comment

Bullet 2.1.12 states that the underlying PKI should be transparent to the
client. Does this mean that an X-KISS client will be unable to take advantage
of mechanisms specific to a particular underlying PKI? For example, if the
underlying PKI is X.509, the X.509 certificate validation algorithm uses trust anchor
and certificate policy information as inputs. How does the X-KISS Validate service
know which trust anchors and certificate policies to use when building a validated chain of X.509
certificates on behalf of a certain client?

-Yassir

Received on Friday, 16 November 2001 16:21:18 UTC