KPN PKIoverheid Certification Practice Statement
KPN PKIoverheid Certification Practice Statement
KPN B.V.
2/91
3.2.3.7.1 Authentication of a Certificate Manager ............................................................................... 27
3.2.3.7.2 Authentication for the purpose of a Private Services server certificate ................................ 28
3.2.4 Authorization of the Certificate Holder ............................................................................ 28
3.3 Identification and authentication for re-key requests .............................................................. 29
3.3.1 Identification and authentication for routine re-key ......................................................... 29
3.3.2 Identification en Authentication for routine re-key of the CA certificate .......................... 29
3.3.3 Identification and authentication for re-key after revocation ........................................... 29
3.4 Identification and authentication for revocation request ......................................................... 29
4 Certificate Life-Cycle Operational Requirements ..................................................................... 31
4.1 Certificate application ............................................................................................................. 31
4.1.1 Who can submit a certificate application? ....................................................................... 31
4.1.2 Enrolment process and responsibilities........................................................................... 31
4.1.2.1 Enrolment process ...................................................................................................................... 31
4.1.2.2 Responsibilities and obligations of the TSP................................................................................ 31
4.1.2.3 Responsibilities and obligations of the Subscriber ..................................................................... 31
4.1.2.4 Responsibilities and obligations of the Certificate Holder ........................................................... 31
4.1.2.5 Responsibilities and obligations of the Relying Party ................................................................. 32
4.2 Certificate application processing ........................................................................................... 32
4.2.1 Performing identification and authentication functions.................................................... 32
4.2.2 Approval or rejection of certificate applications ............................................................... 33
4.2.2.1 Application for Certificates on a Smartcard or USB token .......................................................... 33
4.2.2.2 Application for Certificates as Mobile Certificates....................................................................... 34
4.2.2.3 Application for Server Certificates .............................................................................................. 34
4.2.2.4 Application for Extended Validation server / QWAC certificates................................................. 35
4.2.2.5 Distinction in Public and Private Services Server certificates ..................................................... 36
4.2.3 Time to process certificate applications .......................................................................... 36
4.3 Certificate Issuance ................................................................................................................ 36
4.3.1 CA actions during certificate issuance ............................................................................ 36
4.3.1.1 Issuance of Personal, Professional, Group and eSeal Certificates ............................................ 36
4.3.1.2 Issuance of all types of Server Certificates................................................................................. 37
4.3.2 Notification of certificate issuance to the Certificate Holder or Manager ........................ 37
4.4 Certificate Acceptance ............................................................................................................ 37
4.4.1 Acceptance of Professional, Personal, Group and eSeal Certificates ............................ 37
4.4.2 Acceptance of all types of Server Certificates ................................................................ 37
4.4.3 Publication of the Certificate by the CA........................................................................... 38
4.5 Key Pair and Certificate Usage .............................................................................................. 38
4.6 Certificate renewal .................................................................................................................. 38
4.7 Certificate re-key ..................................................................................................................... 38
4.8 Certificate modification ........................................................................................................... 38
4.9 Certificate Revocation and Suspension ................................................................................. 38
4.9.1 Circumstances leading to revocation .............................................................................. 38
4.9.2 Who may make a request for revocation? ...................................................................... 40
4.9.3 Procedure for a request for revocation............................................................................ 40
4.9.4 Duration for processing revocation request .................................................................... 41
4.9.5 Verification conditions when consulting certificate status information ............................ 41
4.9.6 CRL issuance frequency ................................................................................................. 41
4.9.7 Maximum delay for CRL issuance .................................................................................. 41
4.9.8 Online revocation status check ....................................................................................... 41
4.10 Certificate Status Service .................................................................................................... 42
4.11 End of subscription.............................................................................................................. 42
4.12 Key Escrow and Recovery .................................................................................................. 42
5 Facility, Management, and Operational Controls ..................................................................... 43
KPN B.V.
3/91
5.1 Physical security controls ....................................................................................................... 43
5.1.1 Location, construction and physical protection ............................................................... 43
5.1.2 Physical Security Certificate Holders/Managers ............................................................. 44
5.1.3 Storage of media ............................................................................................................. 44
5.1.4 Waste disposal ................................................................................................................ 44
5.1.5 Off-site backup ................................................................................................................ 44
5.2 Procedural Controls ................................................................................................................ 44
5.2.1 Trusted Roles .................................................................................................................. 45
5.2.2 Number of persons required per task .............................................................................. 45
5.2.3 System Administration Controls ...................................................................................... 45
5.2.4 Segregation of Duties ...................................................................................................... 45
5.3 Personnel Controls ................................................................................................................. 46
5.3.1 Expertise, experience and qualifications ......................................................................... 46
5.3.2 Trusted Employee Policy................................................................................................. 46
5.4 Audit Logging Procedures ...................................................................................................... 46
5.4.1 Event logging ................................................................................................................... 46
5.4.2 Audit log Retention period ............................................................................................... 47
5.4.3 Protection of the Audit Log .............................................................................................. 48
5.4.4 Audit log back up procedures .......................................................................................... 48
5.5 Records Archival ..................................................................................................................... 48
5.5.1 Archival of events and documents .................................................................................. 48
5.5.2 Archive retention period .................................................................................................. 48
5.5.3 Archive protection ............................................................................................................ 48
5.5.4 Archive back-up procedure ............................................................................................. 48
5.5.5 Requirements for time-stamping of records .................................................................... 48
5.6 Key Changeover ..................................................................................................................... 49
5.7 Compromise and Disaster Recovery ...................................................................................... 49
5.7.1 Disaster management ..................................................................................................... 49
5.7.2 Business Continuity ......................................................................................................... 49
5.8 TSP Termination (CA termination) ......................................................................................... 49
5.8.1 Involuntary termination .................................................................................................... 50
5.8.2 Voluntary Termination ..................................................................................................... 50
6 Technical Security Controls ....................................................................................................... 51
6.1 Key pair generation and installation ....................................................................................... 51
6.1.1 Generation of key pairs ................................................................................................... 51
6.1.2 Transfer of Private Key and QSCD to Subscriber ........................................................... 51
6.1.3 Transfer of Subscriber Public Key ................................................................................... 52
6.1.4 Transfer of the Public Key from TSP to Confidential Parties .......................................... 52
6.1.5 Key Size .......................................................................................................................... 52
6.1.6 Generation of Public Key parameters ............................................................................. 52
6.1.7 Key pair usage................................................................................................................. 52
6.1.8 The purpose of key usage (as defined in X. 509 v3) ...................................................... 52
6.2 Private Key Protection and Cryptographic Module Engineering Controls ............................. 52
6.2.1 Standards required for the cryptographic module ........................................................... 52
6.2.2 Private Key multi-person control ..................................................................................... 53
6.2.3 Escrow of Private keys of Certificate Holders ................................................................. 53
6.2.4 Back-up of private keys ................................................................................................... 53
6.2.5 Archiving of Private Keys ................................................................................................ 53
6.2.6 Access to Private Keys in the cryptographic module ...................................................... 53
6.2.7 Storage of Private Keys in the cryptographic module ..................................................... 54
6.2.8 Activation of Private Keys................................................................................................ 54
6.2.9 Deactivation of Private Keys ........................................................................................... 54
KPN B.V.
4/91
6.2.10 Methods for destruction of Private Keys ......................................................................... 54
6.2.11 Requirements for safe means of storage and use of certificates.................................... 54
6.3 Other Aspects of Key Pair Management ................................................................................ 55
6.3.1 Archiving of Public Keys .................................................................................................. 55
6.3.2 Period of use for Certificates, Public Key and Private Keys ........................................... 55
6.4 Activation Data ........................................................................................................................ 55
6.4.1 Generation and Installation of activation data ................................................................. 55
6.4.2 Protection of activation data ............................................................................................ 55
6.4.3 Functioning of the activation data ................................................................................... 55
6.5 Computer security controls ..................................................................................................... 56
6.5.1 Specific technical requirements for computer security.................................................... 56
6.5.2 Security Rating ................................................................................................................ 56
6.6 Life Cycle Security Controls ................................................................................................... 56
6.6.1 Controls for system development .................................................................................... 56
6.6.2 Security Management Controls ....................................................................................... 56
6.7 Network Security Controls ...................................................................................................... 57
6.8 Time-stamping ........................................................................................................................ 57
7 Certificate-, CRL- en OCSP-profiles ........................................................................................... 58
7.1 Certificate profiles ................................................................................................................... 58
7.1.1 CP OID ............................................................................................................................ 58
7.1.2 Overview Certificate Profiles ........................................................................................... 58
7.1.3 Personal certificates and Professional Certificates ......................................................... 59
7.1.4 Group certificates ............................................................................................................ 62
7.1.5 eSeal certificates ............................................................................................................. 64
7.1.6 (Standard) Server certificates.......................................................................................... 65
7.2 CRL-profiles ............................................................................................................................ 69
7.2.1 Personal certificates and Recognized Profession Certificates ....................................... 69
7.2.2 Group certificates ............................................................................................................ 70
7.2.3 Server certificates ............................................................................................................ 71
7.2.5 CRL profile Private Services Server certificates ............................................................. 73
7.3 OCSP-profiles ......................................................................................................................... 74
7.3.1 OCSP-profile Server certificates G3 ............................................................................... 74
8 Compliance Audit and Other Assessment ................................................................................ 76
9 Other Business and Legal Matters............................................................................................. 77
9.1 Fees ........................................................................................................................................ 77
9.2 Financial Responsibility .......................................................................................................... 77
9.3 Confidentiality of Business Information .................................................................................. 77
9.3.1 Listing of information considered confidential ................................................................. 77
9.3.2 List of information considered as non-confidential .......................................................... 77
9.3.3 Responsibility not to provide data ................................................................................... 77
9.4 Privacy of Personal Information.............................................................................................. 78
9.4.1 Privacy Statement ........................................................................................................... 78
9.4.2 Confidential personal data............................................................................................... 78
9.4.3 Non-confidential data ...................................................................................................... 78
9.4.4 Responsibility to protect Private Keys ............................................................................. 78
9.4.5 Notification of use and consent to the use of personal data ........................................... 79
9.4.6 Provision of information as a result of a legally valid summons ..................................... 79
9.4.7 Provision of private law evidence .................................................................................... 79
9.4.8 Provision of information at the request of the owner....................................................... 79
9.4.9 Disclosure of information with respect to revocation of a certificate ............................... 79
KPN B.V.
5/91
9.4.10 Other circumstances which may lead to the provision of information ............................. 79
9.5 Intellectual property rights ...................................................................................................... 79
9.6 Obligations and Warranties .................................................................................................... 80
9.7 Restrictions on warranties ...................................................................................................... 80
9.7.1 Liability of KPN ................................................................................................................ 80
9.7.2 Limitations of Liability to the relying Party ....................................................................... 80
9.8 Indemnities ............................................................................................................................. 80
9.9 Term and Termination ............................................................................................................ 80
9.10 Individual notices and communications with participants ................................................... 80
9.11 Amendments ....................................................................................................................... 80
9.11.1 Amendment procedure .................................................................................................... 80
9.11.2 Notification of amendments ............................................................................................. 81
9.12 Dispute Resolution Procedures .......................................................................................... 81
9.13 Governing Law .................................................................................................................... 81
9.14 Compliance with Applicable Law ........................................................................................ 81
9.15 Miscellaneous Provisions .................................................................................................... 81
9.16 Other Provisions.................................................................................................................. 82
Appendix 1 Definitions ....................................................................................................................... 83
Appendix 2 Abbreviations .................................................................................................................. 91
KPN B.V.
6/91
1 Introduction to the Certification Practice Statement
The PKI for the Dutch government, shortly PKIoverheid, is an agreements system for enabling the
generic and large-scale use of the Electronic Signature, remote identification and confidential
electronic communications. All agreements are described in the Program of Requirements (Logius).
KPN BV is the legal successor to KPN Corporate Market BV as of April 1, 2016. All agreements
entered into with KPN Corporate Market BV by subscribers and relying parties, including all
obligations and warranties mentioned in this document, are transferred to KPN BV
One of the requirements in the Program of Requirements is that each Trust Service Provider within
the PKI overheid describes its practices in a so-called Certification Practice Statement (further: CPS).
The present document is the CPS of KPN. This document describes the practices of KPN. This
chapter contains an introduction to this CPS document. It briefly addresses several important aspects
of this document.
1.1 Overview
The format of this CPS is as far as possible in accordance with the RFC3647 Standard (Internet
Technology Task Force Internet X.509 Public Key Infrastructure Certificate Policy and Certification
Practices Framework). For more information see https://www.ietf.org.
The CPS is a description of the way in which KPN operates its certification service in the Organization
domain of PKI overheid. The CPS contains, among other things, a description of the procedures that
KPN applies to the creation, issuance and revocation of PKI overheid Certificates.
The CP describes the requirements for issuing and using a Certificate within the Organization domain
of PKIoverheid. The CP has been established and is maintained by the Policy Authority of
PKIoverheid and is part of the Program of Requirements of the PKIoverheid
(https://www.logius.nl/english/pkioverheid ). The Program of Requirements (PoR) consists of the
following relevant parts:
KPN B.V.
7/91
PoR part 3f: Extended Validation / QWAC
PoR part 3h: Private Services (server)
The CPS describes how KPN fulfils these requirements and meets these requirements.
KPN B.V.
8/91
Staat der Nederlanden Private Root CA - G1
Staat der Nederlanden Private Services CA - G1
KPN PKIoverheid Private Services CA - G1
Server (2.16.528.1.1003.1.2.8.6)
The foregoing statement is fully described in PKI overheid Program of Requirements (Part 1, of
Programme of Requirements - Introduction). Both the Root CAs and the CAs are managed by PKI
overheid. A description of the management of these CAs can be found in the CPS Policy Authority for
certificates issued by the Policy Authority PKI overheid. Both documents can be found on
https://logius.nl/diensten/pkioverheid/aansluiten-als-tsp/pogramma-van-eisen
1.1.5 Status
The date on which the validity of this CPS starts is given on the title page of this CPS. The CPS is
valid for as long as the KPN service continues, or until the CPS is replaced by a newer version
(indicated in the version number with +1 in major changes and +0.1 in editorial edits).
Formally this document is referred to as 'Certification Practice Statement PKIoverheid'. In the context
of this document, it is also referred to as 'PKIoverheid CPS', but usually shortly as 'CPS'. Where this
abbreviation is concerned, this document is intended.
This CPS can be identified through the following Object Identifier (OID): 2.16.528.1.1005.1.1.1.2
The user community within the Organization domain consists, on the one hand, of Trust Service
Providers and, on the other hand, of Subscribers, organizational entities in government and business,
Certification Holders, Certificate Managers and Relying Parties. There are also individuals working in
a recognized profession who are both Subscriber and Certificate Holder. For a description of these
concepts, see paragraph 1.7 Definitions and abbreviations.
The Program of Requirements within PKI overheid (Part 3a, 3b, 3e and 3f) applies to this user
community. In addition, the KPN Special Terms and Conditions PKI overheid Certificates (further:
Special Terms) apply. Please refer to the Repository of KPN https://certificaat.kpn.com/elektronische-
opslagplaats/
The KPN PKI overheid Special Terms and Conditions are binding for all parties involved in the
certification service. In case of conflict between the CPS and the Special Conditions, the latter will
prevail.
KPN conforms to the current version of the Baseline Requirements for Issuance and Management of
Publicly-Trusted Certificates and the CA/Browser Forum Guidelines for Issuance and Management of
Extended Validation Certificates as published at https://www.cabforum.org . Should there be an
inconsistency between PKIoverheid Program of Requirements and the relevant Baseline
Requirements, which does not at least meet the minimum requirements described herein, this is to be
determined by the PKI Policy Authority, then the stipulated in the Baseline Requirements prevails.
KPN B.V.
9/91
1.3.2 Other participants
The certificates issued by KPN are issued in accordance with the Program of Requirements (PoR)
PKI overheid (sections 3a, 3b and 3e).
Signature Certificates, also called Qualified Certificates, as described in the eIDAS regulation), and
also called nonrepudiation certificates are intended to provide electronic documents with a qualified
electronic signature [domain Government / Business OID 2.16.528.1.1003.1.2.2.2, domain
Organization OID 2.16.528.1.1003.1.2.5.2]. This Qualified Electronic Signature, the Electronic
Signature Based on a Qualified Certificate, and that has been created by a Qualified Signature
Creation Device (QSCD), meets all legal requirements for a signature and has the same legal force as
a handwritten signature for paper documents.
Authenticity certificates are intended to reliably identify and authenticate persons, organizations and
resources by electronic means. This concerns both the identification of people and between people
KPN B.V.
10/91
and resources [domain Government / Business 2.16.528.1.1003.1.2.2.1 OID, OID
2.16.528.1.1003.1.2.5.1 domain Organization]. Authenticity Certificates are not Qualified Certificates.
Confidentiality Certificates are intended to protect the confidentiality of data exchanged and / or stored
in electronic form. This concerns both the exchange of information between people and between
people and automated means [domain Government / Business 2.16.528.1.1003.1.2.2.3 OID, domain
Organization OID 2.16.528.1.1003.1.2.5.3].
Confidentiality Certificates are not Qualified Certificates.
These 3 types of certificates are issued as Certificates for persons with a recognized profession
(dutch:”beroepsgebonden certificaten”) and as Personal Certificates (Actually Organizational, as a
distinction to the recognized profession certificates) on one of the following data media: Smartcard
and USB token. In addition, these certificates can be requested as Mobile certificates, however, no
confidentiality certificate will be received. For definitions see 1.11 Definitions and abbreviations.
Authenticity Certificates are intended to reliably identify and authenticate a service as belonging to the
organizational entity that is responsible for the service by electronic means [Public domain / Business
OID 2.16.528.1.1003.1.2.2.4, domain organization OID 2.16. 528.1.1003.1.2.5.4].
These 2 types of certificates are issued as Service Certificates. The Authenticity Certificate and
Confidentiality Certificate together are called the Group Certificate. For definitions see 1.11 Definitions
and abbreviations.
Non-Repudiation Cerificates (Qualified certificate for electronic seals) are intended to reliably identify
and authenticate an organizational entity that is responsible for the service by electronic means
[Domain organization OID 2.16. 528.1.1003.1.2.5.7].
The Server Certificates, together with Group Certificates, are called the Services Certificates.
For definitions see Definitions and abbreviations
KPN B.V.
11/91
Extended Validation server certificates (EV SSL) / Qualified certificate for website authentication
(QWAC) (PoR PKIoverheid part 3f)
A PKIoverheid EV SSL / QWAC certificate is used to secure a connection between a particular client
and a server by means of the TLS/SSL protocol. This certificate can be recognised by the specific
unique PKIoverheid EV Policy Object Identifier (OID) 2.16.528.1.1003.1.2.7 and QCP-w policy
identifier 0.4.0.194112.1.4.
The “Staat der Nederlanden” (State of the Netherlands) Private Root CA - G1 is NOT publicly trusted
by browsers and other applications.
KPN issues Private Server Certificates under the 'State of the Netherlands Private Root CA - G1'. This
root certificate is part of the central part of the hierarchy of PKI overheid. The root certificate is the
anchor point for trust in electronic transactions within a closed user group. Trust is derived from the
fact that this root certificate was issued by the State of the Netherlands and published in the
Netherlands Government Gazette (Staatscourant). All participating parties must install and trust this
certificate manually. Therefore, Private server certificates are intended for application in private user
groups as opposed to publicly trusted server certificates where the master certificate is automatically
trusted by the important operating systems (such as Windows, Mac OS, Linux, Android and iOS) and
browsers (e.g. Mozilla FireFox).
Certificates issued under this CPS may not be used other than as described in this CPS.
To notify KPN of a service outage or report a suspected private key compromise, certificate
KPN B.V.
12/91
misuse, or other types of fraud, compromise, misuse, inappropriate conduct, or any other matter
related to certificates, please contact:
pkio.servicedesk@kpn.com
To request an urgent certificate revocation outside office hours (Mon-Fri, 9h-17h), please contact the
servicedesk:
+31 88 – 661 06 21 (only for a revocation request)
esd.cic@kpn.com
For the revocation you need the following information:
• Common name
• Subject serial number
• Challenge phrase as received by the cardholder
• E-mail address of the cardholder
The determination of the suitability of the CPS is part of the CPS approval process (see 1.5.4) of the
PMA and is part of the assessment by the independent auditor (see 8).
Changes to the KPN CPS are approved by the PMA, after consultation with the relevant stakeholders.
Once approved, this document will be published in the Repository. (dutch: Elektronische opslagplaats)
on https://certificaat.kpn.com/elektronische-opslagplaats/.
As required by the Baseline Requirements, the CPS is reviewed at least once a year and given a
higher version number.
For an overview of the definitions and acronyms used, refer to Annexes 1 and 2, respectively.
KPN B.V.
13/91
2 PUBLICATION AND REPOSITORY RESPONSIBILITIES
2.1 Repository
Certificates are published using a Directory Service. Through the Directory Service, the Certificate
may be consulted by Subscribers, Certificate Managers, Certificate Holders and Relying Parties.
The Directory Service is adequately protected from manipulation and is accessible online. Information
regarding the revocation status is available twenty-four hours a day and seven days a week.
The ETSI EN 319 411-2 and ETSI EN 319 411-1 certificates of KPN BV, together with ETSI EN 319
411-2 and ETSI EN 319 411-1 partial certificates, are published in the repository. The relevant
certificates indicate that KPN BV complies with ETSI EN 319 411-2 Policy and security requirements
for Trust Service Providers issuing certificates; Part 2: Policy requirements for certification authorities
issuing qualified certificates and ETSI EN 319 411-1 Electronic Signatures and Infrastructures (ESI);
Policy and security requirements for Trust Service Providers issuing certificates; Part 1: General
requirements and thus meeting the requirements of The European eIDAS. The audit reports relating
to KPN BV's normative references are not stored in the Repository as a result of its security policy.
KPN B.V.
14/91
2.3 Frequency of publication
Changes to CSP information shall be published, except as set out in this section, at the time of their
occurrence or as soon as possible thereafter and subject to the applicable provisions. See, for
example, paragraph 9.12 Changes.
The publication of Certificates takes place immediately after production. The CRL’s are renewed
every 60 minutes.
Information in the Repository is public in nature and freely accessible. The Repository can be
consulted twenty-four hours a day and seven days a week.
The Repository is protected against unauthorized changes.
For the occurrence of system failure or other factors that negatively affect the availability of the
Repository, an appropriate set of continuity measures has been implemented to ensure that the CRL
is reachable again within 4 hours and the remaining parts of the repository within 24 hours. An
example of such a measure is to have realized a disaster recovery location and -scenario in
combination with the regular testing of its functionality.
KPN is not responsible for the unavailability of the Repository due to circumstances where KPN
cannot be held responsible.
KPN B.V.
15/91
3 Identification and authentication
This section describes how the identification and authentication of certificate applicants takes place
during the initial registration process and the criteria that KPN uses regarding the naming.
3.1 Naming
The names used in Personal Certificates comply with the X.501 name recommendation. The names
consist of the following parts:
Attribute Value
Country (C) NL
Organization (O) Name of the subscriber
Common Name (CN) Full name of the Certificate holder
Givenname First name of the Certificate holder
Surname Last name of the Certificate holder
Subjectserialnumber (SN) Subjectserialnumber of the Certificate holder
Optional:
Organizational Unit (OU) Department of the subscribers’ organization
The names used in Professional Certificates comply with the X.501 name recommendation. The
names consist of the following parts:
Attribute Value
Country (C) NL
Organization (O) Name of the subscriber
Common Name (CN) Full name of the Certificate holder
Givenname First name of the Certificate holder
Surname Last name of the Certificate holder
Subjectserialnumber (SN) Subjectserialnumber of the Certificate holder
Title Profession of Cerificate holder
The names used in Group certificates comply with the X.501 name recommendation. The names
consist of the following parts:
Attribute Value
Country (C) NL
Organization (O) Name of the subscriber
Common Name (CN) Name of the Certificate holder
Organization Identifier Identifier for the Subscriber
KPN B.V.
16/91
Optional:
Organizational Unit (OU) Department of the subscribers’ organization
Subjectserialnumber (SN) Subjectserialnumber of the Certificate holder
The names used in eSeal certificates comply with the X.501 name recommendation. The names
consist of the following parts:
Attribute Value
Country (C) NL
Organization (O) Name of the subscriber
Common Name (CN) Name of the Certificate holder
Organization Identifier Identifier for the Subscriber
Optional:
Organizational Unit (OU) Department of the subscribers’ organization
Subjectserialnumber (SN) Subjectserialnumber of the Certificate holder
The names used in Server certificates certificates comply with the X.501 name recommendation.
The names consist of the following parts:
Attribute Value
Country (C) NL
Organization (O) Name of the subscriber
Common Name (CN) FQDN
State or Province (S) Province where the Subscriber is located
Locality (L) Place where the Subscriber is located
Optional:
Organizational Unit (OU) Department of the subscribers’ organization
Subjectserialnumber (SN) Subjectserialnumber of the Certificate holder
The names used in Extended validation Server / QWAC certificates comply with the X.501 name
recommendation. The names consist of the following parts:
Attribute Value
Country (C) NL
Organization (O) Name of the subscriber
Common Name (CN) FQDN
State or Province (S) Province where the Subscriber is located
Locality (L) Place where the Subscriber is located
Subjectserialnumber (SN) Subjectserialnumber of the Certificate holder
JurisdictionOfIncorporationCountryName (Jur) NL
KPN B.V.
17/91
BusinessCategory Must contain either:
• Private Organization
• Government Entity
• Business Entity
Optional:
Organizational Unit (OU) Department of the subscribers’ organization
The names used in Private Services Server certificates comply with the X.501 name standard. The
names consist of the following parts:
Attribute Value
Country (C) NL
Organization (O) Name of the subscriber
Common Name (CN) FQDN
Optional:
Organizational Unit (OU) Department of the subscribers’ organization
Subjectserialnumber (SN) Subjectserialnumber of the Certificate holder
State or Province (S) Province where the Subscriber is located
Locality (L) Place where the Subscriber is located
No further stipulations
Names of persons included in the Certificate meet the requirements as stated in the Program of
Requirements, Part 3a Certificate Policy - Domain Government / Business and Organization, ANNEX
A Profiles and Certificate Status Information.
All names are, in principle, exactly copied from the presented identification documents. The
However, the name data may contain special characters that are not part of the standard character
set conforming to ISO8859-1 (Latin-1). If the name contains special characters which are no
part of this character set, KPN will perform a transition. KPN reserves the right to change the
requested name upon registration if this is legally or technically necessary.
The names used identify the Certificate Holder in a unique way. Uniqueness of names within the
X.501 name space is the starting point.
KPN ensures the uniqueness of the ‘subjectaltname’ field. This means that the distinguishing name
used in an issued certificate can never be assigned to another subject. This is done by including a
unique subject serial number in that field.
KPN B.V.
18/91
For personal certificates and group certificates, KPN generates a number for this purpose. In case of
a (Extended Validation) Server Certificate, the CSR number is used for this purpose.
In specific cases, if explicit agreements have been made, a specific number may be added to this
subject number.
In cases where parties disagree with the use of names, KPN decides after considering the interests
concerned, insofar as this is not provided by mandatory Dutch law or other applicable regulations.
Subscribers bear full responsibility for any legal consequences of using the name provided by them.
The name of an organizational entity as mentioned in the extract of a recognized registry, or in the law
or decision by which the organizational entity is established, is used in the Certificate.
KPN is not required to investigate possible infringements of trademarks arising from the use of a
name that is part of the data contained in the Certificate.
KPN has the right to make changes to name attributes when it appears to be in violation of a
trademark or other intellectual property rights.
However, this does not apply to the (Extended Validation) Server Certificate. The server certificate
key pair is created by or on behalf of the Subscriber in the Subscriber's Secure Environment and
entered on the (HTTPS) website of KPN. To ensure that that has indeed happened, the Subscriber
must sign for this on the Certificate Request form for the Server Certificate.
See Further 3.2.3.3 (Extended Validation) Server Certificates Authentication and 6.2.11 Requirements
for Secure Resources for Storage and Use of Certificates.
If an organization wishes to become a subscriber of KPN, it is necessary to complete the web form
PKI overheid Subscriber Registration. This form contains an extensive explanation. With this form the
Subscriber must send along several supporting documents.
KPN B.V.
19/91
The PKIoverheid Subscriber Registration form must be signed by the Subscriber's Authorized
Representative. With this signature the Authorized Representative declares:
• to have filled in the Subscriber Registration application completely and truthfully, agreeing to
the Special Conditions,
• that the contact person (s) listed on the form are authorized, trusted and knowledgeable in the
area, may apply on behalf of the Subscriber for certificates in order to install, administer and,
if necessary, revoke, and
• that these contactperson(s) who have a PKIoverheid personal certificate for access to the Self
Service Portal are authorised to request qualified certificates for electronic seals and qualified
certificates for website authentication (eSeal/QWAC).
The signature must be a valid signature, so it must be a handwritten or qualified electronic signature.
The electronic signature must comply with REGULATION (EU) No. 910/2014 OF THE EUROPEAN
PARLIAMENT (eIDAS). If the electronic signing is on behalf of an organization (Subscriber), the
Qualified Certificate with which the electronic signature is created must also be issued to the
Certificate Holder on behalf of the same Subscriber within the Government / Business and
Organization PKI Government domain.
The term "Subscriber" is used below. If a Subscriber is to perform an activity, the contact person
generally acts on behalf of the Subscriber. However, this is not explicitly indicated.
The proofs that must be submitted at the same time as the form are:
• copy of the identity of the Authorized Representative that meets the requirements of the
Dutch Identification Act (hereafter Wid) the Authorized Representative foresees the
application of a handwritten signature;
• copy of the identity of each contact that is authorized on the form. This ID must also meet the
requirements of the Wid.
If KPN is unable to find evidence of the Competent Representative's competence, it will be requested
during the processing of the application to provide that evidence.
For municipalities that arise in the context of a municipal reorganization, but at the time of the
application for becoming subscriber not yet formally exist, it is now also possible to apply for a
subscription. These (new) municipalities must demonstrate that they will exist on a particular date. For
example, by sending a copy of the law in which the relevant municipal reorganization has been
arranged. These municipalities may request (Extended Validation) Server Certificates after approval
of the subscriber application. Upon approval of the license application, the requested certificates will
be issued under the restrictive condition that the (Extended Validation) Server Certificates will only be
used on or after the date of the (new) municipality formally starts to exist.
If a practitioner of a recognized Profession wishes to become a subscriber of KPN, he / she must fill in
the appropriate web form Request PKI overheid recognized profession Certificates (dutch:
webformulier Aanvraag PKIoverheid Beroepsgebonden Certificates). In this form, the application of a
Subscription and Certificates has been merged into one form. This is because Subscriber and
Certificate holder are one and the same person. This web form is available when you start the
application via https://certificaat.kpn.com/aanvragen/beroepscertificaten/. This form contains an
extensive explanation.
The above does not apply to those recognized professions as mentioned in the Act of 11 November
1993, governing occupations in the field of individual healthcare.
The information requested for the subscriber registration is:
• the name of the subscriber;
• contact details.
KPN B.V.
20/91
The application for a PKI overheid Recognized Profession Certificate must be signed by the
Subscriber. By signing, the Subscriber confirms that the certificate request was completed correctly,
fully and truthfully, and that the subscriber agrees to the KPN Special Terms.
The signature must be a valid signature, so it must be a handwritten or electronic signature. The
electronic signature must comply with Regulation (EU) No. 910/2014 OF THE EUROPEAN
PARLIAMENT (eIDAS)
The application for a PKI overheid Recognized Profession Certificate shall provide proof that the
certificate holder is authorized to exercise the Recognized Profession. This evidence must be
authentic. As authentic evidence to exert a Recognized Profession is only Considered:
• either a valid certificate of registration in an approved (profession) register where disciplinary
actions are legally regulated;
• or a valid nomination by the Minister;
• or a valid (e.g., a license) compliance with the legal requirements for exercising the
profession.
A valid certificate means that certificate has not expired or (provisionally) revoked.
For a limited number of professional groups (notaries and bailiffs) KPN itself will check the registers
maintained by the professional groups in question.
In Addition, the application for PKI overheid Recognized Profession Certificates shall be accompanied
by a copy of the ID of the Certificate holder. This identification must meet the requirements of the Wid
(Dutch Identification Act). The identification is used to compare the data of the certificate with the
details of the evidence for exercising the Recognized Profession. It also will be used to compare the
signature on the application with the signature on the ID. The ID must still be valid at least six weeks
after submission of the application.
KPN will receive the application form and supporting documents and will assess the completeness
and correctness by, among other things, consulting other external sources. Segregation of duties is
applied between he / she that assesses (Check) and he / she that approves (Decision). Only if the
form is complete and correct, KPN will approve the form, proceed to registration, assign a subscriber
number and inform the Subscriber. The subscriber number should always be used in the
communication between subscriber and KPN. Only if an organization is registered as a subscriber
with KPN it may apply for certificates from KPN.
If changes Occur in the data provided by the Subscriber to KPN, the Subscriber is obliged to inform
KPN in an early stage. Early means at least 10 working days before the change becomes effective.
Changes cannot be made retrospectively.
Changes which must be communicated are for example the departure of the Authorized
Representative or contact or change in the contact of the Subscriber. For the communication of these
changes forms available on the site (https://certificaat.kpn.com/wijzigenregistratie/). These forms are
also provided with a detailed explanation. Here too, KPN will review the changes for completeness
and accuracy and that the Subscriber will be informed on making changes in the subscriber
registration.
If a subscriber wants to apply for a certificate, it must complete a specially developed electronic
application form and send it to KPN. These forms:
• Request PKIoverheid Personal Certificates;
KPN B.V.
21/91
• Request PKIoverheid Professional Certificates;
• Request PKIoverheid Group Certificates;
• Request PKIoverheid eSeal Certificates (Self Service Portal only);
• Request PKIoverheid Server Certificates;
• Request PKIoverheid Extended Validation Server / QWAC Certificates (Self Service Portal
only).
The application form (electronic) is shall be signed by the Subscriber. By signing the form, the
Certificate holder or Certificate Administrator are authorized to receive the requested certificate on
behalf of the Subscriber and to use and / or manage it.
KPN offers customers the ability to use a self-service portal. After registration Authorized
Representatives and Contact persons of the subscriber can use the portal. The login is based on a
PKIoverheid personal certificate. The portal gives users access to the main subscriber data and an
overview of the certificates already issued. It also offers the opportunity to apply for certificates with
reuse of already recorded data.
When applying for a certificate the Subscriber has (if requested) to enclose a photocopy of the identity
of each Certificate holder for which a certificate is requested.
The identification must meet the requirements of the Wid (Dutch law on Identification). At the time of
establishing the identity, the relevant ID must not be expired.
The identification is carried out on an agreed time and place by a member of AMP.
Certificates for natural persons are requests for either Occupational Certificates or Personal
Certificates. On the application form for such a certificate the following data must be filled in.
Of the Subscriber:
• subscriber number
• name Contact person (only for Personal Certificates).
Services Certificates must be managed by a Certificate Manager specially designated and authorized
by the Subscriber. In principle Certificate Managers can manage multiple Services Certificates.
KPN B.V.
22/91
Intended Certificate Managers, who are not yet registered, can be included in the application for a
services certificate by the Subscriber as a new Certificate Manager.
The application form must then contain the following information of the Certificate Manager:
• full names;
• data needed for identification like date of birth and - place;
• the name of the organization where the Certificate Manager is employed
• e-mail address and telephone number;
• delivery address (postal address).
KPN will review this data for completeness and accuracy while handling the Services Certificate
application. Segregation of duties is applied between he / she that assesses (Check) and he / she that
approves (Decision). Only if the data are complete and accurate, KPN will register the Certificate
Manager and as a result can act as a Certificate manager of a Services Certificate.
The Certificate Request for a Group Certificate must be completed with the following information.
KPN will review the Certificate Application for completeness and accuracy, including the signature and
submitted evidence. Segregation of duties is applied between he / she that assesses (Check) and he /
she that approves (Decision). Only if the Certificate Application is complete and correct, KPN will
approve the Certificate Application.
KPN B.V.
23/91
KPN will inform the Subscriber in writing or by e-mail on approval of the Certificate Application.
In the Self Service Portal the request for an eSeal Certificate must be completed with the following
information (some fields are pre-filled):
KPN will review the Certificate Application for completeness and accuracy, including the signature and
submitted evidence. Segregation of duties is applied between he / she that assesses (Check) and he /
she that approves (Decision). Only if the Certificate Application is complete and correct, KPN will
approve the Certificate Application.
KPN will inform the Subscriber in writing or by e-mail on approval of the Certificate Application.
The Certificate Request for a Server Certificate must be completed with the following information.
Of the subscriber's organization:
• the subscriber number.
Of the Contact Person:
• the subscriber number and last name;
• date of birth.
Of a new Certificate Manager:
• full names;
• data needed for identification like date of birth and - place;
KPN B.V.
24/91
• the name of the organization where the Certificate Manager is employed;
• e-mail address and telephone number;
• delivery address (postal address).
The subscriber must demonstrate entitlement to use the organization's primary and additional names
that identify the server or service. The primary and additional names of the server MUST be referred
to as "fully qualified domain name" (FQDN, see definitions). In this field, a Plurality or FQDN "s MAY
be used.
KPN will review the Certificate Application for completeness and accuracy, including the signature and
submitted evidence. Segregation of duties is applied between he / she that assesses (Check) and he /
she that approves (Decision). Only if the Certificate Application is complete and correct, KPN will
approve the Certificate Application.
KPN will inform the Subscriber by e-mail on approval of the Certificate Application.
Contactperson(s) authorised by the Authorised Representative and who have a PKIoverheid personal
certificate for access to the Self Service Portal are authorised to request qualified certificates for
website authentication (EV SSL/QWAC).
KPN B.V.
25/91
Certificate Managers must be registered separately by the Subscriber, by each Subscriber for whom
he/she is or will be working. A registration form is available for this purpose. The following information
must be entered on the registration form for Certificate Managers.
This evidence must not be older than 13 months otherwise the data must be retrieved and verified
again unless the agreement with the subscriber explicitly provides that the certificate manager retains
his or her authorisation until it is revised by the subscriber or until the agreement expires or is
terminated. KPN will receive the registration form and assess it for completeness and accuracy,
including the signature and evidence provided. In doing so, a separation of functions is applied
between the person who assesses (checks) and the person who decides (has). Only if the registration
form is complete and correct will KPN register the Certificate Manager and an Extended Validation
certificate can be requested.
KPN will inform the Subscriber by e-mail on approval of the Certificate Application.
In the Self Service Portal the request for an an Extended Validation sever / QWAC Certificate must be
completed with the following information (some fields are pre-filled):
KPN B.V.
26/91
Other information such as:
• whether it is an initial application or a replacement;
• provincial name;
• Country name and country code according to ISO 3166.
The subscriber must demonstrate that the organization may use the primary and additional names
identifying the server or service. The primary and additional server names MUST be listed as fully-
qualified domain names (FQDN, see definitions). Multiple FQDNs may be used in this field. These
FQDNs MUST come from the same domain name range. (e.g. www.logius.nl, application.logius.nl,
secure.logius.nl etc.).
KPN will receive the Certificate Application and assess it for completeness and accuracy, including
the signature and the evidence provided. In this case, a segregation of duties is applied between the
person who assesses (checks) and the person who decides (has). KPN will only approve the
Certificate Application if the Certificate Application is complete and correct.
KPN will inform the Subscriber of the approval of the Certificate Application by e-mail.
Private Services Server certificates must be managed by a Certificate Manager explicitly designated
and authorised by the Subscriber. In principle, Certificate Managers can manage several certificates.
Because this is a very common practice, the identification and authentication of the Certificate
Manager is disconnected from the certificate request of the Private Services Server certificate itself.
KPN has implemented the following working method.
Certificate managers must be registered separately by the Subscriber, for each Subscriber for whom
he/she is or will be working. A registration form is available for this purpose. The following information
must be entered on the registration form for Certificate Managers.
This evidence must not be older than 13 months otherwise the data must be resubmitted and verified
unless the agreement with the subscriber explicitly provides that the certificate manager retains his or
her authorisation until such time as it is reviewed by the subscriber or until the agreement expires or is
terminated. KPN will receive the registration form and assess it for completeness and accuracy,
KPN B.V.
27/91
including the signature and evidence provided. In doing so, a separation of functions is applied
between the person who assesses (checks) and the person who decides (has). Only if the registration
form is complete and correct will KPN register the Certificate Manager and a Private Services Server
certificate can be requested.
KPN will inform the Subscriber by e-mail on approval of the Certificate Application.
On the Certificate request for a Private Services Server certificate, the following information must be
provided:
The subscriber must demonstrate that the organization may use the primary and additional names
identifying the server or service. The primary and additional server names MUST be listed as fully-
qualified domain names (FQDN, see definitions). Multiple FQDNs are used in this field MUST be
used. These FQDNs MUST come from the same domain name range. (e.g. www.logius.nl,
application.logius.nl, secure.logius.nl etc.).
KPN will receive the Certificate Application and assess it for completeness and correctness, including
the signature and evidence provided. In this case, a segregation of duties is applied between the
person who assesses and the person who decides. KPN will only approve the Certificate Application if
the Certificate Application is complete and correct.
KPN will inform the Subscriber of the approval of the Certificate Application by e-mail.
The authorization of the Certificate Holder to receive and use a certificate from the organization is
demonstrated by signing the certificate application by or on behalf of the subscriber.
In case of a Server Certificate, the Subscriber must supply proof of the identifier of the device or
system, so that reference can be made to it.
The KPN special conditions stipulates that the Subscriber has the obligation, if relevant changes
occur in the relationship between the subscriber and Certificate Holder, to revoke the certificate
KPN B.V.
28/91
immediately. Significant changes in this regard may include suspension or termination of employment
or professional practice.
The CA Certificate is not routinely renewed. The CA Certificate (If Desired) renewed around three or
five years before the end of his life. Renewal of the CA certificate will be subject to a strict procedure
in consultation and in cooperation with the Policy Authority of PKIoverheid.
KPN offers no possibility for routine renewal of PKIoverheid Certificates. A request for renewal will be
treated as an application for a new certificate
In Section 4.9 Revocation and suspension of certificates is described who may submit a request for
revocation.
Only the Subscriber or the Certificate holder, or in the case of the Services Certificate, the Certificate
Manager, may submit a request to revoke a certificate. This can be done Electronically / online
through the KPN website (https://certificaat.kpn.com/intrekken/).
In order to revoke the Certificate. The Certificate Holder/ Certificate Manager is required to make use
of a revocation pass code.
The revocation code for Professional Certificates, and Personal certificates is sent to the Certificate
Holder or the Certificate Manager (PIN-mail). The revocation code for Services Certificates and
(Extended validation) Server and Private services server certificates is sent to the Certificate
Manager. In case of a server certificate the revocation code can also be sent by encrypted e-mail.
In some cases, the Subscriber is obliged to revoke its certificate (see the KPN Special Conditions). In
the event that the Certificate Holder / Certificate Manager fails to do this, the subscriber needs to be
able to do this. For this purpose, the Certificate / Certificate Administrator must provide the revocation
code to the Subscriber or The Subscriber must obtain the revocation code from the Certificate Holder
/ Certificate Manager immediately after issuing and record carefully this carefully.
For non-urgent revocations the Subscriber and / or the Certificate Holder / Certificate Manager can
submit a revocation request using the form "Request Revocation Certificates.
On the form " Certificates Revocation Request ", the following information must be completed.
KPN B.V.
29/91
Of the Contact person:
• Subscriber number and –name;
• name en contact data.
Of the Certificate:
• name in the Certificate;
• subject serial number in the Certificate;
• certificate type;
• serial number(s) the Certificate (s)
• revocation code;
• reason for revocation.
The form "Certificate Revocation Request" will be accepted by KPN and reviewed for completeness
and accuracy. If the application is complete and accurate KPN will execute the revocation. With this
segregation of duties is applied between he / she that assesses (Check) and he / she that approves
(Decision). This revocation will be executed within four hours after the receipt of the revocation
request.
The Subscriber and the Certificate Holder / Certificate Manager will be informed by e-mail concerning
the outcome of the revocation request.
If KPN has good cause to doubt the authenticity of a revocation request, KPN can require that he /she
who submitted the request will produce proof of Identity to KPN before the revocation is executed.
KPN is also entitled to revoke certificates independently if: (see Section 4.9.2):
• Subscriber acts Contrary to the conditions Imposed on him for use, as defined in this CPS
and in the Special Conditions or;
• the Private Key of the KPN CA or from the State of the Netherlands, is stolen or otherwise
compromised or;
• The algorithm used is compromised, or is liable to be compromised or, in general, becomes
too weak for the purpose for which it is used.
KPN is able to revoke a certificate without the revocation code.
A relying party may report a subscriber who does not or does not fully comply with the conditions
imposed. This can be done using the contact form https://certificaat.kpn.com/intrekken/.
In the field ‘Betreft’ (subject) option ’10. Melding omstandigheid intrekking Certificates’ should be
chosen. (eng:"10. Notification conditions that can lead to revocation”).
This form can contain the following: details of the reporter such as his name, organization name and
contact information;
• data of the condition, such as a description and date and time of the notification;
• details of the relevant certificate such as the name and subject serial number of the Certificate
holder, the Certificate type and serial number.
KPN will receive the notification, review the form for completeness and accuracy, and possibly try to
collect additional information and decide whether to proceed with revocation. With this segregation of
duties is applied between he / she that assesses (Check) and he / she that approves (Decision).
Revocation will be executed within four hours after the decision to do so.
The detector, the Subscriber, Certificate holder/ Certificate Manager in question will be informed by e-
mail about the notification and its handling.
KPN B.V.
30/91
4 Certificate Life-Cycle Operational Requirements
In principle, only the Authorized Representative of the Subscriber can apply for a subscriber
registration. By signing the subscriber registration, the Authorized Representative authorizes one or
more contacts mentioned in the form to apply for, install, manage and revoke certificates and to
Authorize other contacts and Certificate Managers, on behalf of the Subscriber.
The processes defined by KPN for the realization of its certification service are in general divided two
parts, based on the principle of segregation of duties. The first part is the assessment and the second
part is the execution. In the assessment the receipt of the application is recorded, the completeness of
the application and the presence of supporting documents are determined(acceptance) and evaluated
on accuracy. Last part of this section is to take a decision on the application. The second part, the
execution, is to implement the decision and informing stakeholders about it. In the following sections,
the processes will be described in more detail.
The duties and responsibilities of those involved, KPN, Subscriber, Certificate Holder / Certificate
Manager and Relying Party are described in the KPN Special Conditions.
KPN is responsible for all certification services and guarantees Subscribers, Certificate Holders and
Relying Parties that it will abide by the Special Conditions, the CPS and the applicable CPs. KPN is
obviously responsible for outsourcing (parts of) services to other parties. An example of this is the
outsourcing to AMP of the identification of Certificate Holders and Certificate Managers. But KPN has
outsourced multiple services. As final responsible Trust Service Provider, as an outsourcer of
services, KPN ensures the quality of the outsourced services by applying (forms of) management,
coordination, supervision and mutual assurance. The implementation will depend on the specific
situation.
If a subcontracting reaches a certain extent, the outsourcing will be described in an appendix to this
CPS.
The Subscriber is responsible for the correctness of all data required for the creation and delivery of
certificates and for the proper use of those certificates. Subscriber warrants to KPN and Relying
Parties that it will abide by the Special Conditions, the CPS and the applicable CPs.
The Certificate Holder (including, in the case of a server certificate or Group Certificate, the Certificate
Manager), as holder of the certificate that is requested on behalf of the Subscriber of the Certificate
Holder is also responsible for the correct delivery of all data needed for creating and delivering
certificates and the proper use of those certificates. The Certificate Holder warrants to KPN, the
KPN B.V.
31/91
Subscriber and Relying Parties that he / she will abide by the Special Conditions, the CPS and the
applicable CPs.
Relying Party is responsible for correctly Relying on a certificate and Warrants to KPN, the Subscriber
and the Certificate Holder that it will abide by the Special Conditions, the CPS and the applicable CPs.
Organizations must, before being able to apply for certificates, register as a subscriber of the
certification services from KPN. This can be done by completing a web form “PKIoverheid Subscriber
Registration”, attach the required evidence (see Section 3.2.2) and send all by mail to KPN. Detailed
instructions for using the form are attached to this form. Other forms are available for maintaining the
data supplied to KPN. See the website https://certificaat.kpn.com/wijzigenregistratie/
Part of the registration of a subscriber, is the authorization of one or more contact persons. These
contact persons need to be authorized to apply for certificates, to authorize other contact persons and
to be allowed to revoke certificates. The authorization is done by signing the form “Abonnee
Registratie (subscriber registration)” by the Authorized Representative of the subscriber (see Section
3.2.2).
KPN will receive the forms and assess the completeness and accuracy of the forms. A registration
form must be complete in order to be accepted and to proceed to assess the accuracy. In case of
deficiencies the subscriber that submitted the PKIoverheid Subscriber Registration web form will be
contacted.
If the subscriber registration has been approved, the subscriber is registered and can request for
certificates. The Subscriber will be informed in writing and by e-mail of approval or disapproval.
Also for registering Certificate Managers it applies that KPN will accept the application for registration
of a Certificate Manager, assess the completeness and accuracy and will come to an approval or
disapproval. The Subscriber will be informed by e-mail of the decision.
Part of the registration of the Certificate Manager is his personal identification. This is handled in the
same way as for Certificate Holders, by AMP (see also section 4.2.2).
Once a Certificate Manager is identified and registered, applications for Server and Group Certificates
can be handled as described in section 4.2.
If the Certificate Manager’s personal details changes, the Contact Person must pass this modified
data to KPN using the form: “Wijziging gegevens Certificaatbeheerder ( Change information
Certificate Manager)” (see Electronic storage), and if a Certificate Manager is no longer able to
KPN B.V.
32/91
manage the assigned certificates, the Subscriber has to report this by means of the form “Verwijdering
Certificaatbeheerders(Removal of Certificate Manager)”. KPN will review this form for completeness
and accuracy. After a positive decision KPN will remove the Certificate Manager from the
corresponding registration. Prerequisite for that removal is that the management of the certificates is
transferred to another registered Certificate Manager.
The following steps must be taken by default for applying for a Personal, Professional, Group or eSeal
Certificate on a smartcard or USB token.
Contactperson(s) authorised by the Authorised Representative and who have a PKIoverheid personal
certificate for access to the Self Service Portal are authorised to request qualified certificates for
electronic seals (eSeal).
1. The Subscriber fills out a certificate application form for a (prospective) Certificate Holder (or a
Certificate Manager for the latter) and hereby declares that he agrees with the Special Terms and
Conditions. Further instructions on how to use the form are enclosed with the form.
2. The Subscriber signs the application form and sends it to KPN.
3. KPN receives the Certificate Application, evaluates the completeness and correctness of the
Certificate Application and makes a decision on it. Among other things, it is checked at recognised
registries such as Stichting Internet Domeinregistratie Nederland (SIDN) or Internet Assigned
Numbers Authority (IANA) whether Subscriber is the owner of the domain name, as it forms part
of the e-mail address.
4. In the case of professional certificates, the authenticity of the proof of exercise of the Recognised
Profession is verified.
5. AMP identifies the Certificate Holder, makes a copy of his identity document (with shielding the
passport photo and BSN) and sends this copy together with the signed identification electronically
to KPN. If KPN can rely on an identification previously carried out by KPN, this identification does
not need to be repeated. KPN can rely for Certificate Managers on an identification previously
carried out by or on behalf of KPN if the identity document used is used again in the new
application, it is not registered as stolen or missing and it is still valid until six weeks after
submission of the application. The date of receipt of the application by KPN is the decisive factor.
6. If KPN approves the Certificate Application, the key material in the QSCD will be generated and
the Certificate generated. KPN also generates the secret PIN and PUK code for the QSCD and
the revocation code for the Certificates.
7. The smartcard/token containing the certificates is sent by post to the delivery address of the
Certificate Holder/Certificate Manager. The smartcard/token is accompanied by an
acknowledgement of receipt notification with a code. The Certificate Holder/Certificate Manager
must confirm receipt of the smartcard/token via a link in the email using this code. AMP identifies
KPN B.V.
33/91
the Certificate Holder, makes a copy of his identity document, sends this copy to KPN
electronically together with the signed identification.
8. Upon receipt of the electronic AMP confirmation, KPN will send the document containing the
secret PIN and PUK codes for the QSCD/SUD and the certificate revocation code for the
Certificates by post to the specified delivery address of the Certificate Holder.
KPN will continue to offer the possibility of allowing identification and issuance at a time/location to be
agreed upon.
For the application of a Mobile Certificate, in principle the same steps (1 to 6) are followed as for the
physical Smart Card or USB token. See 4.2.2.1.
The validation of the data and identification take place in exactly the same way. However, no physical
product is received in the form of a smart card or token.
7. A PINmailer is sent in which the PUK code of the certificate is included.
8. KPN sends an order to Ubiqu to generate the key pairs.
9. KPN sends a registration and activation code by email and the corresponding CSR to the
customer by letter.
10. The customer installs the app with the obtained registration and activation code and chooses a pin
code.
11. With the chosen PIN code, the certificate holder confirms the creation of the certificate.
The CAA record is a DNS record that gives domain owners extra control over SSL certificates issued
for their domains - you use it to indicate which CA may issue certificates for your domains. The CAA
record already became a recognised standard in 2013. Although it is often used, it was not
compulsory. As of September 2017, it is mandatory for Certificate Authorities to check the CAA record
of a domain name as part of the issuance of a certificate. Domain owners are not obliged to fill the
record.
A Certificate Authority Authorization record, or a CAA DNS record, is designed to allow domain
owners to indicate which CA root certificate can be used to sign certificates for the domain in
question. Because this certificate belongs to a certain certificate authority, it can effectively indicate
which certificates may be issued for a domain. This prevents the issuing of a certificate by another CA
that the selected CA.
KPN identifies itself as KPN.COM. If a domain owner wants KPN to be able to issue certificates for its
domain, this identification must be included in the CAA record.
• The DNS of the domain in question does not contain a CAA record.
• The applicant has entered the identification "kpn.com" in the CAA record for the domain
concerned.
KPN B.V.
34/91
In all other cases, KPN cannot issue the certificate and will contact the certificate applicant.
The Certificate Application for a Server Certificate largely follows the same procedure as mentioned
under 4.2.2.1, considering the following difference.
1. The Certificate Administrator creates the key pair (length is 2048 bits) in the Subscriber's Safe
Environment and sends a Certificate Signing Request (CSR) containing the Public Key.
Subscriber completes the electronic application form PKIoverheid Server Certificates for a (future)
Certificate Holder. This form can be found on the KPN website
(https://certificaat.kpn.com/aanvragen/servercertificaten/). This site also contains further
instructions on how to use the form.
2. KPN receives the Certificate Application and assesses the completeness and correctness of the
Application. Among other things, it is checked at recognised registries such as Stichting Internet
Domeinregistratie Nederland (SIDN) or Internet Assigned Numbers Authority (IANA) whether
Subscriber is the owner of the domain name.
KPN has 3 permitted methods for domain validation according to the Baseline Requirements of
the CA/BROWSER forum. (https://cabforum.org/ ) It concerns the methods:
NB. The numbers below are the corresponding section numbers from the Baseline Requirements
of the CABforum, where these requirements are described.
3. KPN will determine whether there is a CAA DNS record for the domain (s) involved and if this
occurs whether KPN has been included through its identification kpn.com as a permitted
certificate issuer for these domain (s). If this is not the case, KPN will contact the applicant and
reject the relevant certificate application.
4. In addition, it is also assess whether there is url-spoofing or phishing, therefore
https://www.phishtank.com or similar will be consulted to see if the domain name does not appear
on a spam and/or phishing blacklist. If KPN suspects phishing or other possible abuse, KPN will
report this suspicion to https://www.phishtank.com.
5. Subscriber's KvK data are read in real time from the Chamber of Commerce systems. An OIN is
generated automatically from the data of the Chamber of Commerce.
6. If KPN approves the Certificate Application, the Certificate is created and sent to the Certificate
Manager by e-mail.
The application for an Extended Validation server / QWAC certificate is basically the same as the
application for a server certificate. (see 4.2.2.3)
There is a difference in the validation process with respect to the subscriber process.
KPN B.V.
35/91
If, based on the requested data, it appears that the subscriber's organization exists for less than three
years (calculated from the date of registration in the Trade Register or the date of publication of the
law or general order in council until the date of signature of the Extended Validation certificate
application), KPN will verify that the subscriber is able to participate in business traffic.
As proof of the accuracy and existence of the specified payment account, KPN will request and verify
at least one of the following supporting documents from the Subscriber:
• a statement from a financial institution licensed by DNB in the Netherlands and covered by
the Dutch deposit guarantee scheme showing that the subscriber has an active payment
account;
• a statement by an external auditor that the subscriber has an active payment account with a
financial institution licensed by DNB in the Netherlands and covered by the Dutch deposit
guarantee scheme.
A PKIoverheid services server certificate comes in two types, a Public Root and a Private Root server
certificate. Server certificates are suitable for securing traffic between systems and traffic to/from
websites. Both types of certificates meet the requirements of PKIoverheid, are securely managed and
audited by a third, independent party. However, the certificates differ in two respects, the validity
period and the applicability of the certificate.
A Public Root certificate is valid for approximately 1 year and 1 month (397 days max). This applies to
new certificates to be issued with effect of November 1, 2019. Certificates already issued retain their
validity period. This type of certificate is registered with software suppliers and is automatically trusted
by web browsers.
A Private Root certificate is valid for 3 years. This type of certificate is not registered with software
suppliers and is not automatically trusted by browsers. However, this is not an obstacle if the
certificate is used for messaging between systems.
The Certificate request for a Private Services Server certificate is essentially similar to the request for
a server certificate. See 4.2.2.3.
In principle, KPN uses a period of 10 working days to process a Certificate Application. In principle,
because this deadline also depends on the quality of the application submitted.
AMP informs KPN about the result of the identification. After a positive message, KPN sends out the
document containing the access codes for the smart card and the revocation codes of the certificates.
In the event that the certificate holder fails to identify himself, he will be reminded of this after 3 weeks.
If after 6 weeks the identification has not taken place, the certificate applications will be revoked
without further notice.
KPN B.V.
36/91
If the Certificate Holder / Certificate Manager has not confirmed receipt within 3 weeks, KPN will send
a reminder. If the Certificate Holder / Certificate Manager has not confirmed receipt within 6 weeks,
KPN will revoke the Certificates concerned without further notice.
KPN shall confirm the issuance of the Certificate in writing or by e-mail to the Subscriber.
For applications from registered Certificate Managers, KPN sends the created Certificates by e-mail to
the specified e-mail address of the Certificate Manager and to the requesting Contact Person.
Immediately after the generation of the Certificate, completion can be seen via Directory Service.
However, because the physical transfer to Subscriber takes place at a later time, this has limited
value.
The Certificate Holder shall be explicitly informed of the production by physical transmission of the
smartcard, including the certificate produced. The Certificate Manager is explicitly informed of the
production by sending the Server Certificate by e-mail to the specified e-mail address.
In the case of a Mobile Smart Card no physical Smartcard is sent. Only a PINmailer is sent containing
the PUKcode of the certificate.
The Subscriber (not applicable to Professional Certificates) will be informed by e-mail or post of the
creation and transmission of the certificate.
The Professional, Personal, Group or eSeal Certificate is deemed to have been issued and accepted
as soon as it is received by the (Subscriber/) Certificate holder or Certificate Manager. He/she shall
acknowledge receipt via the link provided by e-mail with the code supplied with the smart Card.
The following applies to the Mobile certificate: The customer installs an app with the obtained
registration and activation code and chooses a PIN code. With the chosen PIN code, the creation of
the certificate is confirmed by the certificate holder.
The Server Certificate is deemed to have been issued and accepted as soon as the Certificate
Manager uses the Server Certificate obtained. The Certificate Manager must check the content of the
certificate for completeness and correctness before installing and using it.
In the specific case of municipalities that are likely to arise (see section 3.2.2), the Certificate Manager
must explicitly and as soon as possible confirm receipt of the Server Certificate to KPN. The
Certificate Manager ultimately has 6 weeks to do so. KPN will remind the Certificate Manager of its
obligation after 3 weeks if KPN has not received the acknowledgement of receipt within this period. If
the confirmation of receipt has not been received by KPN within 6 weeks, the relevant Server
KPN B.V.
37/91
Certificate will be revoked without further notice. KPN will inform the Subscriber about the revocation
of the Server Certificate. However, the payment obligation shall remain in full force and effect.
After the Certificate has been issued, it will be included directly in the Directory service.
The responsibilities and in particular the associated obligations of the Subscriber and the Certificate
Holder/Certificate Manager are described in the Special Terms and Conditions. By signing the various
forms or by relying on them, the parties concerned agree to these Special Terms and Conditions.
In addition, it is important for them to take note of the Programme of Requirements of PKIoverheid in
general and the applicable CP in particular. The CP sets out all the requirements to which all parties
involved in the certification service delivery must comply.
Before relying on a Certificate, it is particularly important for relying parties to first check the validity of
the entire chain from the Certificate to the Root Certificate.
Furthermore, the validity of a Certificate should not be confused with the authority of the Certificate
Holder to perform a certain action on behalf of an organization or on the grounds of his/her profession.
PKIoverheid does not regulate authorisation. The trustee must convince himself/herself of the
authorisation of the Certificate Holder in another way.
KPN does not offer any possibility to renew PKIoverheid Certificates. A request for renewal shall be
treated as a request for a new certificate.
Keys of Certificate Holders shall not be reused after expiry of the validity period or after the
corresponding Certificates have been revoked.
KPN does not offer any possibility to modify the content of PKIoverheid Certificates. If the information
in the Certificate no longer corresponds to the actual situation, the Subscriber is obliged to revoke the
Certificate in question immediately. If desired, the Subscriber can then apply for a new Certificate.
In the following cases, the Subscriber and/or the Certificate Holder is obliged to submit a request to
KPN to revoke the Certificate immediately and without delay:
KPN B.V.
38/91
• loss, theft or compromise of the Certificate, the private key, the QSCD/SUD, the PIN code
and/or PUK code;
• errors in the content of the Certificate;
• changes in the information contained in the Certificate (name, e-mail, etc.);
• changes in the particulars necessary for the reliability of the Certificate, such as termination of
employment or professional activity;
• death of the Certificate Holder (in the case of Personal or Professional Certificates);
• Termination or bankruptcy of the organization of the Subscriber (in the case of Organization-
related Certificates);
For (EV SSL/QWAC) server certificates also the following reasons apply:
• KPN is informed or becomes aware that the use of the domain name in the certificate is no
longer legally permitted (e. g. by a court order).
• The Subscriber uses a "code signing" certificate to digitally sign "hostile code" (including
spyware, malware, trojans etc.).
• The PKIoverheid Policy Authority or Agentschap Telecom (supervisory body for eIDAS in the
Netherlands) concludes that the technical content of the certificate poses an irresponsible risk
to subscribers, relying parties and third parties (such as browser parties) and requests KPN to
revoke the certificate.
KPN B.V.
39/91
If a Server certificate has been revoked or if the validity of the Server certificate has expired, it is no
longer permitted to use the private key, which is part of the public key of the relevant services server
certificate.
Certificates can be revoked by KPN without further intervention if the Subscriber, the Certificate
Holder and/or the Certificate Administrator do not comply with the obligations in the Special Terms
and Conditions. The reason for each revocation independently carried out by KPN is registered by the
company.
In the Mobile certificate application, if the "profile" on the smartphone is deleted, this will be detected
by Ubiqu and reported to KPN. This is the signal for KPN to revoke the certificate. The certificate
holder will be informed of this revocation.
KPN ensures that the date and time of revocation of (Services) Certificates can be determined
precisely. In case of doubt, the time set by KPN will be considered as the moment of revocation.
KPN will revoke a Certificate following a request to do so from the Subscriber, the Certificate Holder,
the Certification Manager or the Policy Authority of PKIoverheid. KPN itself may also initiate a
revocation request.
A Relying Party may not request a revocation, but may indicate the suspicion of a circumstance that
may give grounds for revocation of a Certificate. KPN will investigate such a report and, if there is
reason to do so, will revoke the Certificate.
A request for revocation or notification of a circumstance that may lead to the revocation of a
Certificate may be made by email or online (Self Service Portal) at:
https://certificaat.kpn.com/intrekken/
It should be stressed that if the revocation serves an urgent interest, this should be done via the
procedure described in section 1.5.2.
KPN ensures that the date and time of revocation of Certificates can be determined precisely. In case
of doubt, the time set by KPN will be considered as the moment of revocation.
If the "profile" on the smartphone is deleted with the Mobile certificate, this will be detected by Ubiqu
and automatically notified to KPN, which will treat it as an automatic revocation request. See 4.9.1
KPN B.V.
40/91
4.9.4 Duration for processing revocation request
As indicated, if the revocation has an urgent interest, this should be done electronically via the online /
real time revocation pages.
Requests for revocation by letter shall be considered only on the following working day at the earliest
and processed within four hours after receipt.
Relying Parties shall be obliged to verify the current status of a Certificate (revoked/not revoked)
against the date stated in the Certificate by the end of validity date and by reference to the Certificate
Status Information, linked to the time when the Certificate is/will be used. Certification status
information can be obtained by consulting the CRL, OCSP or Directory Service. Relying Parties are
also obliged to check the Electronic Signature with which the CRL has been signed, including the
associated certification path.
Revoked Certificates shall remain on the CRL until their original validity date has expired. Thereafter,
Relying Parties can only verify the status of that Certificate through via KPN's online Directory Service
or through OCSP.
If a Relying Party wishes to rely on a certificate that he/she has received from a Court Bailiff (a
member of the Royal Netherlands Bailiffs Association), he/she must, in addition to the above
mentioned inspections, also check whether the Bailiffs mentioned in the certificate mentioned on the
date of use of the certificate by the Court Bailiffs, are listed in the register to which the URL mentioned
in the certificate (www.registergerechtsdeurwaarders.nl ) refers.
If the Court Bailiff has been suspended on the date of use of the certificate by the Court Bailiff, the
relevant certificate cannot and may not be relied on.
If the register is not available, the Relying Party should independently obtain information from the
Royal Netherlands Bailiffs Association (dutch: Koninklijke Beroepsorganisatie van
Gerechtsdeurwaarders) in order to determine whether the Bailiffs are listed in the register kept by the
Royal Bailiffs Association.
The update of the CRL is initiated every 60 minutes, after the CRL has been generated, the CRL is
published. A CRL is valid for 24 hours.
After the expiry date of the issuing CA the last CRL will be published for at least 1 month.
KPN will revoke the (Services) Certificate no more than four hours after an authorised online
revocation request has been received.
In addition to the publication of CRLs, KPN also provides certificate status information via the so-
called OCSP. The OCSP configuration is in accordance with IETF RFC 6960.
OCSP validation is an online validation method whereby KPN sends an electronically signed message
(OCSP response) to the trustee after the trustee has sent a specific request for status information
(OCSP request) to the OCSP service (OCSP responder) of KPN.
KPN B.V.
41/91
The requested OCSP response shows the status of the relevant certificate.
The status can contain the following values: good, revoked or unknown. If an OCSP response is not
received for any reason, no conclusion can be drawn regarding the status of the certificate. The URL
of the OCSP responder with which the revocation status of a Certificate can be validated is shown in
the AuthorityInfoAccess.uniformResourceIndicator attribute of the certificate.
An OCSP response is always sent and signed by the OCSP responder. A Relying Party shall verify
the signature in the OCSP response with the system certificate included in the OCSP response. This
system certificate has been issued by the same Certification Authority (CA) as the CA that issued the
Certificate whose status is being requested.
After the validity date of the issuing CA, the OCSP validation facility will be discontinued.
Also, in the event of system failures, service activities or other factors beyond KPN's reach, KPN will
ensure that for revocation requests submitted online a new CRL is issued within four hours after this
submission. For this purpose, a fall-back location and scenario has been designed, among other
things, which is regularly tested in combination with redundant data processing and storage.
In addition to consulting the certificate status via CRL and OCSP, it is also possible to request this via
the Directory Service.
If a Subscriber wishes to terminate the subscription with KPN, a form entitled' Opzeggen abonnement
(Eng: Subscription cancellation)' can be used. Before KPN can terminate the subscription, all
Subscriber's Certificates must be revoked.
Those municipalities that cease to exist because of a municipal reclassification or those ministries that
cease to exist because of a ministerial reclassification should not terminate their subscription to KPN
immediately but ultimately should terminate their subscription. Not directly because in those cases the
rights and obligations of the old organization are taken over by the new organization. But in the end, it
is because the old organization formally ceases to exist.
KPN will take receipt of the form, assess its completeness and accuracy and decide on it. Part of this
assessment is whether the Subscriber has revoked all Certificates issued to Subscriber. KPN informs
the Subscriber about the decision.
By default, there is no Escrow of Private Keys. There is no possibility to include Private keys related to
Signature Certificates and Authenticity Certificates in Escrow.
KPN B.V.
42/91
5 Facility, Management, and Operational Controls
KPN's certification service provider business unit is certified against ISO9001:2015, ISO27001:2013,
ETSI EN 319 411-1 and ETSI EN 319 411-2. Both the Quality Management System and the
Information Security Management System are continuously focused on improving these systems
through the PDCA cycle.
The certification services are managed in and delivered from a highly secure environment within
KPN's computing centre in Apeldoorn. This environment complies with the laws and regulations in
force for the government, including the Wet Bescherming Staatsgeheimen 1951 (Eng: Act on the
Protection of State Secrets).
Physical access to the secure environment is achieved through a combination of procedural and
technical and constructional measures. Access to the building and the secure environment is
monitored by electronic (biometric) and visual means. The entrance system of the building records the
entry and exit of staff and visitors. The building is monitored by a security company for 7*24 hours.
The security systems automatically detect attempts at (un)authorized access. The technical measures
are supported by various procedures, including movement sensors that monitor persons and
materials (for cryptographic key management). The technical infrastructure, including the security
systems, is located in protected areas with a designated manager. Access to these areas is registered
for audit purposes.
Domestic regulations are in force for the registration and supervision of visitors and service personnel
of third parties. Arrangements have been made with service companies for access to certain rooms.
In addition, the building management department checks the incoming and outgoing goods (based on
accompanying documents).
KPN's secure environment offers standard up to at least five physical barriers to the production
environment. For non-production (offline) storage of cryptographic hardware and material, for
example, six levels apply.
Improper access to the secure environment requires compromising multiple systems. Depending on
the space, this can be a combination of knowledge, QSCD/SUD, biometric data, access guidance and
visual inspection. Additional measures include intrusion detection and video recordings. The different
access control systems are separated from each other and monitor access to the secure environment.
The segregation of duties in combination with five or six physical barriers prevents one individual from
gaining access to KPN's critical equipment.
KPN has taken numerous measures to prevent emergencies in the secure environment and/or limit
damage. Examples are
• Lightning rod;
• Air conditioning facilities
• Backup of electricity supply by means of an own electrical device;
• Constructional measures (fire resistance, drainage, etc.);
KPN B.V.
43/91
• Fire prevention by means of automatic and manual fire alarm devices. This in combination
with targeted, automated fire extinguishing.
The measures are tested on a regular basis. In exceptional cases, an escalation plan shall take effect.
The police and fire brigade are familiar with the specific situation regarding KPN's secure
environment.
If a (EXTENDED VALIDATION) Server certificate is involved, then the key material must have been
generated in a Safe Environment and the Private Key must be permanently accommodated therein.
For further explanation, see the definition of Safe Environment (Section 1.6).
In the case of the mobile certificate, all status changes - upon application and as a result of use - are
centrally logged on the KPN Servers in the secure environment of the KPN data center. The key
material is located on an HSM in the same environment.
Storage media from systems used for PKIoverheid Certificates are handled safely within the building
to protect them from unauthorized access, damage and theft. Storage media are meticulously
removed when no longer needed.
KPN has signed an agreement with a professional waste disposal company for the safe disposal of
waste, used paper and the like. KPN's staff are obliged to dispose of all waste paper in the closed
paper containers throughout the building.
Media containing data and software are also stored in another KPN building, with as a minimum an
equivalent level of security.
Security duties and responsibilities, including confidential functions, are documented in job
descriptions. These have been drawn up based on the segregation of duties and powers and in which
the sensitivity of the function has been established. Where applicable, a distinction has been made in
the job descriptions between general functions and specific TSP functions.
Procedures have been drawn up and implemented for all confidential and administrative tasks that
affect the provision of Certification Services.
Authorisation of the TSP staff takes place based on the need-to-know principle.
KPN B.V.
44/91
5.2.1 Trusted Roles
KPN has implemented a Trusted Employee Policy. Among other things, this policy describes the job
categories and roles for which the status "trusted" is described. This mainly concerns positions
involved in the management of certificates and key material, positions involved in system
development, management and maintenance and positions in security management, quality
management and auditing. See also 5.3.2. Trusted Employee Policy.
Multiple employees are required to carry out certain pre-defined activities in the areas of key,
certificate management, system development, maintenance and management. The need to have a
certain activity with several people is enforced by means of technical facilities, authorisations in
combination with identification/authentication and additional procedures.
KPN ensures procedural security through the application of ITIL management processes. ITIL is a
methodology for standardizing IT management processes with the aim of bringing, maintaining and
where possible improving the quality of these processes to a defined level.
KPN has separate systems for development, testing, acceptance and production. These systems are
managed using the ITIL procedures referred to above.
The transfer of software from one environment to another is controlled using the change management
procedure. This procedure includes, among other things, maintaining and recording of versions,
making changes and emergency repairs to all operational software.
The integrity of all systems and information used for PKIoverheid Certificates is protected against
viruses, malicious software and other possible disruptions to service provision through an appropriate
combination of physical, logical and organizational measures. These measures are preventive,
repressive and corrective in nature. Examples of measures taken include: logging, firewalls, intrusion
detection and system redundancy.
KPN has provided for timely and coordinated action to respond quickly to incidents and to limit the
impact of security breaches. All incidents shall be reported as soon as possible after they occur.
If an incident or other event in any way could threaten or affect the reliability of the certification service
and/or the image of the PKI for the government, this will be reported immediately to the PKIoverheid
Policy Authority.
KPN uses a segregation of duties between executive, decisive and controlling tasks. In addition, there
is also a segregation of functions between system management and operation of the systems used
for PKIoverheid Certificates, as well as between Security Officer (s), System auditor (s), System
administrator (s) and operator (s).
KPN B.V.
45/91
5.3 Personnel Controls
KPN deploys personnel with sufficient expertise, experience and qualifications to deliver PKIoverheid
Certificates.
KPN has determined which knowledge and experience is required for each function to be fulfilled
properly. This is maintained, because developments in the field of expertise follow one another
quickly. In addition, each employee's knowledge and experience is registered.
A training plan is drawn up each year as part of the Planning & Control cycle and, once approved, the
budget required to implement the plan is made available. The implementation of the plan is monitored
and recorded. Where necessary, the training courses are made compulsory and, where possible,
stimulated. Employees are also trained on the job. Employees are trained and trained as widely as
possible, on the one hand to be able to use them as widely as possible and, on the other hand, to
offer them as much variation in the range of tasks as possible.
The employees are followed by a Performance Management (PPM) cycle consisting of objectives
interview, a functioning interview and an assessment interview.
KPN has drawn up and implemented a Trusted Employee Policy for its certification services. In
formulating and maintaining this policy, the possibilities and impossibilities of generally applicable
legislation and regulations such as the Dutch Civil Code, the Wbp and the European eIDAS
Regulation and (customer) specific legislation and regulations from, for example, De Nederlandse
Bank, the Pension and Insurance Chamber and the PKIoverheid have been carefully considered. This
Policy describes in detail how, for example, a pre-employment screening (mandatory for those
employees involved in the certification service provision), the issuing of a Statement of Conduct
(VOG) pursuant to the Wji (also mandatory) and the conduct of security screening by services such as
the General Intelligence and Security Service or the Military Intelligence and Security Service in order
to obtain a Statement of No Objections (VGB). The policy also includes the options available to
management if an employee or future employee does not wish to cooperate or if the outcome of the
investigation is not positive.
KPN B.V.
46/91
• date and time and other descriptive information concerning backups;
• date and time of all hardware changes;
• Date and time of audit log dumps;
• Closing and (re)start of systems.
Audit logs are regularly reviewed to see if there have been significant security or operational events
that may require further action.
The log files are stored for at least 18 months and then deleted.
The consolidated (electronic) audit logs, as well as the manual registrations during the period of
validity of the Certificate, are retained for a period of at least seven years from the date of expiry of the
Certificate.
KPN B.V.
47/91
5.4.3 Protection of the Audit Log
Events recorded electronically are recorded in audit logs. This is achieved through an appropriate
combination of different types of security measures, including, inter alia, encryption and segregation of
duties, protected against unauthorized inspection, alteration, deletion or other undesirable
modifications.
Events recorded manually are recorded in files. These files are stored in fire-safe cabinets in a
physically safe environment with appropriate access measures.
Incremental backups of audit logs are created daily, in an automated way, complete backups are
created on a weekly basis and are also archived at a remote location.
KPN retains all relevant documentation and information relating to a Certificate during its term of
validity and for a period of at least seven years from the date of expiry of the Certificate.
KPN takes care of the archiving itself. It ensures the integrity and accessibility of the archived data
during the retention period.
All equipment and software necessary for accessing the information shall be kept for the same period.
KPN ensures a careful and secure way of storage and archiving.
No further stipulations
The precise date and time of relevant events in the life cycle of certificates and keys are recorded.
This also applies to important events in the life cycle of the systems used for or supporting certification
service delivery.
KPN B.V.
48/91
5.6 Key Changeover
The keys of a CA Certificate are renewed at the same time as renewing that CA Certificate.
Old keys remain on the token if the new ones are placed on it. Old tokens are destroyed after the end
of their lifetime and the associated archiving period (zeroising).
Keys of Certificate Holders shall not be reused after the expiry of the validity period or after revocation
of the associated Certificates.
KPN has implemented procedures to minimise the consequences of any disasters as much as
possible. These measures include a contingency plan and a disaster recovery scenario.
Compromise of KPN's Private Key is considered to be a disaster. KPN will inform Relying Parties,
Subscribers, Certificate Holders and Certificate Managers as soon as possible of the compromise of
KPN's Private Key by publishing information about this on its website (see Electronic Storage Site).
KPN will also send an e-mail to Subscribers, Certificate Holders and Certificate Managers and inform
the Government Policy Authority immediately.
KPN has set up a complete fallback for its CRL and the online revocation facility. The back-up device
is always fully identical to the production environment in terms of software and data and, for example,
in the event of a disaster, it can be switched to the back-up device. This switchover is regularly tested.
The alternate location is another KPN location (Almere) and has an equivalent level of security.
A contingency scenario was realised for the remaining parts of the CA system. This scenario provides
for the realization of a contingency within 24 hours. This scenario is maintained and tested annually.
If KPN terminates the certification service delivery, this will be done in accordance with a controlled
process as further described in the KPN CA Termination Plan. This termination may be voluntary or
involuntary, and the activities to be carried out will depend on it.
KPN B.V.
49/91
KPN has taken out adequate insurance cover for all common business risks to cover the costs of
operations under the CA Termination Plan. KPN has established a guarantee institution to cover
these costs in the event of bankruptcy.
Currently, there is limited willingness for TSPs registered with AT to take over (parts of) the
certification service from TSPs who involuntarily terminate their TSP service. For this reason, the
transfer will consist of the legally required limited service (6 months of CRL/OCSP publication and 7
years of archiving validation files) to another TSP registered with AT. This limited transfer will result in
the revocation of all relevant end-user and CA certificates.
In case of voluntary termination, the following activities will also be carried out:
• At least three months in advance, Subscribers, Certificate Holders and Certificate Managers
shall be informed of the termination and the manner in which the termination will take place;
• Where reasonably possible, take measures to limit damage that may be caused to
Subscribers and Certificate Holders as a result of the termination of the service.
KPN B.V.
50/91
6 Technical Security Controls
When generating CA key pairs, KPN uses reliable procedures that are performed within a secure
environment that meets objective and internationally recognised standards.
The key generation of KPN CAs used for PKI overheid Certificates has taken place in an EAL4+
certified HSM, in accordance with ISO 15408 (' Cryptographic module for CSP Signing Operations').
The SHA-1 root (domain Government/Businesses) is based on the signature algorithm' SHA1RSA'.
Key pairs keys are 2048 bits asymmetric RSA and the used hashing algorithm is' SHA-1'.
and the SHA-2 root (domain organization) is based on the signature algorithm' SHA2RSA'. The keys
of the key pairs are 4096 bits of asymmetric RSA and the used hashing algorithm is' SHA-2'.
The key generation for Personal Certificates and eSeal Certificates takes place in QSCDs. The key
generation for Group Certificates takes place in SUDs. The SHA-2 root (domain organization) uses
the signature algorithm' SHA256RSA'. The keys of the key pairs are 2048 bits or higher asymmetric
RSA and the used hashing algorithm is' SHA-2'.’
For mobile Smartcard certificates, the key pair is not located on the Smartcard (QSCD), but on an
HSM in a specially secured environment of a KPN Datacenter. The app on the certificate holder's
phone guarantees that the certificate holder has sole control over the use of the electronic signature.
The Server Certificates must be generated by and under the responsibility of the Subscriber in a
Secure Environment.
KPN monitors the QSCD certification status until the end of the certificate's validity period and will
take appropriate action in the event of a change in this status, for example by the expiry of the
certification validity period or the premature revocation of this certification.
As a first step, the KPN Policy Management Authority (PMA) will be informed of this status change
and the PMA will implement any further measures based on the situation found at that time.
When handling and processing applications for a certificate KPN uses secure resources and
trustworthy systems generating key pairs and certificates for End Users. These trustworthy systems
are provided with a positive CEN TS 419 241 or CEN TS 419 261 audit report.
All Certificates, except for Server Certificates, are generated by a trustworthy system in an QSCD (for
personal, professional and eSeal certificates) or SUD (for Group Certificates). Multiple Certificates can
be stored on the QSCD and SUD.
Personal, Professional, Group or eSeal Certificates are transferred to the Certificate Holder in the
following manner: sending the QSCD or SUD, including the Private Keys created by KPN via a
commercial mail company, where the necessary PIN for the QSCD or SUD is issued separately to the
Certificate Holder (' out of band'). The Certificate Holder signs for receipt of the QSCD or SUD before
he/she is sent the PIN.
KPN B.V.
51/91
The key pair for which the Public Key is provided with a Server Certificate by KPN is generated by the
Subscriber in the Subscriber's Safe Environment. The Private Key remains in that Safe Environment,
so it is not transferred.
The key pairs of Personal, Professional and Group Certificates are generated by KPN and are
therefore not transferred by the Subscriber to KPN.
The Subscriber does send the Public Key to KPN to have it provided with a Server Certificate. This
Public Key is attached to an electronic application form and is linked to a unique Certificate Signing
Request number (CSR number). The Public Key link to CSR number is used, after the Public Key has
been provided with a Server Certificate, to return the Public Key provided with a Server Certificate by
e-mail to the e-mail address mentioned in the Subscriber's Certificate Application request.
KPN's Public Keys used for PKIoverheid Certificates are made available to Relying Parties via KPN's
Directory Service (see Electronic Storage Site).
The key size of a Certificate is at least 1024 bits RSA. However, from 01-01-01-2011, only Certificates
with 2048 bits are issued. The key size of a SHA-1 CA Certificate is 2048 bits RSA and of a SHA-2
CA Certificate is 4096 bits.
No Stipulations.
For the use of key usage extensions, see section 7.1.4. Certificate Profiles overview.
The Certificates, including the associated key pairs, are only intended for the purposes described in
this CPS and which are included in (the extensions of) the Certificate (field: Key Usage).
In the development and use of cryptographic components, KPN ensures that these components meet
all the requirements that can be set in terms of security, reliability, application range and mitigation of
the susceptibility to interference. The applicable procedures may be assessed based on
internationally recognised standards.
For operational use, the cryptographic data is stored in an HSM. The HSM is EAL4+ certified.
The HSM that is used with the Mobile certificate has an FIPS 140-2 level 3 certification.
KPN B.V.
52/91
The HSMs are supplied by the supplier in tamper-evident bags, which are packaging that make any
form of corruption visible. Each consignment shall be checked immediately after its arrival based on
the corresponding list sent out-of-band.
KPN applies Key Management procedures to install, activate, backup and restore the Private Keys of
KPN CAs, which sign (Services) Certificates and CRLs. These actions are performed simultaneously
by at least two employees.
The Private Keys associated with KPN's CA Certificates are in principle not readable in one piece. In
addition, the cryptographic hardware modules on which they are stored are protected in such a way
that multiple persons are required to access them, and they are stored in a secure environment. This
Safe Environment is equipped with several layers of security measures of different type (technical,
physical and organizational) and nature (preventive, detective, etc.). In order to be able to pass
through the security layers, several employees of several departments are required.
By default, there is no Escrow of Private Keys. If desired, a Subscriber can submit a request to
Escrow for Private Keys of Confidentiality (encryption) Certificates and can make agreements about
this.
If the Private Key of a Confidentiality Certificate is not taken in escrow, the loss, destruction or other
unusability of the Private Key will result in the fact that the data previously encrypted with this
certificate can no longer be decoded.
There is no possibility of Escrow of Private Keys related to Signature Certificates and Authentication
Certificates.
A backup is made of the Private Keys associated with KPN's CA Certificates. The backup is stored in
encrypted form in cryptographic modules and associated storage devices.
No backup will be made of the Private Keys associated with subject Certificates.
For the Private Keys belonging to KPN CA Certificates, which are stored in a cryptographic hardware
module, access protection is used to ensure that the keys cannot be used outside the module. See
6.2.2.
KPN B.V.
53/91
6.2.7 Storage of Private Keys in the cryptographic module
The Private Keys associated with KPN CA Certificates are activated by means of a key ceremony in
the presence of the therefore necessary officers.
Under specific circumstances, KPN may determine that the Private Keys are deactivated, subject to
the safeguards applicable to them for the sake of due care.
If an QSCD or SUD is lost by the Certificate Holder and returned to KPN by a finder, this QSCD or
SUD will be destroyed by KPN, including the Private Key included therein. KPN will then also check
whether the relevant Certificates have been revoked and if not, it will do so immediately.
In the case of the mobile certificate, the certificate holder will have to report the loss of his telephone
to KPN on basis of which KPN will revoke the certificates.
The Private Keys with which Certificates are signed can no longer be used after the end of their life
cycle. KPN ensures adequate destruction, avoiding the possibility of tracing the destroyed keys from
the remains. If such keys are destroyed, those activities will be logged.
For those certificates issued on smart cards, i.e. personal certificates, professional certificates and
group certificates, the smart cards are certified by CWA 14169 at the EAL4+ level.
In the case of Server Certificates, use is made of the possibility offered by PKIoverheid to protect the
keys of a Server Certificate by means of software. This means that the environment in which the keys
are generated and stored must be as secure as if they were generated and stored in a SUD. That
same level of security can be achieved by a combination of appropriate compensatory measures in
and for that environment.
Compensatory measures must be of such a quality that it is practically impossible to steal or copy the
keys unnoticed. Compensatory measures include a combination of physical access security, logical
access security, logging and audit and separation of functions.
When applying for a Server Certificate, the Subscriber declares that the environment in which the
keys are generated and stored is sufficiently secure, as described above.
The Special Terms and Conditions stipulate that KPN has the right to carry out an audit of the
measures taken.
For mobile certificates, secure storage takes place by means of a secure device in the form of an
HSM in the secure environment of a KPN data center, whereby the HSM is certified against FIPS 140.
KPN B.V.
54/91
6.3 Other Aspects of Key Pair Management
All aspects of key pair management performed by KPN are subject to careful procedures that are
consistent with the intended purpose.
Public Keys are archived by KPN for at least seven years after the original validity period of a
Certificate has expired. Archiving will take place in a physically secure environment.
6.3.2 Period of use for Certificates, Public Key and Private Keys
Professional, Group and eSeal Certificates can be selected for a period of 3 or 5 years.
For Standard and EV SSL / QWAC Server Certificates, the maximum validity period is 397 days.
For the private services server certificate, the maximum validity period is 3 years.
KPN will inform the Subscriber of the expiry of the Certificates issued at his request at least 4 weeks
before the expiry of the validity period.
The QSCD or SUD, in which the Key pair and its Certificate are stored, is provided with activation
data. These PIN and PUK code are generated by a trustworthy system, consists of five characters
and is printed on a PIN-mail. After acceptance of the PIN-mail, the system will destroy the PIN and
PUK codes. In the time between generation and acceptance, the codes are encrypted by the
trustworthy system.
The PIN-mail, with the PIN and PUK code printed on it, is sent to the Certificate Holder/Certificate
Manager only after the Certificate Holder/Certificate Manager has acknowledged receipt of the QSCD
via a Link to KPN. Upon receipt of the PIN and PUK codes, the Certificate Holder/Certificate Manager
shall be solely responsible for their protection and confidentiality.
In order to gain access to the Key Material and Certificate, the Certificate Holder must use the PIN
code obtained, belonging to the QSCD or SUD. If the PIN code has been entered incorrectly three
times (5 attempts for the mobile certificate), the QSCD or SUD is automatically blocked. In that case,
the QSCD or SUD can only be unlocked with the PUK code.
If the PUK code is entered incorrectly three times, the QSCD or SUD will be permanently blocked and
will therefore become unusable. For the mobile certificate this is 10 attempts. After that, the mobile
certificate is definitively blocked.
KPN B.V.
55/91
6.5 Computer security controls
KPN appropriately safeguards the computer systems used for PKIoverheid Certificates against
unauthorized access and other threats, including through multi factor authentication.
The integrity of CSP systems and information is protected against viruses, malicious and
unauthorized software and other possible sources that could lead to service disruption, by means of
an appropriate set of physical, logical and organizational measures. These measures are preventive,
detective, repressive and corrective in nature. Examples of measures include: logging, firewalls,
intrusion detection and redundancy of systems, system components and network components.
The Directory Service is adequately protected against manipulation and is accessible online.
Information about the revocation status can be consulted 24 hours a day and seven days a week.
KPN also develops, in part, its own Card Management System (CMS). Although the CMS is obtained
from a specialist supplier, it consists of many different, small modules, which can be combined in
different order and composition into a working CMS using a system supplied by the supplier. Several
developers have been trained in this system, where necessary supported by the supplier.
In the management of the CMS, a separation of functions has been made between the development,
user and management organization. This separation of functions has continued in the separate
production, testing and development environments. The transition from development, to testing and
production environment is managed using the existing change management procedure. This change
management procedure includes maintaining and recording versions, changes and emergency
repairs of all operational software.
The other CA systems are obtained from reliable suppliers and, like the CMS, are equipped with a
CWA 14167-1 audit report or equivalent.
The capacity utilization is tracked, and forecasts are made of the capacity required in the future to
provide sufficient processing power and storage capacity in the future.
Suppliers' software delivery is surrounded by control measures that can be used to determine the
integrity and authenticity of the software. A measure used in addition to the measures mentioned in
6.6.1 is the use of hashes.
KPN B.V.
56/91
6.7 Network Security Controls
KPN takes appropriate measures to ensure the stability, reliability and security of the network. This
includes, for example, measures to regulate data traffic and to identify and prevent unwanted data
traffic, as well as the installation of firewalls to ensure the integrity and exclusivity of the network.
These measures are preventive, detective, repressive and corrective in nature. They also include the
regular (at least monthly) security scan and (at least annually) a penetration test.
6.8 Time-stamping
KPN B.V.
57/91
7 Certificate-, CRL- en OCSP-profiles
7.1.1 CP OID
The applicable Certificate Policies can be identified through the following OIDs:
Server certificates:
Domein Organisatie Services (Domain Organization Services)
2.16.528.1.1003.1.2.5.6 Server certificate
The PKIoverheid Certificates are structured according to the PKIX X. 509 v3 standard, whereby
extensions can be used. Signature certificates are structured according to the EESSI/ETSI Qualified
Certificate Profile. Any extensions within this framework shall also be included in the other
Certificates.
Certificate profiles are drawn up in accordance with Part 3 of PKIoverheid's Programme of
Requirements, in accordance with the Certificate Profile of the Certificate for the Domain
Government/Companies and Organization.
KPN B.V.
58/91
• Server Certificates
o 31-03-2016 128 bits
o from 1-04-2016 64 bits
o from 5-03-2019 96 bits
o from 23-05-2019 160 bits
• Extended validation Server Certificates
o from 10-11-2015 64 bits (EV SSL)
o from 5-03-2019 96 bits (EV SSL)
o from 23-05-2019 160 bits (EV SSL/QWAC)
Basic attributes
Field Value
Version 2 (X.509v3)
SerialNumber Unique serial number within the CA
Signature The used algorithm under the SHA-1 root (domain Government /Companies)
is sha1WithRSAEncryption.
The used algorithm under the SHA-2 root (domain Organization)
sha256WithRSAEncryption.
Issuer Contains the name of the CA concerned and is represented by the following
attributes: CommonName, OrganizationName en CountryName.
There have been / are several CA certificates in use.
• CA-Certificate with OrganizationName ‘PinkRoccade Infrastructure
Services BV’. The CommonName contains ‘PinkRoccade CSP -
Overheid – ‘and the designation ‘Onweerlegbaarheid CA’ of
‘Vertrouwelijkheid CA’ of ‘Authenticiteit CA’, depending on the type of
certificaat. The CountryName is ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics PinkRoccade
Nederland B.V.’. The CommonName contains ‘Getronics PinkRoccade
PKIoverheid CA – Overheid/Bedrijven en Organisatie’. The
CountryName is ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics Nederland BV’. De
CommonName contains ‘Getronics CSP Organisatie CA – G2. the
CountryName is ‘NL’.
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’, the
Common name contains ‘KPN Corporate Market CSP Organisatie CA -
G2’. The CountryName is ‘NL’;
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’, the
Common name contains ‘KPN Corporate Market PKIoverheid CA-
Overheid en Bedrijven’ The CountryName is ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, the Common name
contains ‘KPN PKIoverheid CA-Overheid en Bedrijven’ The
CountryName is ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, the Common name
contains ‘KPN BV PKIOverheid Organisatie Persoon CA - G3’ with
organizationIdentifier = NTRNL-27124701’ and CountryName ‘NL’
Validity see 6.3.2.
KPN B.V.
59/91
Subject The subject's name is displayed as a Distinguished Name (DN), and is
represented by at least the following attributes:
• CountryName;
• CommonName;
• OrganizationName;
• Title
• SerialNumber (subjectSerialnumber).
The attributes used to describe the subject name it in a unique way.
The CountryName attribute is set to a two-letter country code according to
ISO 3166.
The Title attribute shall only be filled with the Recognised Profession title of
the Certificate Holder if a Professional Certificate has been applied for.
subjectPublicKeyInfo Contains the PublicKey of the Subject
Standard extensions
Field Critical Value
AuthorityKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
SubjectKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
KeyUsage Yes The digital signature bit is included in Authenticity
Certificates.
The keyEncipherment, dataEncipherment and keyAgreement
bits are included in Confidentiality Certificates.
In Signing Certificates, the non-Repudiation bit is included.
BasicConstraints Yes The CA bit is set to ‘False’ en pathLenConstraint to ‘none’
CertificatePolicies No Domain Government/Companies
Authhentication certificates contain the OID
2.16.528.1.1003.1.2.2.1.
Signing certificates contain the
OID 2.16.528.1.1003.1.2.2.2.
Confidentiality Certificates contain the OID
2.16.528.1.1003.1.2.2.3.
Domain Organization
Authhentication certificates contain the OID
2.16.528.1.1003.1.2.5.1.
Signing certificates contain the OID
2.16.528.1.1003.1.2.5.2.
Confidentiality Certificates contain the OID
2.16.528.1.1003.1.2.5.3.
KPN B.V.
60/91
www.registergerechtsdeurwaarders.nl. This URL refers to the
bailiff's register. This register must be consulted before
relying on the certificate received.
SubjectAltName No This includes
• the subject's e-mail address;
• the OID of the CA concerned;
• The subject serial number of the Certificate Holder.
Private extensions
Field Critical Value
QCStatements No Certificates for the electronic signature
MUST indicate that they are issued as
qualified certificates complying with annex I
of EU regulation 910/2014. This compliance
is indicated by including the id-etsi-qcsQcCompliance
statement in this extension.
KPN B.V.
61/91
7.1.4 Group certificates
Basic Attributes
Field Value
Version 2 (X.509v3)
SerialNumber Unique serial number within the CA
Signature The used algorithm under the SHA-1 root (domain Government
/Companies) is sha1WithRSAEncryption.
The used algorithm under the SHA-2 root (domain Organization)
sha256WithRSAEncryption.
Issuer Contains the name of the CA concerned and is represented by the
following attributes: CommonName, OrganizationName en
CountryName.
There have been / are several CA certificates in use.
• CA-Certificate with OrganizationName ‘PinkRoccade Infrastructure
Services BV’. The CommonName contains ‘PinkRoccade CSP -
Overheid – ‘and the designation ‘Onweerlegbaarheid CA’ of
‘Vertrouwelijkheid CA’ of ‘Authenticiteit CA’, depending on the type
of certificaat. The CountryName is ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics PinkRoccade
Nederland B.V.’. The CommonName contains ‘Getronics
PinkRoccade PKIoverheid CA – Overheid/Bedrijven en
Organisatie’. The CountryName is ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics Nederland BV’.
De CommonName contains ‘Getronics CSP Organisatie CA – G2.
the CountryName is ‘NL’.
• CA-certificate with OrganizationName ‘KPN Corporate Market
B.V.’, the Common name contains ‘KPN Corporate Market CSP
Organisatie CA - G2’. The CountryName is ‘NL’;
• CA-certificate with OrganizationName ‘KPN Corporate Market
B.V.’, the Common name contains ‘KPN Corporate Market
PKIoverheid CA-Overheid en Bedrijven’ The CountryName is ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, the Common
name contains ‘KPN PKIoverheid CA-Overheid en Bedrijven’ The
CountryName is ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, the Common
name contains ‘KPN BV PKIoverheid Organisatie Services CA -
G3’ with organizationIdentifier = NTRNL-27124701’ and
CountryName ‘NL’
Validity see 6.3.2.
Subject The subject's name is displayed as a Distinguished Name (DN), and is
represented by at least the following attributes:
• CountryName;
• CommonName;
• OrganizationName;
• SerialNumber (subject serial number);
• State;
• Locality.
KPN B.V.
62/91
The CommonName contains the name of the Service, for example a
DNS or group name. The attributes describe the subject name in a
unique way.
The CountryName attribute is set to a two-letter country code
according to ISO 3166.
subjectPublicKeyInfo Public Key of the Subject
Standard Extensions
Field Critical Value
AuthorityKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
SubjectKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
KeyUsage Yes The digital signature bit is included in Authenticity
Certificates.
The keyEncipherment, dataEncipherment and
keyAgreement bits are included in Confidentiality
Certificates.
BasicConstraints Yes The CA bit is set to ‘False’ and pathLenConstraint to
‘none’
CertificatePolicies No Domain Government/Companies
• Authentication certificates contain the OID
2.16.528.1.1003.1.2.2.4.
• Confidentiality Certificates contain the OID
2.16.528.1.1003.1.2.2.5).
Domain Organization
• Authentication certificates contain the OID
2.16.528.1.1003.1.2.4.4.
• Confidentiality Certificates contain the OID
2.16.528.1.1003.1.2.4.5).
KPN B.V.
63/91
ExtendedKeyUsage No Group Certificates can contain this extension, which
makes it possible to use the Certificate for Windows
Smartcard Logon and Codesigning among others.
AuthorityInfoAccess No Contains the URI value of the OCSP responder, which
belongs to the certificate type. The OCSP response allows
real-time status information about the relevant Certificate
to be requested.
Basic Attributes
Field Value
Version 2 (X.509v3)
SerialNumber Unique serial number within the CA
Signature sha256WithRSAEncryption.
Issuer CN = KPN BV PKIoverheid Organisatie Services CA - G3
organizationIdentifier = NTRNL-27124701
O = KPN B.V.
C = NL
Validity see 6.3.2.
Subject The subject's name is displayed as a Distinguished Name (DN), and is
represented by at least the following attributes:
• CountryName;
• CommonName;
• OrganizationName;
• OrganizationIdentifier.
subjectPublicKeyInfo Public Key of the Subject
Standard Extensions
Field Critical Value
AuthorityKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
SubjectKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
KeyUsage Yes nonRepudiation
BasicConstraints Yes The CA bit is set to ‘False’ and pathLenConstraint to
‘none’
CertificatePolicies No Policy identifier: 2.16.528.1.1003.1.2.5.7
Policy identifier: 0.4.0.194112.1.3 (qcp-l-qscd)
policyQualified: 1.3.6.1.5.5.7.2.1 (id-qt-cps)
policyQualified: 1.3.6.1.5.5.7.2.2 (id-qt-unotice)
KPN B.V.
64/91
CrlDistributionPoints No Contains the URI value of the relevant CRL, which
belongs to the certificate type, can be retrieved.
ExtendedKeyUsage No eSeal Certificates can contain this extension, which
makes it possible to use the Certificate for Codesigning
among others.
AuthorityInfoAccess No Contains the URI value of the OCSP responder, which
belongs to the certificate type. The OCSP response allows
real-time status information about the relevant Certificate
to be requested.
QcStatement No Certificates for the electronic seals MUST indicate:
- that they are issued as qualified certificates complying
with annex III of EU regulation 910/2014. This compliance
is indicated by including the id-etsi-qcs-QcCompliance
statement in this extension.
- that the certified public key resides in a QSCD. This
compliance is indicated by including the id-etsi-qcs-
QcSSCD.
- that they are issued for the purpose of electronic seal.
This compliance is indicated by including the id-etsi-qcs-
QcType 2.
- the location of the PDS. This compliance is indicated by
including the id-etsi-qcs-QcPDS.
Basic Attributes
Field Value
Version 2 (X.509v3)
SerialNumber Unique serial number within the CA
Signature The used algorithm under the SHA-1 root (domain Government
/Companies) is sha1WithRSAEncryption.
The used algorithm under the SHA-2 root (domain Organization)
sha256WithRSAEncryption.
Issuer Contains the name of the CA concerned and is represented by the
following attributes: CommonName, OrganizationName and
CountryName.
There are/(have been) several CA certificates in use.
• CA-Certificate with OrganizationName ‘PinkRoccade Infrastructure
Services BV’. The CommonName contains ‘PinkRoccade CSP -
Overheid – ‘ and the designation ‘Onweerlegbaarheid CA’ of
‘Vertrouwelijkheid CA’ of ‘Authenticiteit CA’, depending on the type of
certificate. The CountryName is set to ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics PinkRoccade
Nederland B.V.’. The CommonName contains ‘Getronics
KPN B.V.
65/91
PinkRoccade PKIoverheid CA – Overheid/Bedrijven en Organisatie’.
The CountryName is set to ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics Nederland BV’. The
CommonName contains ‘Getronics CSP Organisatie CA – G2. The
CountryName is set to ‘NL’
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’,
The Common name contains ‘KPN Corporate Market CSP
Organisatie CA - G2’ and the CountryName is set to ‘NL’;
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’,
the Common name contains ‘KPN Corporate Market PKIoverheid CA-
Overheid en Bedrijven’ and the CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, the Common name
contains ‘KPN PKIoverheid CA-Overheid en Bedrijven’ and the
CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, the Common name
contains ‘KPN BV PKIoverheid Organisatie Server CA - G3’ met
organizationIdentifier ‘ NTRNL-27124701’ and the CountryName ‘NL’
Validity see 6.3.2.
Subject CN = < FQDN >
SERIALNUMBER = < subjectserialnumber > (optional)
OU = < part of subscriber’s organization > (optional)
L = < city >
ST = < province >
O = < subscriber’s organization >
C = < country code >
The CountryName attribute is set to a two-letter country code according
to ISO 3166.
subjectPublicKeyInfo Contains the Public Key of the Subject
Standard extensions
Field Critical Value
AuthorityKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
SubjectKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
KeyUsage Yes n/a
CertificatePolicies No Domain Organization
• Server certificates contain the OID
2.16.528.1.1003.1.2.5.6.
KPN B.V.
66/91
In server certificates, the primary name of the service and,
if applicable, the additional names of the service are
included in SubjectAltname. dNSName.
CrlDistributionPoints No Contains the URI value where the CRL, belonging to this
type of Certificate, can be retrieved
ExtendedKeyUsage No Server certificates may contain this extension, which
makes it possible to use the Certificate for server and
client authentication as well as email security.
AuthorityInfoAccess No Contains the URI value of the OCSP responder, which
belongs to the certificate type. The OCSP response
allows you to request real-time status information about
the relevant Certificate.
Basic Attributes
Field Value
Version 2 (X.509v3)
SerialNumber Unique serial number within the CA
Issuer CN = KPN Corporate Market Staat der Nederlanden EV
CA O = KPN Corporate Market B.V.
C = NL
As of April 1, 2016:
CN = KPN Staat der Nederlanden EV
CA O = KPN B.V.
C = NL
Validity see 6.3.2.
Subject CN = <FQDN>
SERIALNUMBER = <KvK nummer>
O = <organisatienaam>
OU =
L = <plaats>
S = <provincie>
C = <landcode>
1.3.6.1.4.1.311.60.2.1.3 = NL
2.5.4.15 = <businessCategory>
Standard extensions
Field Critical Value
AuthorityKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
SubjectKeyIdentifier No KeyIdentifier is set to 160 bit SHA-1 hash
KeyUsage Yes n/a
BasicConstraints Yes The CA bit is set to ‘False’ and pathLenConstraint to
‘none’
KPN B.V.
67/91
CertificatePolicies No 2.16.528.1.1003.1.2.7 (Extended Validation_CP)
2.23.140.1.1 (EV OID CA/B Forum)
0.4.0.194112.1.4 (QCP-w)
Basic attributes
Field Value
Version 2 (X.509v3)
SerialNumber Unique serial number within the CA
Issuer CN = KPN PKIoverheid Private Services CA – G1
O = KPN B.V.
C = NL
Validity see 6.3.2.
Subject CN = <FQDN>
SERIALNUMBER = <KvK nummer>
O = <organisatienaam>
OU =
L = <plaats>
S = <provincie>
C = <landcode>
1.3.6.1.4.1.311.60.2.1.3 = NL2
2.5.4.15 = <businessCategory>
KPN B.V.
68/91
Standard extensions
Field Essential Value
AuthorityKeyIdentifier No 160-bit SHA-1 Hash value of the KPN Private Services
Server CA
SubjectKeyIdentifier No 160-bit SHA-1 Hash value of the certificate
KeyUsage Yes n/a
BasicConstraints Yes The CA bit is set to ‘False’ and pathLenConstraint to
‘none’
CertificatePolicies No 2.16.528.1.1003.1.2.8.6 (Private Services CP)
https://certificaat.kpn.com/elektronische-opslagplaats
SubjectAltName No dNSName CN = <FQDN>
7.2 CRL-profiles
The CRL (or more recent status information) used for the PKIoverheid Certificates is structured in
such a way that it can easily be the subject of validation processes.
KPN may adjust the CRL's layout and format, as well as the principle underlying the CRL, in
accordance with the interests of the parties involved.
Attributes
Field Value
Version 1 (X.509 version 2)
signatureAlgorithm The algorithm used is under the SHA-1 root (Domain Government /
Businesses) sha-1 WithRSAEncryption.
The algorithm used is under the SHA-2 root (domain Organization) sha-2
WithRSAEncryption.
Issuer Contains the name of the CA concerned and is represented by the
following attributes: CommonName, OrganizationName and
CountryName.
There are/(have been) several CA certificates in use.
• CA-Certificate with OrganizationName ‘PinkRoccade Infrastructure
Services BV’. The CommonName contains ‘PinkRoccade CSP -
Overheid – ‘ and the designation ‘Onweerlegbaarheid CA’ of
KPN B.V.
69/91
‘Vertrouwelijkheid CA’ of ‘Authenticiteit CA’, depending on the type of
certificate. The CountryName is set to ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics PinkRoccade
Nederland B.V.’. The CommonName contains ‘Getronics PinkRoccade
PKIoverheid CA – Overheid/Bedrijven en Organisatie’. The
CountryName is set to ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics Nederland BV’. The
CommonName contains ‘Getronics CSP Organisatie CA – G2. The
CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’,
the Common name contains ‘KPN Corporate Market CSP Organisatie
CA - G2’ and the CountryName is set to ‘NL’;
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’,
The Common name contains ‘KPN Corporate Market PKIoverheid CA-
Overheid en Bedrijven’ and the CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, The Common name
contains ‘KPN PKIoverheid CA-Overheid en Bedrijven’ and the
CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, The Common name
contains ‘KPN BV PKIoverheid Organisatie Persoon CA - G3’ met
organizationIdentifier = NTRNL-27124701’ and the CountryName is set
to ‘NL’
effective date date of issuance
next update This is the date of issue plus 24 hours, the CRL update is initiated every
60 minutes and published after generation.
revoked certificates The revoked certificates with certificate serial number and date of
revocation and possible reason for revocation.
Extensions
Field Critical Value
AuthorityKeyIdentifier No contains 160-bit SHA-1 hash
Attributes
Field Value
Version V2
Issuer Contains the name of the CA concerned and is represented by the following
attributes: CommonName, OrganizationName and CountryName.
There are/(have been) several CA certificates in use.
• CA-Certificate with OrganizationName ‘PinkRoccade Infrastructure
Services BV’. The CommonName contains ‘PinkRoccade CSP -
Overheid – ‘ and the designation ‘Onweerlegbaarheid CA’ of
‘Vertrouwelijkheid CA’ or ‘Authenticiteit CA’, depending on the type of
certificate. The CountryName is set to ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics PinkRoccade
Nederland B.V.’. The CommonName contains ‘Getronics PinkRoccade
PKIoverheid CA – Overheid/Bedrijven en Organisatie’. The
CountryName is set to ‘NL’.
KPN B.V.
70/91
• CA-Certificate with OrganizationName ‘Getronics Nederland BV’. The
CommonName contains ‘Getronics CSP Organisatie CA – G2. The
CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’, the
Common name contains ‘KPN Corporate Market CSP Organisatie CA -
G2’. The CountryName is set to ‘NL’;
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’, The
Common name contains ‘KPN Corporate Market PKIoverheid CA-
Overheid en Bedrijven’. The CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, The Common name
contains ‘KPN PKIoverheid CA-Overheid en Bedrijven’. The
CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, The Common name
contains ‘KPN BV PKIoverheid Organisatie Services CA - G3’ with
organizationIdentifier = NTRNL-27124701’. The CountryName is set to
‘NL’
effective date Date of issuance
next update This is the date of issue plus 24 hours, the CRL update is initiated every 60
minutes and published after generation.
signatureAlgorithm The algorithm used is under the SHA-1 root (Domain Government /
Businesses) sha-1 With RSAEncryption.
The algorithm used is under the SHA-2 root (domain Organization) sha-2
With RSAEncryption.
CRL extensions
Field Value
AuthorityKeyIdentifier Contains160 bit sha-1 hash of the Public Key of the CA.
CRL Number Contains an integer indicating the sequence number of the relevant CRL.
Attributes
Field Value
Version V2
Issuer Contains the name of the CA concerned and is represented by the following
attributes: CommonName, OrganizationName and CountryName.
There are/(have been) several CA certificates in use.
• CA-Certificate with OrganizationName ‘PinkRoccade Infrastructure
Services BV’. The CommonName contains ‘PinkRoccade CSP -
Overheid – ‘ and the designation ‘Onweerlegbaarheid CA’ or
‘Vertrouwelijkheid CA’ or ‘Authenticiteit CA’, depending on the type of
certificate. The CountryName is set to ‘NL’.
KPN B.V.
71/91
• CA-Certificate with OrganizationName ‘Getronics PinkRoccade
Nederland B.V.’. The CommonName contains ‘Getronics PinkRoccade
PKIoverheid CA – Overheid/Bedrijven en Organisatie’. The
CountryName is set to ‘NL’.
• CA-Certificate with OrganizationName ‘Getronics Nederland BV’. The
CommonName contains ‘Getronics CSP Organisatie CA – G2. The
CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’, The
Common name contains ‘KPN Corporate Market CSP Organisatie CA -
G2’. The CountryName is set to ‘NL’;
• CA-certificate with OrganizationName ‘KPN Corporate Market B.V.’, The
Common name contains ‘KPN Corporate Market PKIoverheid CA-
Overheid en Bedrijven’. The CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, The Common name
contains ‘KPN PKIoverheid CA-Overheid en Bedrijven’. The
CountryName is set to ‘NL’.
• CA-certificate with OrganizationName ‘KPN B.V.’, The Common name
contains ‘KPN BV PKIoverheid Organisatie Server CA - G3’ with
organizationIdentifier = NTRNL-27124701’. The CountryName is set to
‘NL’
effective date Date of issuance
next update This is the date of issue plus 24 hours, the CRL update is initiated every 60
minutes and published after generation.
signatureAlgorithm The algorithm used is under the SHA-1 root (Domain Government /
Business) sha1WithRSAEncryption.
The algorithm used is under the SHA-2 root (domain Organization)
sha256WithRSAEncryption.
CRL extensions
Field Value
AuthorityKeyIdentifier Contains 160-bit sha-1 hash of the Public Key of the CA.
CRL Number Contains an integer indicating the sequence number of the relevant CRL.
Attributes
Field Value
Version V2
Issuer CN = KPN Corporate Market Staat der Nederlanden EV
CA O = KPN Corporate Market B.V.
C = NL
As of 1 April 2016:
KPN B.V.
72/91
CN = KPN Staat der Nederlanden EV
CA O = KPN B.V.
C = NL
effective date Date of issuance
next update This is the date of issue plus 24 hours, the CRL update is initiated every
60 minutes and published after generation.
signatureAlgorithm The algorithm used is under de SHA-2 root (domain Organisatie)
sha256WithRSAEncryption.
CRL extensions
Field Value
AuthorityKeyIdentifier Contains 160-bit sha-1 hash of the Public Key of the CA
CRL Number Contains an integer indicating the sequence number of the relevant CRL.
Attributes
Field Value
Version V2
Issuer CN = KPN PKIoverheid Private Services CA – G1
O = KPN B.V.
C = NL
CRL extensions
Field Value
AuthorityKeyIdentifier Contains 160-bit sha-1 hash of the Public Key of the CA
CRL Number Contains an integer indicating the sequence number of the relevant CRL.
KPN B.V.
73/91
7.3 OCSP-profiles
Basic attributes
Field Value
Version V2
serial number SHA1 hash of public key
Issuer DN C=NL
O=KPN B.V.
OI=NTRNL-27124701
CN=KPN BV PKIoverheid Organisatie Server CA - G3
Subject DN C=NL
O=KPN B.V.
CN= KPN BV PKIoverheid Organisatie Server CA - G3 OCSP n-1
(n= 1, 2, 3), (1=tracking number)
notBefore yymmdd000000Z (Date of Key Ceremony)
notAfter 2001dd235959Z (3 years)
(yymmdd)
Public Key Algorithm Sha256withRSAEncryption (1 2 840 113549 1 1 11)
Public Key Length 2048
Standard Extensions
Field OID Include Critical Value
basicConstraints {id-ce 19} x Yes n/a
cA Clear
pathLenConstraint n/a
keyUsage {id-ce 15} x Yes n/a
digitalSignature Set
certificatePolicies {id-ce 32} x No n/a
policyIdentifiers 2.16.528.1.1003.1.2.5.6
policyQualifiers N/A
policyQualifierID 1.3.6.1.5.5.7.2.1
Qualifier https://certificaat.kpn.com/pkioverheid/cps
policyQualifiers N/A
policyQualifierID 1.3.6.1.5.5.7.2.2
Qualifier This certificate is subject to KPN's PKIoverheid
CPS.
SubjectKeyIdentifier {id-ce 14} x No n/a
KeyIdentifier Method-1
AuthorityKeyIdentifier {id-ce 35} x No n/a
KeyIdentifier Hash of public key of Issuing CA
KPN B.V.
74/91
CrlDistributionPoints {id-ce 31} x No n/a
DistributionPoint n/a
Full Name (URI) http://crl.managedpki.com/KPNBVPKIoverheid
OrganisatiePersoonCAG3/LatestCRL.crl
Private Extensions
Field OID Include Critical Value
id-pkix-ocsp-nocheck 1.3.6.1.5.5.7.48.1.5 x FALSE 05 00 (Null)
KPN B.V.
75/91
8 Compliance Audit and Other Assessment
Since November 1, 2002, KPN B. V. (one of its predecessors) has been certified by KPMG
Certification b. v. against the' TTP. NL Scheme for management system certification of Trust Service
Providers issuing Qualified Certificates for Electronic Signatures, Public Key Certificates, Website
Certificates and / or Time-stamp tokens' against ETSI TS 101 456 and thus fulfilled the requirements
of the dutch law for Electronic Signatures. The ETSI TS 101 456 Certificate was extended on the
same date in the years 2005,2008,2011 and 2014 by the certification body BSI Management
Systems.
Since 2014, KPN has also been certified against ETSI TS 102 042.
Among other things, the Scheme specifies the frequency with which the audit is carried out, the
requirements that the certifying body must meet and how non-conformities are dealt with. A certifying
body must be accredited by the Accreditation Board before it can certify.
eIDAS
On July 1, 2016, the European Regulation (REGULATION (EU) No 910/2014 OF THE EUROPEAN
PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services
for electronic transactions in the internal market and repealing Directive 1999/93/EC) entered into
force.
This decree replaces the Dutch Electronic Signature Act.
Because this regulation sets out the requirements regarding the frequency of the audit and
accreditation, the afore mentioned TTP. NL Scheme lapses on that date.
In February 2016, the previous ETSI certifications ETSI TS 101 456 and ETSI TS 102 042 were also
replaced by ETSI certifications ETSI EN 319 411-2 and ETSI EN 319 411-1 respectively.
KPN also complies with the relevant parts of PKIoverheid Programme of Requirements as stated in
the Programme of Requirements (see https://www.logius.nl/english/pkioverheid ). This is
demonstrated by means of an audit report issued by BSI Group The Netherlands. A copy of the ETSI
EN 319 411-2 and ETSI EN 319 411-1 certificate can be found on the KPN site (see Electronic
Storage Site).
With effect from 10 March 2017, the Netherlands Radiocommunications Agency (hereinafter AT) has
been designated as statutory supervisor of the eIDAS ordinance.
KPN is registered as a Qualified Trust Service Provider (QTSP) by the Netherlands
Radiocommunications Agency .
KPN B.V.
76/91
9 Other Business and Legal Matters
KPN is the ultimately responsible Trust Service Provider. KPN is also responsible for those parts that
are outsourced to other organizations.
KPN has outsourced the identification of certificate holders and certificate managers to AMP B. V.
9.1 Fees
No further stipulations.
KPN has put in place adequate arrangements, including insurance, to cover liabilities related to the
provision of the service in question. In addition, KPN has the financial stability and resources
necessary for sound business operations.
The financial statements of KPN B.V. are integrated in the financial statements of Koninklijke KPN
N.V. As a publicly listed company, it is the Royal KPN N.V. not allowed to provide financial data
outside the regular reports and official channels.
No further stipulations.
KPN has formulated a policy for all information relating to security issues (see, for example, 9.3.1.).
This policy states, among other things, that this information is confidential and is only made available
based on the need-to-know principle. This also means that, in principle, this information is only made
KPN B.V.
77/91
available for inspection to third parties within the KPN building, but only to the extent that there is a
clear need for this (for example an audit) and always under strict confidentiality.
KPN complies with the requirements of the Wbp (dutch: Act on Privacy). KPN has registered with the
Dutch Data Protection Authority (College Bescherming Persoonsgegevens) as being responsible for
processing personal data for the purpose of certification services.
KPN has formulated a privacy statement for, among other things, its certification services. The
statement describes how KPN deals with personal data. The privacy statement is made available via
KPN's website (see Repository).
The following personal data are considered confidential and will not be provided to third parties:
• Subscriber details;
• certificate application details and certificate application treatment details;
• certificate application processing data;
• certificate revocation details;
• notifications of circumstances which may lead to revocation;
9.4.3 Non-confidential data
The published data of certificates is publicly available. The information that is made available in
respect of published and revoked certificates is limited to the limits set out in
Chapter 7 ' Certificate, CRL and OCSP profiles' of this CPS
Information on revocation of certificates is available through the CRL. This information provided only
concerns the certificate number, the moment of revocation and status (valid/revoked) of the certificate.
The responsibility for protecting the Private Key of the Certificate Holder and thus for the QSCD/SUD
on which it is stored lies up to and including transfer of the QSCD/SUD with KPN and after transfer
with the Certificate Holder/Certificate Manager. As a result, the responsibility for protecting the PIN
and PUK codes that secure the smart card also lies with KPN up to and including the transfer of the
PIN mail with KPN and after transfer with the Certificate Holder/Certificate Manager.
The Subscriber creates the key pair for which he requests a server certificate. The Subscriber is
responsible for creating and storing the relevant Private Key in his or her Safe Environment, the
Subscriber is also responsible for the Safe Environment itself.
In the case of the mobile certificate, no private key transfer will take place. This private key is stored
on the HSM in the secure environment of KPN. The responsibility for the protection of the PUK code
KPN B.V.
78/91
lies with KPN until the transfer of the PIN mailer. After that, the certificate holder is responsible for
setting up a PIN code and securing it.
The Certificate Holder, the Certificate Manager and Subscriber grant permission for publication of
certificate data by consent to the Special Terms and Conditions. The completion of an application
procedure by the Certificate Holder is considered by KPN as permission for the publication of the data
in the Certificate.
KPN does not provide confidential data to investigating officers, except insofar as Dutch legislation
and regulations require KPN to do so and only upon presentation of a legally valid summons.
The Certificate and the information supplied with the Certificate Application shall continue to be stored
for a further period specified to the Subscriber and/or Certificate Holder and insofar as necessary to
provide proof of certification in the legal process. Confidential data will only be provided to parties
other than the Subscriber and the Certificate Holder for the purpose of evidence, with the prior written
consent of the Subscriber or the Certificate Holder.
KPN will provide the Subscriber and/or Certificate Manager or Certificate Holder with the personal
data concerning him/her, upon request. Upon request, KPN provides the Subscriber with personal
data of a Certificate Manager or Certificate Holder who has received a Certificate on behalf of the
Subscriber.
KPN is entitled to charge an appropriate fee for each provision.
Information on revocation of Certificates is available through the CRL. The information given there
only concerns the Certificate number and the moment of revocation.
No further Stipulations.
Property rights relating to the Certificate, QSCD and SUD shall also remain vested in KPN and its
licensors after issuance, including intellectual property rights. The same applies to documentation
provided by KPN's services, including this CPS.
KPN B.V.
79/91
9.6 Obligations and Warranties
In the Special Terms and Conditions, the manner in which KPN and the parties involved must deal
with obligations and guarantees is set out.
In the Special Terms and Conditions, the manner in which KPN and the parties involved must deal
with the restrictions in guarantees is included.Limitations of Liability
KPN accepts liability for PKIoverheid Certificates as set out in the Special Terms and Conditions.
KPN's liability to Relying Parties is limited in the manner described in the Special Terms and
Conditions.
9.8 Indemnities
No further stipulations.
The special conditions include the manner in which KPN deals with termination.
KPN communicates with stakeholders in various ways. This is done verbally (telephone), mainly
through the employees of the Validation department who, among other things, process and handle the
Certificate applications. This department can be reached by calling +31 (0)88 661 05 00.
Communication also takes place via this CPS and for example the certificate application forms used,
all of which are accompanied by a detailed explanation. There is also the possibility of raising
questions or other matters via e-mail address pkivalidation@kpn.com
The listed documents and many other information are available in the Electronic Storage.
9.11 Amendments
KPN has the right to amend or supplement the CPS. The operation of the current CPS is assessed at
least annually by KPN's PMA. Subscribers, Certificate Holders, Certificate Managers and Confidential
KPN B.V.
80/91
Parties may comment on the content of the CPS and submit it to KPN's PMA, see section 1.5.2. If,
based on this, it is determined that changes to the CPS are necessary, the PMA will implement these
changes in accordance with the change management process set up for this purpose.
Amendments to the CPS are approved by KPN's PMA. Changes of an editorial nature or obvious
clerical and/or spelling errors can enter into force without prior notice and are recognizable by
increasing the version number by 0.1 (1.1 > 1.2). In the event of major changes, a new version will be
produced, recognizable by increasing the version number by 1 (1.0 > 2.0).
Amendments to the CPS are announced on KPN's website (see Electronic Storage Recordings). This
is done two weeks before the CPS's starting date of validity. This starting date of validity is stated on
the cover page of this CPS.
Complaints are dealt with by means of a Complaint procedure. These complaints can be reported by
telephone and by e-mail to the Service Desk. A web form is available on the website for this purpose,
which can be used to submit a complaint, among other things.
https://certificaat.kpn.com/contactformulier/
KPN makes every effort to provide you with the best possible service. However, it is possible that you
are not satisfied with our services. In that case, there is a possibility to appeal about the handling of
your complaint. You can reach this procedure via : https://www.kpn.com/zakelijk/service/klacht-
indienen-over-kpn-zakelijk.htm
The eIDAS regulation governs KPN's certification services within the PKIoverheid, insofar as it
concerns the Qualified Certificates (non-repudiation).
No further stipulations
No further stipulations
KPN B.V.
81/91
9.16 Other Provisions
No further stipulations
KPN B.V.
82/91
Appendix 1 Definitions
Advanced Electronic Signature: an Electronic Signature that meets the following requirements:
(a) it is uniquely linked to the signatory;
(b) it makes it possible to identify the signatory;
(c) it is established by means which the signatory can maintain under his sole control;
(d) it shall be linked to the electronic file to which it relates in such a way that any subsequent
alteration of the data can be detected.
Asymmetric Key Pair: a Public Key and Private Key within the public key cryptography that are
mathematically connected in such a way that the Public Key and the Private Key are each other's
counterparts. If one key is used to encrypt, the other key must be used to decrypt and vice versa.
Authentication: (1) Checking an identity prior to transmission of information; (2) verifying the
accuracy of a message or sender.
Authenticity certificate: Certificate certifying the Public Key of the key pair used for identification and
authentication services.
CA Key: the key pair, Private and Public Key of a Certification Authority.
Certificate: the Public Key of an End User, together with additional information. A Certificate is
enciphered with the Private Key of the Certification Authority that issued the Public Key, making the
Certificate unalterable.
Certificates can be grouped in different ways. Firstly, there is the distinction between Organizational
Certificates and Professional Certificates. Certificates for Organisation-linked Certificates are
requested by an organisational entity, which is a Subscriber at KPN, for a Certificate Holder who is
part of or has a relationship with that organisational entity. The Certificate Holder shall use the
Certificate on behalf of the organisation.
For Professional Certificates, they are applied for by a practitioner of a Recognised Appeal, who in
that capacity is a Subscriber himself or herself, but at the same time also a Certificate Holder. The
Certificate Holder shall use the Certificate on account of his profession.
The Organisation-specific Certificates are subdivided into Personal Certificates and Services
Certificates. The Services Certificates can in turn be divided into Group and Server Certificates.
Certificate Application: the request submitted by an Applicant for the issue of a Certificate by KPN.
Certificate Administrator: (Certificate Manager) a natural person who is authorized to apply for,
install, manage and/or revoke a Server Certificate or Group Certificate on behalf of the Subscriber and
for the benefit of the Certificate Holder. The certificate administrator carries out actions that the
certificate holder himself is not capable of doing.
KPN B.V.
83/91
Certificate Holder: an entity that is identified in a Certificate as the holder of the Private Key
belonging to the Public Key given in the Certificate.
In principle, there are two types of Certificate Holders: the organisation-specific Certificate Holder and
the professionally related Certificate Holder. The organisation-specific Certificate Holder is part of an
organisational entity in which the organisational entity is the Subscriber who applies for Certificates for
the Certificate Holder and in which the Certificate Holder may use these Certificates on behalf of the
Subscriber. The professional certificate holder is a practitioner of a recognized profession, who in that
capacity becomes a Subscriber at KPN and applies for Certificates for himself. In the case of the
professional Certificates, the Subscriber is the Certificate Holder, the Subscriber and the Certificate
Holder are the same person.
Certificate Profile: a description of the content of a Certificate. Each type of Certificate (signature,
confidentiality, etc.) has its own interpretation and thus its own description - in which there are, for
example, agreements on naming and the like.
Certificate Policy (CP): a named set of rules indicating the applicability of a Certificate for a particular
community and/or application class with common security requirements. Using a CP, Subscribers and
Confidential Parties can determine how much confidence they can place in the relationship between
the Public Key and the identity of the Public Key holder. The applicable CP’s are included in the
PKIoverheid Programme of Requirements (PoR). This concerns the part 3a Certificate Policy -
Domain Government/Businesses and Organisation and the part 3b Certificate Policy - Services,
appendix to CP Domain Government/Businesses and Organisation.
Certificate Revocation List: (CRL): a publicly accessible and consultable list of revoked Certificates,
signed and made available by the issuing TSP
Certification Authority (CA): an organisation that generates and revokes Certificates. The
functioning as CA is a partial activity carried out under the responsibility of the TSP. In this respect,
KPN therefore both operates as a CA and a TSP (CSP)
Certification services: the issuing, management and revocation of Certificates by Trust Service
Providers.
Certification Practice Statement (CPS): a document describing the procedures followed and
measures taken by a CSP in relation to all aspects of the service provision. The CPS describes how
the CSP(TSP) meets the requirements as stated in the applicable CP.
Certification Service Provider: a natural or legal person whose function is to provide and manage
Certificates and key information, including the associated media (QSCD, SUD). The Certification
Service Provider also has the final responsibility for providing the Certification Services, whether it
carries out the actual activities itself or subcontracts them to others.
Confidentiality certificate: Certificate certifying the Public Key of the key pair used for confidentiality
services.
KPN B.V.
84/91
Data for the creation of Electronic Signatures: see Signature Creation Data.
Directory Service: a service from (or with the cooperation of) a CSP that makes Certificates issued
by the CA available and accessible online for the benefit of consulting or trusting parties.
End User: a natural or legal person who performs one or more of the following roles within the
PKIoverheid: Subscriber, Certificate Holder or Confidential Party. In view of the limited distinctive
character of this term, it is not used in the CPS, except in so far as it concerns the prescribed
structure of the document (i.e. headings, etc.).
Electronic Signature: electronic data that are attached to or logically associated with other electronic
data and are used as a means of authentication. The Electronic Signature is used to ensure that
electronic correspondence and transactions can compete on two important points with the time-
honoured "signature on paper". By placing an Electronic Signature, it is certain that someone who
claims to have signed a document has actually done so.
Electronic Storage: location where relevant information regarding KPN's services can be found.
See: https://certificaat.kpn.com/elektronische-opslagplaats/.
Escrow (Key-Escrow): A method to generate a copy of the Private Key for the purpose of access to
encrypted data by authorised parties during the issuance of a Certificate and its secure storage.
Generic TopLevelDomain (gTLD):The gTLD is a generic top-level domain (generic Top Level
Domain), a domain name extension that does not belong to a particular country and that can be
registered in principle by anyone anywhere in the world.
KPN B.V.
85/91
• independent administrative bodies as listed in the ZBO register
GovernmentCA: a CA that is the RootCA within the hierarchy of PKIoverheid. In a technical sense, it
is the central point of trust within the hierarchy and is controlled by the Government Policy Authority.
Government Policy Authority: the highest policy-making authority within the hierarchy of
PKIoverheid that controls the Government-CCA.
Group Certificate: a combination of two Non-Qualified Certificates, stored on a SUD, which together
support the functions of confidentiality and authenticity and fulfil the following requirements:
(a) they have been spent on a service or function, forming part of the Subscriber (organisational
entity); and
(b) they have been issued on the basis of the Certificate Policy Services in force within PKIoverheid
(PoR Part 3b)
Hardware Security Module: The peripherals used on the server side to accelerate cryptographic
processes. The creation of keys should be considered in particular.
KPN Special Terms and Conditions PKIoverheid Certificates: the Special Terms and Conditions,
which apply to all parties involved in the issue and use of PKIoverheid Certificates.
Mobile Certificate: The means by which KPN provides an eIDAS qualified signature certificate and
an authentication certificate that is under "sole control" of the certificate holder using his mobile
phone. The key material is securely stored on systems managed by KPN in a secure environment. As
a result, the certificate holder no longer needs a Smartcard or USB token to sign documents with a
qualified signature, but a mobile phone with an activated Mobile certificate and an application that is
connected to the corresponding signing service.
Non-qualified Certificate: a Certificate that does not meet the requirements for a Qualified
Certificate.
Object Identifier (OID): A sequence of numbers that uniquely and permanently identifies an object.
Online Certificate Status Protocol (OCSP): a method to check the validity of Certificates online (and
in real time). This method may be used as an alternative to consulting the CRL.
Organization-specific certificates
There are two different types of organisational certificates:
1. for persons;
2. for services.
Ad. 1
In the case of organisation-specific certificates for persons, the certificate holder is part of an
organisational entity. The certificate holder has the power to make a particular transaction on behalf of
that organisational entity.
KPN B.V.
86/91
Ad. 2
In the case of organisation-specific certificates for services, the certificate holder is :
• an apparatus or a system (non-natural person), operated by or on behalf of an organisational
entity; or
• a function of an organisational entity.
Personal certificates:
The certificate holder will be a natural person in the case of personal certificates. The certificate
holder is either part of an organisational entity for which a subscriber is the contracting party
(organisational certificate holder), or the person practising a recognised profession and in that
capacity itself a subscriber and thus the contracting party (professional certificate holder) or a citizen
and, in that capacity, a subscriber and thus the contracting party.
PKIoverheid, the Public Key Infrastructure of the State of the Netherlands (also known as
PKIoverheid): a system of agreements that allows generic and large-scale use of the Electronic
Signature, and also facilitates remote and remote identification.
Confidential communication. The arrangement system is owned by the Minister of the Interior and
Kingdom Relations and is managed by the Policy Authority PKIoverheid.
Policy Management Authority: the organisational entity within KPN responsible for developing,
maintaining and formally establishing service-related documents, including the CPS.
Private IP address: An Internet Protocol address (IP address) is an identification number assigned to
each device (e. g. computer, printer) participating in a computer network that uses the Internet
Protocol (TCP/IP) for communication purposes.
Private IP addresses are not routable on the internet and are reserved for private networks. The
IPv4's IPv4 address range reserved or kept available for private use is (see RFC 1918):
• 10.0.0.0 – 10.255.255.255;
• 172.16.0.0 – 172.31.255.255;
• 192.168.0.0 – 192.168.255.255;
In addition, the 169.254.0.0.0 -169.254.255.255.255 series is reserved for Automatic Private IP
Addressing (APIPA). These IP addresses may not be used on the Internet.
The IPv6 is the IP address range reserved or kept available for private use (see RFC 4193):
fc00: /7
In addition, the series of fe80: /10 is reserved for Automatic Private IP Addressing (APIPA). These IP
addresses may not be used on the Internet.
Private Key: the key of an asymmetric key pair that should only be known to its holder and kept
strictly secret. Within the framework of the PKIoverheid, the Private Key is used by the Certificate
Holder to identify himself electronically, to place his Electronic Signature or to decipher an encrypted
message.
KPN B.V.
87/91
The Certificates shall comply with the following requirements:
a. they have been issued to a natural person, who uses the Certificate or is going to use it for his or
her profession; and
b. they have been issued on the basis of the Certificate Policy Domain of Government/Businesses
and Organisation Certificate (PoR Part 3a) applicable within PKIoverheid.
Public IP address: Public IP addresses are unique worldwide and can be routable, visible and
accessible from the Internet.
Public Key Infrastructure (PKI): the organisation, procedures and technology required to issue, use
and manage Certificates.
Public Key: the key of an asymmetric key pair that can become public
published. The Public Key is used to check the identity of the owner of the asymmetric key pair, to
check the Electronic Signature of the owner of the asymmetric key pair and to encrypt information for
a third party.
Qualified Certificate: A Certificate that meets the requirements set out in REGULATION (EU) No
910/2014 OF THE EUROPEAN PARLIAMENT (eIDAS) and has been issued by a Trust Service
Provider that meets the requirements set out in this Regulation. The Certificate must also apply to the
application of the Qualified Electronic Signature.
Qualified Certificate for Electronic Signature: an Electronic Signature that meets the following
requirements:
a. it is uniquely linked to the signatory;
b. it makes it possible to identify the signatory;
c. it is established by means which the signatory can maintain under his sole control;
d. it shall be linked to the electronic file to which it relates in such a way that any subsequent
alteration of the data can be detected;
e. it is based on a Qualified Certificate as referred to in REGULATION (EU) No 910/2014 OF THE
EUROPEAN PARLIAMENT (eIDAS);
f. it has been generated by a secure means for the creation of Electronic Signatures as referred to
in REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT (eIDAS).
Qualified Certificate for electronic Seal (eSeal): means an advanced electronic seal, which is
created by a qualified electronic seal creation device, and that is based on a qualified certificate for
electronic seal, and meets the requirements of REGULATION (EU) No 910/2014 OF THE
EUROPEAN PARLIAMENT (eIDAS).
Qualified Signature Creation Device (QSCD): a means for the creation of Electronic Signatures that
meets the requirements of REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT
(eIDAS). An QSCD is used for personal and professional certificates. An QSCD can be a smart card
or a USB token, for example.
Qualified Certificate for Website Authentication (QWAC): a means to authenticate a website and
links the website to the legal person to whom the certificate is issued and meets the requirements of
REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT (eIDAS).
KPN B.V.
88/91
profession which is mentioned in the program of PKIoverheid requirements as a Recognised
profession.
Relying Party: the natural or legal person who is the recipient of a Certificate and who acts in
confidence in that Certificate.
Root: the central part of a (PKI) hierarchy from which the entire hierarchy and its level of reliability are
displayed.
Root certificate: the Root-CA Certificate. This is the Certificate belonging to the place where trust in
all Certificates issued within PKIoverheid originates. There is no higher CA from which confidence is
derived. This Certificate is signed by the Certificate Holder (within PKIoverheid this is the
GovernmentCA) itself. All underlying Certificates are issued by the holder of the Stam Certificate.
Root Certification Authority (Root-CA): a CA which is the centre of common trust in a PKI hierarchy.
The Certificate of the Root-CA (the Root-CA (the Root Certificate of Stam Certificate) is self-signed,
as a result of which it is not possible to authenticate the source of the signature on this Certificate,
only the integrity of the content of the Certificate. However, the Root-CA is trusted based on, for
example, CP and other documents. The Root-CA does not necessarily have to be positioned at the
top of a hierarchy.
Secure User Device (SUD): a means that contains the users private key (s), protects this key (s)
from compromise and performs authentication or decryption on behalf of the user. A QSCD is used for
service certificates. Also, a QSCD can be a smart card or a USB token.
A smart card or USB token is called QSCD if it can be used to create electronic signatures, i. e. if it
carries qualified certificates. If a smart card or USB token service contains certificates, it is called a
SUD.
Server Certificate: A Non-qualified Certificate stored within the Subscriber's Secure Environment that
supports the functions of authenticity and confidentiality and meets the following requirements:
a. it has been issued to a server, being part of the Subscriber (organisational entity); and
b. it has been issued based on the Certificate Policy Services in force within PKIoverheid (PoR
Part 3b).
Services Certificate: A certificate that links a function or device, such as a server, to a legal entity or
other organisation. A Services Certificate can be a Server Certificate, if a device is linked to an
organization, or a Group Certificate, if a function is linked to an organization.
Secure Means of Creating Electronic Signatures: see Secure Signature Creation Device.
Secure Environment: The environment of the system that contains server certificate keys. Within this
environment it is permitted to protect the keys in software, rather than in a SUD. Compensatory
measures for this must be of such a quality that it is practically impossible to steal or copy the keys
unnoticed. Compensatory measures include a combination of physical access security, logical access
security, logging, audit and separation of functions.
Signature Creation Data: unique data, such as codes or private cryptographic keys, used by the
signatory to create an Electronic Signature.
Signature Creation Device: configured software or hardware used to implement the data for the
creation of Electronic Signatures.
KPN B.V.
89/91
Signature creation tool: see Signature Creation Device.
Signature Verification Data: data, such as codes or cryptographic Public Keys, used to verify an
Electronic Signature.
Subscriber: the natural person (Recognized Profession Certificates or legal entity (Organisation
related Certificates) who enters into an agreement with KPN to effectuate the issue of PKIoverheid
Certificates to Certificates to Certificates Holders designated by the Subscriber.
Trust service provider (TSP): Provider of trust services. Since the European Regulation eIDAS the
common name for CSP.
see Certification Service Provider.
Non-repudiation: the property of a message to demonstrate that certain events or actions have taken
place, such as sending and receiving electronic documents.
X. 509: an ISO standard that defines a basis for the electronic format of Certificates.
KPN B.V.
90/91
Appendix 2 Abbreviations
Abbreviation Meaning
AT Agentschap Telecom (supervisory body for eIDAS in the Netherlands)
CA Certificatie Autoriteit (Certification Authority)
CP Certificate Policy
CPS Certification Practice Statement
CRL Certificates Revocation Lijst
EESSI European Electronic Signature Standardization Initiative
eSeal Qualified Certificates for electronic Seals
ETSI European Telecommunication Standardisation Institute
FIPS Federal Information Processing Standards
GDPR General Data Protection Regulation
HSM Hardware Security Module
OCSP Online Certificate Status Protocol
OID Object Identifier
PIN Personal Identification Number
PKI Public Key Infrastructure
PMA Policy Management Authority
PUK Personal Unlock Code number (Dutch: Kengetal)
PoR PKIoverheid Program of Requiremenst (Dutch: Programma van Eisen)
QWAC Qualified Certificates for Website Authentication
RA Registration Authority
QSCD Qualified Signature Creation Device
SUD Secure User Device
TSP Trust Service Provider
Wid Wet op de identificatieplicht (Dutch Identification Act)
KPN B.V.
91/91