Licence: <ahref="//wiki.cacert.org/Policy#Licence"title="this document is Copyright CAcert, licensed openly under CC-by-sa with all disputes resolved under DRP. More at wiki.cacert.org/Policy"> CC-by-sa/DRP </a><br/>
<pclass="q">Iang: I suggest this be section 3:</p>
<pclass="change">
Assurance assisted by TTP must meet these requirements:
</p>
<olclass="change"type="a"><li>
The Assurer must positively confirm the identity and
suitability of the TTP.
</li><li>
The TTP and the Member must meet face-to-face.
</li><li>
The TTP confirms the details supporting the Assurance Statement.
</li><li>
The Assurer makes a reliable statement to confirm the
Assurance Statement.
</li><li>
<i>
Assurance must be marked as TTP-Assisted
(e.g., by use of TTPAdmin flag).
</i>
</li></ol>
<pclass="q"> And all the rest in pink box be pushed into the HANDBOOK. This way, the policy sets requirements and standards, and AO is responsible for meeting them as a PRACTICE. </p>
and attempts to be assured by the routine face-to-face process.
</p>
</li><li>
<p>
Once determining that none are conveniently located,
the Member contacts an Assurer who is enabled to
conduct TTP-assisted assurances in the region.
</p>
</li><li>
<p>
The Assurer confirms that the Member
agrees to the CAcert Community Agreement (CCA),
including the Dispute Resolution Policy (DRP).
</p>
</li><li>
The Assurer confirms that standard Assurances do not meet
the needs of the Member.
<spanclass="change">
This is only likely in areas not well-served with Assurers.
</span>
</p>
</li><li>
<p>
The Member and Assurer must negotiate the selection of TTPs
and the provision of adequate identification documents to the TTP.
Each TTP can only be used once (within one assurance for this Member).
</p>
<pclass="q">iang: this may suggest a Patch required to the system that permits the Assurer to check other TTP Assurances of the member.</p>
</li><li>
Assurer agrees to conduct the TTP-assisted Assurance,
and gives the Member a Token.
</li></ol>
<h3><aname="3.2"> 3.2 </a> Face-to-face meeting with the TTP </h3>
<ol><li>
<p>
The TTP and the Member meet face-to-face.
</p>
</li><li>
<p>
The TTP shall confirm that:
</p>
<oltype="a"><li>
The Member agrees to the CCA.
</li><li>
The Name and Date of Birth details recorded on the form
are matched by those in the identity documents.
</li><li>
The method (document type and issuer, not numbers)
by which the Name and DoB details are matched
is stated on the form.
</li><li>
Location of the meeting.
</li><li>
Contact details for the TTP
</li><li>
Assurer's Name and Token.
</li></ol>
</li><li>
<p>
The TTP shall use either the local form of document
(on CAcert's approved list), or a CAcert-provided form.
</p>
</li><li>
<p>
The TTP shall log the event by their customary means,
including the Assurer's Name and Verification Token.
</p>
<pclass="q">Old: leaving a Remote Assurance Form and copies of identity documents with the TTP for at least 60 days</p>
</li><li>
<p>
The paperwork is sent to the Assurer by the TTP.
</p>
<spanclass="q">
<p>Old: sending a Remote Assurance Form and copies of identity documents to the Assurer by mutually agreed medium (eg post, web form or encrypted email).</p>
<p>iang: this clause <B>is similar</B> to the requirement DRC C.9.b:</p>
<blockquote><u>"RAs provide the CA with complete documentation on each verified applicant for a certificate."</u></blockquote>
<p>What is different is that the criteria requires the TTP to send the form, not the Member.</p>
</span>
</li></ol>
<h3><aname="3.3"> 3.3 </a> Completion of the Assurance </h3>
<ol><li>
<p>
The Assurer must confirm the assurance using the paperwork,
</p><p>
The Assurer must
be satisfied as to the identity and competency of the TTP
in identification procedures,
as though they were to be conducting the assurance themselves
</p>
<spanclass="q">
<p>iang: this clause would probably meet DRC C.9.a:
<blockquote><u>"When the CA uses an external registration authority (RA), each RA is positively identified by CA personnel before being authorized to verify identities of subscribers and authorizations of individuals to represent organizational subscribers (see §A.2.v)."</u></blockquote>
For that reason, the above clause should be considered strongly,
and either discussed further in the Handbook, or include these
other Older suggestions:
<p>RA MUST authenticate the TTP to their satisfaction by:
</p>
<olstyle="list-style-type: lower-roman;">
<li>searching for their details in an appropriate, official public registry (eg government site, association registry, telephone book) </li>
<li>contacting the TTP using these details to verify their identity </li>
<li>verifying that the TTP is suitable in terms of meeting the requirements of this policy </li>
<li>verifying that the meeting did indeed take place and that the Assuree was adequately identified </li>
</ol>
</span><br/>
</i></blockquote>
</li><li>
The Assurer may contact the TTP, quoting Name and Verification Token.
</li><li>
On completion of the assurance, the Assurer
allocates standard full Assurance Points
(35 at time of writing)
to the Member.
Given the work involved, the Assurer should
strive to ensure that full points are allocated
by for example requesting any rework required.
<pclass="q">iang: this clause might be better off in the Handbook. Dominik+1</p>