Reference record for OID 1.3.6.1.5.5.7.3.8


parent
1.3.6.1.5.5.7.3 (kp)
node code
8
node name
timeStamping
dot oid
1.3.6.1.5.5.7.3.8
asn1 oid
  • {iso(1) identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) kp(3) timeStamping(8)}
  • {iso(1) org(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) kp(3) timeStamping(8)}
  • {iso(1) iso-identified-organization(3) dod(6) internet(1) security(5) mechanisms(5) pkix(7) kp(3) timeStamping(8)}
  • iri oid
  • /iso/identified-organization/dod/internet/security/mechanisms/pkix/kp/timeStamping
  • /iso/org/dod/internet/security/mechanisms/pkix/kp/timeStamping
  • /iso/iso-identified-organization/dod/internet/security/mechanisms/pkix/kp/timeStamping
  • iri by oid_info
    /ISO/Identified-Organization/6/1/5/5/7/3/8

    Description by oid_info

    PKIX key purpose timeStamping

    Indicates that a certificate can be used to bind the hash of an object to a time from a trusted time source.
    View at oid-info.com

    Information by oid_info

    See RFC3280.

    First Registration Authority (recovered by parent 1.3.6.1.5.5.7)

    IETF PKIX Working group

    Current Registration Authority (recovered by parent 1.3.6.1.5.5.7)

    Internet Assigned Numbers Authority (IANA)

    Brothers (28)

    OIDNameSub childrenSub Nodes TotalDescription
    1.3.6.1.5.5.7.3.1 serverAuth 0 0 Indicates that a certificate can be used as an SSL server certificate
    1.3.6.1.5.5.7.3.2 clientAuth 0 0 Indicates that a certificate can be used as a Secure Sockets Layer (SSL) client certificate
    1.3.6.1.5.5.7.3.3 codeSigning 0 0 Indicates that a certificate can be used for code signing
    1.3.6.1.5.5.7.3.4 emailProtection 0 0 Indicates that a certificate can be used for protecting email (signing, encryption, key agreement)
    1.3.6.1.5.5.7.3.5 ipsecEndSystem 0 0 IPSEC End System Certificate
    1.3.6.1.5.5.7.3.6 ipsecTunnel 0 0 IPSEC Tunnel Certificate
    1.3.6.1.5.5.7.3.7 ipsecUser 0 0 IPSEC User Certificate
    1.3.6.1.5.5.7.3.9 ocspSigning 7 7 Indicates that a X.509 Certificates corresponding private key may be used by an authority to sign OCSP-Responses
    1.3.6.1.5.5.7.3.10 dvcs 0 0 PKIX key purpose dvcs
    1.3.6.1.5.5.7.3.11 11 0 0 "sbgpCertAAServerAuth" key purpose
    1.3.6.1.5.5.7.3.12 12 0 0 id-kp-scvp-responder
    1.3.6.1.5.5.7.3.13 id-kp-eapOverPPP 0 0 Extended key usage value: id-kp-eapOverPPP
    1.3.6.1.5.5.7.3.14 id-kp-eapOverLAN 0 0 Extended key usage: id-kp-eapOverLAN
    1.3.6.1.5.5.7.3.15 id-kp-scvpServer 0 0 None
    1.3.6.1.5.5.7.3.16 id-kp-scvpClient 0 0 None
    1.3.6.1.5.5.7.3.17 id-kp-ipsecIKE 0 0 None
    1.3.6.1.5.5.7.3.18 18 0 0 id-kp-capwapAC
    1.3.6.1.5.5.7.3.19 id-kp-capwapWTP 0 0 Control And Provisioning of Wireless Access Points (CAPWAP), Wireless Termination Points (WTP)
    1.3.6.1.5.5.7.3.20 id-kp-sipDomain 0 0 Extended Key Usage (EKU) values for Session Initiation Protocol (SIP) domains
    1.3.6.1.5.5.7.3.21 secureShellClient 0 0 id-kp-secureShellClient (indicates that the key can be used for a Secure Shell client)
    1.3.6.1.5.5.7.3.22 secureShellServer 0 0 id-kp-secureShellServer (indicates that the key can be used for a Secure Shell server)
    1.3.6.1.5.5.7.3.23 23 0 0 Extended key usage value: id-kp-sendRouter
    1.3.6.1.5.5.7.3.24 24 0 0 Extended key usage value: id-kp-sendProxy
    1.3.6.1.5.5.7.3.25 25 0 0 Extended key usage value: id-kp-sendOwner
    1.3.6.1.5.5.7.3.26 26 0 0 Extended key usage value: id-kp-sendProxiedOwner
    1.3.6.1.5.5.7.3.27 id-kp-cmcCA 0 0 None
    1.3.6.1.5.5.7.3.28 id-kp-cmcRA 0 0 None
    1.3.6.1.5.5.7.3.29 id-kp-cmcArchive 0 0 None