uspki / policiesLinks
2017 - 2018 Certificate Policy development and drafting for Federal Public Trust Device PKI.
☆42Updated last year
Alternatives and similar repositories for policies
Users that are interested in policies are comparing it to the libraries listed below
Sorting:
- This is the old location for the FPKI Playbook. New location below.☆32Updated 4 years ago
- This is the old location for the PIV Playbook. New location below.☆71Updated 4 years ago
- Federal PKI, X.509 certificate linter☆16Updated 3 months ago
- Documents for Mozilla's PKI policies - certificate root program, etc.☆56Updated 3 months ago
- Certificate Transparency RFC☆80Updated 3 years ago
- X.509 certificate linter☆156Updated 5 years ago
- Tool to check X509 certificates☆73Updated 4 years ago
- Docker environment that contains a Database, Monitor, Observatory and Analyzer☆14Updated 3 years ago
- This tool is deprecated. Please follow these new procedures - https://playbooks.idmanagement.gov/signfedregister/☆21Updated 3 years ago
- Home of the .gov registry☆29Updated last year
- tl-create is a cross-platform command line tool to create a X.509 trust list from various trust stores. (Keywords: CABFORUM, eIDAS, WebPK…☆32Updated 9 months ago
- X.509 certificate linter☆35Updated 2 months ago
- This is the old location for the FICAM Architecture. New location below.☆25Updated 4 years ago
- Tool to verify conformance to the PIV data model per most recent releases of FIPS 201 and associated publications☆27Updated 5 months ago
- The content on this repository was migrated to idmanagement.gov.☆31Updated last year
- A framework for verifying PKI structures☆111Updated last month
- PKI Meta-Linter☆84Updated this week
- IDManagement.gov is a collaboration between GSA and the Federal CIO Council. It is managed by the Identity Assurance and Trusted Access D…☆45Updated this week
- Support PIV/CAC with identity-idp☆23Updated 3 weeks ago
- Some code to duct-tape an SSH agent to a Chrome extension that implements the chrome.certificateProvider API.☆17Updated 8 years ago
- All the excellent centers☆16Updated 3 weeks ago
- A CONIKS implementation in Java☆60Updated 6 years ago
- cloud.gov security policies and procedures☆25Updated 3 weeks ago
- The vulnerability disclosure policy for 18F and GSA's Technology Transformation Service.☆27Updated 3 years ago
- Notes and reference for ongoing forecasting.☆16Updated 3 years ago
- ISRG / Let's Encrypt CP and CPS Documents☆38Updated 3 weeks ago
- 🔒🔍 A Go package to scan sites against requirements for Chromium-maintained HSTS preload list.☆120Updated 2 months ago
- FedRAMP Tailored.☆48Updated 3 years ago
- How the federal .gov domain space is doing at best practices and policies.☆95Updated 5 years ago
- Working draft of FIPS 201-3☆19Updated last year