2024年11月

The key differences between a Certificate Authority (CA) and a regular SSL certificate provider are as follows:

  1. Issuer of Certificates: A Certificate Authority (CA) is an entity that issues digital certificates, including SSL/TLS certificates, after validating the identity of the applicant. A regular SSL certificate provider, on the other hand, may refer to a service that provides SSL certificates, which could be either self-signed or issued by a CA. CAs are trusted third parties that authenticate the identity of the certificate holder, whereas a regular SSL provider might simply offer the technical means to obtain a certificate, which may or may not be trusted by browsers and users .
  2. Trust and Recognition: CAs are recognized and trusted by browsers and operating systems globally. SSL certificates issued by these CAs are automatically trusted, and users see a padlock icon in their browser's address bar, indicating a secure connection. In contrast, a regular SSL certificate provider might offer certificates that are not automatically trusted, such as self-signed certificates, which would show a warning to users, affecting trust and security perceptions .
  3. Validation Process: CAs undergo a rigorous process to verify the identity of the entity requesting the certificate, which includes organizational validation and, in some cases, extended validation. This process ensures that the certificate is issued to the rightful owner. Regular SSL certificate providers may not perform such extensive checks, especially if they are offering self-signed certificates .
  4. Compliance and Standards: CAs must adhere to industry standards such as the CA/Browser Forum Baseline Requirements, which dictate how CAs operate and the level of assurance they provide. Regular SSL certificate providers may not be bound by these same standards, especially if they are not recognized CAs .
  5. Certificate Types: CAs can issue various types of certificates, including SSL/TLS, code signing, and email certificates. A regular SSL certificate provider might focus solely on SSL/TLS certificates for securing websites .
  6. Cost and Fees: Services provided by CAs often come with a cost, as they include identity verification and the assurance of a trusted certificate. Regular SSL certificate providers may offer free or lower-cost options, such as self-signed certificates, which do not provide the same level of trust and assurance .
  7. Revocation and Management: CAs maintain a repository of all issued certificates and manage their revocation status. This is crucial for the security of the internet, as it allows for quick revocation in case a certificate is compromised. Regular SSL certificate providers may not have the same infrastructure or responsibility for managing the lifecycle of certificates post-issuance .

To apply for a Certificate Authority (CA) license, there isn't a specific type of business that is required; however, there are certain criteria and requirements that must be met. Here are the main requirements for a CA license application:

  1. Legal Entity Status: The applicant must be a legally established entity with the capacity to bear civil liabilities. This means that the entity could be a corporation, limited liability company (LLC), partnership, or other legally recognized business structures .
  2. Technical Infrastructure: The entity must have a reliable and secure technical infrastructure capable of supporting the issuance and management of digital certificates .
  3. Compliance with Standards: Compliance with industry standards such as the CA/Browser Forum Baseline Requirements is mandatory. These standards cover SSL/TLS management, code signing, and network security .
  4. Audits and Assessments: The CA must undergo extensive audits to ensure compliance with WebTrust Principles and Criteria and CA/B Forum Baseline Requirements. These audits assess financial, security, and business principles .
  5. Operational Procedures: The CA must have clear operational procedures and controls in place to manage the lifecycle of certificates, including issuance, revocation, and renewal .
  6. Physical Security: There must be stringent physical security measures to protect the CA's infrastructure and the cryptographic keys used for certificate issuance .
  7. Personnel Qualifications: The CA must employ qualified personnel with the necessary skills and knowledge to manage and operate the CA services securely and efficiently .
  8. Business Continuity Plan: A robust business continuity plan must be in place to ensure the CA can continue operations in the event of a disaster or other significant disruption .
  9. Legal and Regulatory Compliance: The CA must comply with all relevant laws and regulations, including those related to data protection, privacy, and electronic commerce .

The main requirements for a Certificate Authority (CA) license application in China are as follows:

  1. Legal Entity Status: The applicant must be a legally established entity with the capacity to bear civil liabilities.
  2. Technical Infrastructure: The entity must have a reliable and secure technical infrastructure capable of supporting the issuance and management of digital certificates.
  3. Compliance with Standards: Compliance with industry standards such as the CA/Browser Forum Baseline Requirements is mandatory. These standards cover SSL/TLS management, code signing, and network security.
  4. Audits and Assessments: The CA must undergo extensive audits to ensure compliance with WebTrust Principles and Criteria and CA/B Forum Baseline Requirements. These audits assess financial, security, and business principles.
  5. Operational Procedures: The CA must have clear operational procedures and controls in place to manage the lifecycle of certificates, including issuance, revocation, and renewal.
  6. Physical Security: There must be stringent physical security measures to protect the CA's infrastructure and the cryptographic keys used for certificate issuance.
  7. Personnel Qualifications: The CA must employ qualified personnel with the necessary skills and knowledge to manage and operate the CA services securely and efficiently.
  8. Business Continuity Plan: A robust business continuity plan must be in place to ensure the CA can continue operations in the event of a disaster or other significant disruption.
  9. Legal and Regulatory Compliance: The CA must comply with all relevant laws and regulations, including those related to data protection, privacy, and electronic commerce.
  10. Application and Documentation: The application process will require the submission of detailed documentation, including business plans, technical specifications, and proof of compliance with the above requirements.

The process of obtaining a Certificate Authority (CA) license in China is regulated by the Ministry of Industry and Information Technology (MIIT). According to the information available, the duration for getting a CA license in China can vary, but here's a general idea based on the search results:

  1. Application Process: The application for a CA license involves submitting necessary information and supporting documents to the local Communication Administrations under MIIT . The processing timeline can take approximately 7-10 business days for all documentation to be complete .
  2. Processing Time: After the official filing of the application, it typically takes about 20 business days for the processing of the ICP application, which is a prerequisite for operating as a CA in China . However, this time frame can vary depending on the specific circumstances and the efficiency of the processing agency.
  3. Additional Considerations: It's important to note that the application process and all documentation must be entirely in Chinese, which can be a significant barrier for foreign companies . Additionally, the requirements for an ICP Commercial License, which is necessary for companies looking to generate income from their site, are more thorough and can take longer due to additional scrutiny .

Becoming a Certificate Authority (CA) is a complex process that involves meeting specific requirements and adhering to industry standards. Here's a guide on how to become a CA:

  1. Understand the Role of a CA: A CA is responsible for verifying and issuing digital certificates that ensure secure communication over the internet. They play a crucial role in maintaining the trust and security of online transactions .
  2. Meet Technical Requirements: Your root and intermediate certificates must be included in the trust stores of different platforms like Microsoft, Apple, the Chromium Project (Google Chrome), and Mozilla to gain public trust .
  3. Adhere to Industry Standards: Compliance with industry standards such as the CA/Browser Forum Baseline Requirements is mandatory. These standards outline the rules for SSL/TLS management, code signing, and network security .
  4. Undergo Extensive Audits: Compliance with programs like WebTrust Principles and Criteria and CA/B Forum Baseline Requirements requires thorough audits. Auditors assess CAs based on financial, security, and business principles .
  5. Significant Investment: Establishing a public CA involves substantial resources for secure storage devices and IT infrastructure. Additionally, there are costs associated with hiring security experts, training programs, and ongoing compliance reviews .
  6. Distribution Efforts: Distributing your root certificate to all relevant devices and platforms can take years unless you opt for cross-signing with existing CAs, which is becoming increasingly uncommon .
  7. Legal Basis and Regulation: In China, CA operations are regulated by laws such as the "Electronic Signature Law" and the "Cybersecurity Law." CAs must obtain a "Electronic Certification Service License" from the Ministry of Industry and Information Technology and comply with relevant laws and regulations to ensure the security and credibility of digital certificates .
  8. Application Process: For becoming a new CA, you must fill out an application form and send it to the relevant email address, such as [[email protected]] for Microsoft's Trusted Root Certificate Program. Microsoft will review your application and may request additional documentation to determine if you meet the program requirements .
  9. Create Your Own Private CA: For most organizations, setting up a private CA is more feasible. This involves distributing the root CA only within your internal network, allowing you to customize certificate profiles and policies according to your unique security needs .
  10. Infrastructure and Key Management: Establish a robust IT infrastructure to support your private CA server. Generate root CA keys and certificates, and ensure the protection of cryptographic keys using hardware security modules (HSMs) .
  11. Deployment of Root CA Certificates: Distribute the root CA certificates to all devices on your network to ensure seamless certificate validation .