Skip to content

Commit 738f8b6

Browse files
save file
1 parent 17cfe41 commit 738f8b6

File tree

1 file changed

+11
-12
lines changed

1 file changed

+11
-12
lines changed

blog/25-09-29/name-constraints-in-x509-certificate/name-constraints-in-x509-certificate.html

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,6 @@
2020
<link rel=icon type='image/png' href='/blog/image/blog-30.png'>
2121
<meta name=viewport content='width=device-width, initial-scale=1'>
2222

23-
2423
<script type='application/ld+json'>
2524
{
2625
"@context" : "https://schema.org",
@@ -84,7 +83,7 @@
8483

8584
config = mod.config;
8685
cmd = mod.cmd;
87-
log = mod.log;
86+
log = mod['log-mod'];
8887

8988

9089
config.initmod({ext,$,datatype,menu});
@@ -224,7 +223,7 @@
224223
<body>
225224

226225

227-
<blog-hdr component=grp1 v2.0>
226+
<blog-hdr component=grp1>
228227
<h1 class=title>
229228
Add Name Constraints To A x509 Certificate
230229
</h1>
@@ -250,7 +249,7 @@ <h4>
250249
</div>
251250
</p>
252251
<h4>
253-
🔐 1. Enterprise Internal PKI
252+
1. Enterprise Internal PKI
254253
</h4>
255254
<p>
256255
In large organizations with internal CAs, you can use Name Constraints to restrict subordinate CAs to only issue certificates for internal domains like
@@ -267,7 +266,7 @@ <h4>
267266
This prevents accidental or malicious issuance for public domains like google.com or microsoft.com.
268267
</p>
269268
<h4>
270-
🧪 2. Testing and Development Environments
269+
2. Testing and Development Environments
271270
</h4>
272271
<p>
273272
When setting up a test CA for staging or dev environments, you can constrain it to:
@@ -284,7 +283,7 @@ <h4>
284283
This ensures test certificates can't be misused in production or public-facing systems.
285284
</p>
286285
<h4>
287-
🧭 3. Delegated Subordinate CA
286+
3. Delegated Subordinate CA
288287
</h4>
289288
<p>
290289
If you delegate certificate issuance to a third party (e.g., a partner or vendor), you can constrain their CA to only issue for:
@@ -304,7 +303,7 @@ <h4>
304303
This is especially useful in federated identity systems or multi-tenant infrastructure.
305304
</p>
306305
<h4>
307-
🛡️ 4. IoT Device Identity
306+
4. IoT Device Identity
308307
</h4>
309308
<p>
310309
For IoT deployments, constrain device certificates to:
@@ -321,7 +320,7 @@ <h4>
321320
This helps prevent rogue devices from impersonating others or accessing unauthorized networks.
322321
</p>
323322
<h4>
324-
📜 5. Regulatory Compliance
323+
5. Regulatory Compliance
325324
</h4>
326325
<p>
327326
In sectors like finance or healthcare, constraints can enforce strict boundaries:
@@ -338,7 +337,7 @@ <h4>
338337
This supports auditability and reduces risk in tightly regulated environments.
339338
</p>
340339
<h4>
341-
🧠 Summary
340+
Summary
342341
</h4>
343342
<p>
344343
Name Constraints are like a firewall for your CA’s identity scope. They don’t just say “this CA can issue certificates”—they say “only for these names, and never for those.” Whether you're building a personal PKI, securing enterprise infrastructure, or sandboxing a delegated CA, they’re a powerful tool for trust hygiene.
@@ -364,9 +363,9 @@ <h4>
364363
</div>
365364

366365

367-
<editor id=config component v2.0 fullsize src='ex/config.txt'></editor>
366+
<web-editor id=config fullsize src='ex/config.txt' component></web-editor>
368367

369-
<editor id=cmd component v2.0 fullsize src='ex/cmd.txt'></editor>
368+
<web-editor id=cmd fullsize src='ex/cmd.txt' component></web-editor>
370369

371370

372371
<!--
@@ -390,7 +389,7 @@ <h4>
390389
</div>
391390

392391

393-
<log component v2.0></log>
392+
<log-mod component></log-mod>
394393

395394

396395
</body>

0 commit comments

Comments
 (0)