the failed IECA Candidate. The DOD will provide a list of IECAs to vendors requesting the same and post the list on the DOD PKI ECA Internet web Page .Each IECA Candidate is required to test with the EDA; WAWF, DTS applications and any other identified DOD PKI/ECA application for interoperability .TRANSITION OF IECA TO OBJECTIVE ECA UNDER DOD ROOT The DOD plans to transition IECAs to the objective ECA. Objective ECA's will be under the DOD Root. DOD intends to provide a transition plan to all IECAs by December 30, 1999 .LEGAL LIABILITY DOD assumes no liability for the operations of the IECA or their subscribers. YEAR 2K COMPLIANCE All information technology provided under, or in support of, this IECA package by the IECA Candidate or its subcontractors shall be Year 2000 compliant. "Year 2000 compliant" means, with respect to information technology, that the information technology accurately processes date/time data (including, but not limited to, calculating, comparing and sequencing) from, into and between the twentieth and twenty-first centuries, and the years 1999 and 2000 and leap year calculations, to the extent that other information technology, used in combination with the information technology being acquired, properly exchanges date/time data with it MEMORANDUM OF AGREEMENT All IECA Candidates must submit a signed DOD IECA MOA with their IECA candidate package. Submitting a signed MOA signifies that the IECA Candidate has read and complies with all of the DOD PKI ECA Documentation that is referenced or contained herein. The candidate package may be returned if the MOA is not signed. After processing, the DOD CIO will sign the MOA. DOD CIO signature authorizes the IECA to issue certificates to the EDA, WAWF, DTS and other DOD initiatives' customers identified by the DOD. Posted 05/13/99 (W-SN331253). (0133)

Loren Data Corp. http://www.ld.com (SYN# 0043 19990517\D-0015.SOL)


D - Automatic Data Processing and Telecommunication Services Index Page