Hi Erik,
Thank you, thank you very much, for the article (and your time) clarifies many concepts.
" a CA certificate is sort of a master certificate that is ultimately trusted and that is used to sign other, lower level certificates.
If a lower level certificate is signed by a CA certificate and a given computer trusts the CA that issued the CA certificate, it will implicitly trust the lower level certificate as well."
CA certificate
/ \
Sub CA1
/ \
Certificate 1 Certificate 2 (Not allowed)
This is what we have seen, that if we have CA certificate, no matter if we haven't Sub CA2, certificate 2 is allowed.
when I have put your information on the table, the "requirements" has changed. Now they are not interested in limit the Subs CAs but yes in limit to certificate policies OIDs.
The certificate policies (3.1)
www.ietf.org/rfc/rfc2527.txt "A certificate policy, which needs to be recognized by both the issuer and user of a certificate, is represented in a certificate by a unique, registered Object Identifier"
I will ask the version of the IIS and more information (is like a broken telephon).
As I say, thank you very much for your time Erik
Kind regards,