hash
stringlengths 32
32
| doc_id
stringlengths 7
13
| section
stringlengths 3
121
| content
stringlengths 0
3.82M
|
---|---|---|---|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.3.5.1 Test assertions for EUMS Trusted Lists
|
TA id: TL_EUMS/TSL/TSPEXT/1 Normative source: ETSI TS 119 612 [1], clause 5.4.5. Target: European Union Member State Trusted List. Prerequisite: The Trusted List is generated by a Scheme Operator from an EU Member State. Predicate: The Critical attribute of each tsl:TSPInformationExtensions/Extension is set to value "false". Prescription level: mandatory Tag: EUMS Trusted List. It is out of the scope of the present document to define additional test assertions for testing contents of tsl:TSPInformationExtensions/Extension elements.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4 Testing ServiceInformation element
| |
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.1 Testing tsl:ServiceTypeIdentifier element
|
For testing the tsl:ServiceTypeIdentifier element the test assertions defined in clause 5.1.4.1 and the following test assertions shall apply: TA id: TL_EUMS/TSL/SVCTYPE/1 Normative source: ETSI TS 119 612 [1], clause 5.5.1. Target: European Union Member State Trusted List. Predicate: The value of this element is one of the following values: "http://uri.etsi.org/TrstSvc/Svctype/CA/QC" "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/OCSP/QC" "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/CRL/QC" "http://uri.etsi.org/TrstSvc/Svctype/TSA/QTST" "http://uri.etsi.org/TrstSvc/Svctype/EDS/Q" "http://uri.etsi.org/TrstSvc/Svctype/EDS/REM/Q" "http://uri.etsi.org/TrstSvc/Svctype/PSES/Q" "http://uri.etsi.org/TrstSvc/Svctype/QESValidation/Q" "http://uri.etsi.org/TrstSvc/Svctype/RemoteQSCDManagement/Q" Prescription level: permitted Tag: EUMS Trusted List. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 22 TA id: TL_EUMS/TSL/SVCTYPE/2 Normative source: ETSI TS 119 612 [1], clause 5.5.1. Target: European Union Member State Trusted List. Predicate: The value of this element is one of the following values: "http://uri.etsi.org/TrstSvc/Svctype/CA/PKC" "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/OCSP" "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/CRL" "http://uri.etsi.org/TrstSvc/Svctype/TSA" "http://uri.etsi.org/TrstSvc/Svctype/TSA/TSS-QC" "http://uri.etsi.org/TrstSvc/Svctype/TSA/TSS-AdESQCandQES" "http://uri.etsi.org/TrstSvc/Svctype/EDS" "http://uri.etsi.org/TrstSvc/Svctype/EDS/REM" "http://uri.etsi.org/TrstSvc/Svctype/PSES" "http://uri.etsi.org/TrstSvc/Svctype/AdESValidation" "http://uri.etsi.org/TrstSvc/Svctype/AdESGeneration" Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCTYPE/3 Normative source: ETSI TS 119 612 [1], clause 5.5.1. Target: European Union Member State Trusted List. Predicate: The value of this element is one of the following values: http://uri.etsi.org/TrstSvc/Svctype/RA http://uri.etsi.org/TrstSvc/Svctype/RA/nothavingPKIid http://uri.etsi.org/TrstSvc/Svctype/ACA http://uri.etsi.org/TrstSvc/Svctype/SignaturePolicyAuthority http://uri.etsi.org/TrstSvc/Svctype/Archiv http://uri.etsi.org/TrstSvc/Svctype/Archiv/nothavingPKIid http://uri.etsi.org/TrstSvc/Svctype/IdV http://uri.etsi.org/TrstSvc/Svctype/IdV/nothavingPKIid http://uri.etsi.org/TrstSvc/Svctype/KEscrow http://uri.etsi.org/TrstSvc/Svctype/KEscrow/nothavingPKIid http://uri.etsi.org/TrstSvc/Svctype/PPwd http://uri.etsi.org/TrstSvc/Svctype/PPwd/nothavingPKIid http://uri.etsi.org/TrstSvc/Svctype/TLIssuer http://uri.etsi.org/TrstSvc/Svctype/NationalRootCA-QC http://uri.etsi.org/TrstSvc/Svctype/unspecified Prescription level: permitted Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.2 Testing tsl:ServiceName element
|
For testing the tsl:ServiceName element the test assertions defined in clause 5.1.2 shall apply.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.3 Testing tsl:ServiceDigitalIdentity element
| |
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.3.1 Test assertions common to any tsl:ServiceDigitalIdentity element
|
TA id: TL_EUMS/TSL/SVCDIGID/COMM/1 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: No PKI technology is used. Predicate: There is only one tsl:DigitalId child element. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCDIGID/COMM/2 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: No PKI technology is used. Predicate: The content of the tsl:Digital child element is a tsl:Other child whose value is a valid URI Reference. Prescription level: mandatory Tag: EUMS Trusted List. NOTE: It is out of the scope of the present document to define test assertions for other possible values of tsl:Other element. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 23 TA id: TL_EUMS/TSL/SVCDIGID/COMM/3 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used. Predicate: The tsl:ServiceDigitalIdentity element contains one and only one tsl:DigitalId/ds:KeyInfo/ds:KeyValue element as specified in XMLDSIG [3]. Prescription level: permitted Tag: EUMS Trusted List. 5.4.3.2 Test assertions specific to tsl:ServiceDigitalIdentity child element of tsl:ServiceInformation element TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/1 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used. Predicate: The tsl:ServiceDigitalIdentity element contains one or more tsl:DigitalId children elements, each one with one tsl:X509Certificate child element (one or more tsl:DigitalId/tsl:X509Certificate elements), whose value is the base-64 encoding of one X509 DER- encoded certificate. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/2 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND the tsl:ServiceDigitalIdentity element contains more than one tsl:DigitalId/tsl:X509Certificate elements. Predicate: All the X509 certificates within the tsl:DigitalId/tsl:X509Certificate elements certify the same public key. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/3 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND the tsl:ServiceDigitalIdentity element contains more than one tsl:DigitalId/tsl:X509Certificate elements. Predicate: All the X509 certificates within the tsl:DigitalId/tsl:X509Certificate elements have the same subject names. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/4 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND there are one or more than one X509 certificates whose subject name fields satisfy the condition that their Organization attributes strictly match the value of the tsl:TSPName of the provider of the service. Predicate: The tsl:ServiceDigitalIdentity contains one or more tsl:DigitalId/tsl:X059Certificate each one encapsulating one of the certificates mentioned in the prerequisite. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/5 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND there is not any X509 certificate whose subject name field satisfies the condition that its Organization attributes strictly match the value of the tsl:TSPName of the provider of the service. Predicate: The tsl:ServiceDigitalIdentity contains one or more tsl:DigitalId/tsl:X059Certificate each one encapsulating one certificate that does not satisfy the second condition of the predicate. Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/6 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND there is not any X509 certificate whose subject name field satisfies the condition that its Organization attributes strictly match the value of the tsl:TSPName of the provider of the service. Predicate: The Organization attribute of each certificate encapsulated within tsl:DigitalId/tsl:X059Certificate elements is listed within the tsl:TSPTradeName element of the provider of the service. Prescription level: mandatory Tag: EUMS Trusted List. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 24 TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/7 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used. Predicate: The tsl:ServiceDigitalIdentity element contains one and only one tsl:DigitalId/tsl:X509SubjectName element whose value is a string representation of an X509 certificate subject name as specified in XMLDSIG [3], clauses 4.5.4 and 4.5.4.1. Prescription level: preferred Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/8 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND the tsl:ServiceDigitalIdentity element contains one tsl:DigitalId/tsl:X509SubjectName element. Predicate: The value of tsl:X509SubjectName child element is the string representation of the subject name of all the X509 certificates present within the tsl:DigitalId/tsl:X509Certificate elements, computed as specified in XMLDSIG [3], clauses 4.5.4 and 4.5.4.1. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/9 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND the tsl:ServiceDigitalIdentity element contains one tsl:DigitalId/ds:KeyInfo/ds:KeyValue element. Predicate: The value of the tsl:DigitalId/ds:KeyInfo/ds:KeyValue element represents the public key certified by all the X509 certificates present within the tsl:DigitalId/tsl:X509Certificate elements. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/10 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used. Predicate: The tsl:ServiceDigitalIdentity element contains one and only one tsl:DigitalId/tsl:X509SKI child element whose value is a X.509 certificate subject identifier extension. Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCINFO/SVCDIGID/11 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND the tsl:ServiceDigitalIdentity element contains one tsl:DigitalId/ds:KeyInfo/tsl:X509SKI element. Predicate: The value of the tsl:DigitalId/ds:KeyInfo/tsl:X509SKI element represents the public key certified by all the X509 certificates present within the tsl:DigitalId/tsl:X509Certificate elements. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCDIGID/12 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND two or more services have different values within their corresponding tsl:ServiceTypeIdentifier elements for which different supervision/accreditation systems apply. Predicate: The same public key identifies the two or more services mentioned in the prerequisite. Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCDIGID/13 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND it is not true that there are two or more services that have different values within their corresponding tsl:ServiceTypeIdentifier elements for which different supervision/accreditation systems apply. Predicate: The same public key appears within the tsl:ServiceInformation/tsl:ServiceDigitalIdentity elements corresponding to the two or more services mentioned in the prerequisite. Prescription level: mandatory Tag: EUMS Trusted List. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 25 TA id: TL_EUMS/TSL/SVCDIGID/14 Normative source: ETSI TS 119 612 [1], clause 5.5.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND it is not true that there are two or more services that have different values within their corresponding tsl:ServiceTypeIdentifier elements for which different supervision/accreditation systems apply. Predicate: The same public key appears within one and only tsl:ServiceInformation/tsl:ServiceDigitalIdentity element within the Trusted List. Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.4 Testing tsl:ServiceStatus element
| |
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.4.1 Introduction
|
For testing the tsl:ServiceStatus element the test assertions defined in clauses 5.1.4.1, 5.4.4.2 and 5.4.4.3 shall apply.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.4.2 Test assertions common to any tsl:ServiceStatus element
|
This clause defines test assertions that, apart from the ones defined in clause 5.1.4.1, are common to any tsl:ServiceStatus element present within the Trusted List. TA id: TL_EUMS/TSL/SVCSTAT/1 Normative source: ETSI TS 119 612 [1], clause 5.5.4. Target: European Union Member State Trusted List. Prerequisite: The value of the tsl:ServiceType element is one of the values permitted in test assertion TL_EUMS/TSL/SVCTYPE/1 Predicate: The value of this element is either "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/granted" or "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/withdrawn" Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCSTAT/2 Normative source: ETSI TS 119 612 [1], clause 5.5.4. Target: European Union Member State Trusted List. Prerequisite: The value of the tsl:ServiceType element is one of the values permitted in test assertions TL_EUMS/TSL/SVCTYPE/2 and TL_EUMS/TSL/SVCTYPE/3 Predicate: The value of this element is either "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/recognisedatnationallevel" or "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/deprecatedatnationallevel" Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.4.3 Test assertions specific to tsl:ServiceStatus child element of tsl:TSPService
|
This clause defines test assertions that are specific only to tsl:ServiceStatus elements that are children of tsl:TSPService elements. TA id: TL_EUMS/TSL/SVCSTAT/3 Normative source: ETSI TS 119 612 [1], clause 5.5.4. Target: European Union Member State Trusted List. Prerequisite: There exists the non empty tsl:ServiceHistory element. Predicate: The transition from the value of the tsl:ServiceStatus child element of the first tsl:ServiceHistoryInstance child element of tsl:ServiceHistory element, is one of the permitted in ETSI TS 119 612 1 clause 5.5.1 Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.5 Testing tsl:StatusStartingTime element
| |
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.5.1 Test assertions common to any tsl:StatusStartingTime element
|
TA id: TL_EUMS/TSL/SVCSTARTTIME/1 Normative source: ETSI TS 119 612 [1], clause 5.5.5. Target: European Union Member State Trusted List. Predicate: This element contains a Coordinated Universal Time (UTC) value. Prescription level: mandatory ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 26 Tag: EUMS Trusted List. 5.4.5.2 Test assertions specific tsl:StatusStartingTime child element of tsl:TSPService TA id: TL_EUMS/TSL/SVCSTARTTIME/2 Normative source: ETSI TS 119 612 [1], clause 5.5.5. Target: European Union Member State Trusted List. Prerequisite: There exists the non empty tsl:ServiceHistory element. Predicate: The value of this element is posterior than the value of the tsl:StatusStartingTime child element of the first tsl:ServiceHistoryInstance child of tsl:ServiceHistory element. Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.6 Testing tsl:SchemeServiceDefinitionURI element
|
For testing the tsl:SchemeServiceDefinitionURI element the test assertions defined in clause 5.1.4.4 shall apply.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.7 Testing tsl:ServiceSupplyPoints element
|
For each tsl:ServiceSupplyPoint child element of tsl:ServiceSupplyPoints element, the test assertions defined in clause 5.1.4.1 and the following test assertions shall apply: TA id: TL_EUMS/TSL/SVCSUPPT/1 Normative source: ETSI TS 119 612 [1], clause 5.5.7. Target: European Union Member State Trusted List. Predicate: The value of the attribute type is one of the values specified in test assertions TL_EUMS/TSL/SVCTYPE/1, TL_EUMS/TSL/SVCTYPE/2, and TL_EUMS/TSL/SVCTYPE/3. Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.8 Testing tsl:TSPServiceDefinitionURI element
|
For testing the tsl:TSPServiceDefinitionURI element the test assertions defined in clause 5.1.4.4 and the following test assertions shall apply: TA id: TL_EUMS/TSL/SVCDEFURI/1 Normative source: ETSI TS 119 612 [1], clause 5.5.8. Target: European Union Member State Trusted List. Prerequisite: The value of tsl:ServiceType element is http://uri.etsi.org/TrstSvc/Svctype/NationalRootCA-QC. Predicate: This element is present. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCDEFURI/2 Normative source: ETSI TS 119 612 [1], clause 5.5.8. Target: European Union Member State Trusted List. Prerequisite: The value of tsl:ServiceType element is not http://uri.etsi.org/TrstSvc/Svctype/NationalRootCA-QC. Predicate: This element is present. Prescription level: permitted Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.9 Testing tsl:ServiceInformationExtensions element
| |
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.9.1 Testing tsl:ExpiredCertsRevocationInfo element
|
For testing the tsl:ExpiredCertsRevocationInfo element the following test assertions shall apply: TA id: TL_EUMS/TSL/SIE/EXPCERTSREVINFO/1 Normative source: ETSI TS 119 612 [1], clause 5.5.9.1. Target: European Union Member State Trusted List. Prerequisite: The value of the tsl:ServiceType qualified by this extension is one of the following: "http://uri.etsi.org/TrstSvc/Svctype/CA/PKC" "http://uri.etsi.org/TrstSvc/Svctype/CA/QC" "http://uri.etsi.org/TrstSvc/Svctype/NationalRootCA-QC" ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 27 "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/OCSP" "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/OCSP/QC" "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/CRL" "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/CRL/QC" Predicate: The tsl:ExpiredCertsRevocationInfo extension is present. Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIE/EXPCERTSREVINFO/2 Normative source: ETSI TS 119 612 [1], clause 5.5.9.1. Target: European Union Member State Trusted List. Prerequisite: The value of the tsl:ServiceType qualified by this extension is one defined under an scheme (different than the one defined within ETSI TS 119 612 [1]) created by an organization, identifying a suitable service Predicate: The tsl:ExpiredCertsRevocationInfo extension is present. Prescription level: permitted Tag: EUMS Trusted List. NOTE: It is out of the scope of the present document identifying values for tsl:ServiceType elements mentioned in the prerequisite of test assertion TL_EUMS/TSL/SIE/EXPCERTSREVINFO/2. TA id: TL_EUMS/TSL/SIE/EXPCERTSREVINFO/3 Normative source: ETSI TS 119 612 [1], clause 5.5.9.1. Target: European Union Member State Trusted List. Predicate: Its Critical attribute is set to "false". Prescription level: permitted Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.9.2 Testing sie:Qualifications element
|
TA id: TL_EUMS/TSL/SIE/QUALS/1 Normative source: ETSI TS 119 612 [1], clause 5.5.9.2. Target: European Union Member State Trusted List. Prerequisite: The sie:Qualifications element is an extension of a service whose type is "CA/QC" Predicate: The value of each sie:Qualifications/Qualifiers/Qualifier is one of the following: "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCWithSSCD" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCNoSSCD" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCSSCDStatusAsInCert" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCWithQSCD" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCNoQSCD" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCQSCDStatusAsInCert" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCQSCDManagedOnBehalf" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForLegalPerson" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForESig" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForESeal" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForWSA" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/NotQualified" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCStatement" Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIE/QUALS/2 Normative source: ETSI TS 119 612 [1], clause 5.5.9.2.3. Target: European Union Member State Trusted List. Prerequisite: The sie:Qualifications element IS NOT an extension of a service whose type is "CA/QC" Predicate: The value of each sie:Qualifications/Qualifiers/Qualifier is none of the following: "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCWithSSCD" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCNoSSCD" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCSSCDStatusAsInCert" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCWithQSCD" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCNoQSCD" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCQSCDStatusAsInCert" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCQSCDManagedOnBehalf" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForLegalPerson" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForESig" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForESeal" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForWSA" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/NotQualified" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCStatement" Prescription level: mandatory Tag: EUMS Trusted List. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 28 For testing any sie:Qualifications/sie:CriteriaList/sie:PolicySet/sie:PolicyIdentifier element, the test assertions defined in clause A.4 of the present document and the following test assertions shall apply. TA id: TL_EUMS/TSL/SIE/POLSet/1 Normative source: [2] - clause 7.1.2. Target: European Union Member State Trusted List. Prerequisite: The policy is identified with an OID Predicate: The value of the attribute Qualifier of the xades:Identifier child element of sie:PolicyIdentifier is "OIDAsURN". Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIE/POLSet/2 Normative source: [2] – clause 7.1.2. Target: European Union Member State Trusted List. Prerequisite: The value of the attribute Qualifier of the xades:Identifier child element of sie:PolicyIdentifier is "OIDAsURN" Predicate: The value of the xades:Identifier child element of the sie:PolicyIdentifier element is an OID encoded within an URN as specified in IETF RFC 3061 [5]. Prescription level: mandatory Tag: EUMS Trusted List. For testing any sie:Qualifications/sie:CriteriaList/sie:otherCriteriaList/tslx:CertSubjectDNAttr ibute/tslx:AttributeOID element, the test assertions defined in clause A.4 of the present document and the following test assertions shall apply. TA id: TL_EUMS/TSL/SIE/CERTSUBDN/1 Normative source: [2] – clause 7.1.2. Target: European Union Member State Trusted List. Prerequisite: The policy is identified with an OID Predicate: The value of the attribute Qualifier of the xades:Identifier child element of tslx:AttributeOID is "OIDAsURN". Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIE/CERTSUBDN/2 Normative source: [2] – clause 7.1.2. Target: European Union Member State Trusted List. Prerequisite: The value of the attribute Qualifier of the xades:Identifier child element of tslx:AttributeOID is "OIDAsURN" Predicate: The value of the xades:Identifier child element of the tslx:AttributeOID element is an OID encoded within an URN as specified in IETF RFC 3061 [5]. Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.9.3 Testing tslx:TakenOverBy element
|
For testing the tslx:TakenOverBy/URI element the test assertions defined in clause 5.1.4.3 and the following test assertion shall apply: TA id: TL_EUMS/TSL/SIE/TKNOVER/1 Normative source: ETSI TS 119 612 [1], clause 5.5.9.3. Target: European Union Member State Trusted List. Predicate: The scheme and authority parts of the URI child are equal to the scheme and authority parts of one of the following URIs: the URI within the Electronic Address of the taking over TSP the TSP information URI of the taking over TSP the Scheme information URI of the Trusted List Scheme Operator Prescription level: preferred Tag: EUMS Trusted List. For testing the tslx:TakenOverBy/TSPName element the test assertions defined in clause 5.3.1 and the following test assertion shall apply: TA id: TL_EUMS/TSL/SIE/TKNOVER/2 Normative source: ETSI TS 119 612 [1], clause 5.5.9.3. Target: European Union Member State Trusted List. Predicate: The English name of the TSPName child is equal to the English name of one of the Trusted Service Providers within the Trusted List. Prescription level: mandatory Tag: EUMS Trusted List. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 29 For testing the tslx:TakenOverBy/SchemeOperatorName element the test assertions defined in clause 5.2.3.4 and the following test assertion shall apply: TA id: TL_EUMS/TSL/SIE/TKNOVER/3 Normative source: ETSI TS 119 612 [1], clause 5.5.9.3. Target: European Union Member State Trusted List. Predicate: The English name of the SchemeOperatorName child is equal to the English name of the Scheme Operator Name in the Scheme Information section of the Trusted List. Prescription level: mandatory Tag: EUMS Trusted List. For testing the tslx:TakenOverBy/sie:SchemeTerritory element the test assertions defined in clause 5.2.3.10 and the following test assertion shall apply: TA id: TL_EUMS/TSL/SIE/TKNOVER/4 Normative source: ETSI TS 119 612 [1], clause 5.5.9.3. Target: European Union Member State Trusted List. Predicate: The value of the SchemeTerritory child is equal to the value of the SchemeTerritory element in the Scheme Information section of the Trusted List. Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.4.9.4 Testing tsl:AdditionalServiceInformation element
|
For testing the tsl:AdditionalServiceInformation/URI element the test assertions defined in clause 5.1.4.3 and the following test assertion shall apply: TA id: TL_EUMS/TSL/SIE/ADDSIEINFO/1 Normative source: ETSI TS 119 612 [1], clause 5.5.9.4. Target: European Union Member State Trusted List. Predicate: The value of the URI child is equal to one of the following: "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/ForeSignatures" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/ForeSeals" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/ForWebSiteAuthentication" "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/RootCA-QC" Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIE/ADDSIEINFO/2 Normative source: ETSI TS 119 612 [1], clause D.4. Target: European Union Member State Trusted List. Prerrequisite: The service type is not "http://uri.etsi.org/TrstSvc/TrustedList/Svctype/CA/QC" Predicate: The value of the URI child is not "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/RootCA-QC". Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIE/ADDSIEINFO/3 Normative source: ETSI TS 119 612 [1], clause 5.5.9.4. Target: European Union Member State Trusted List. Predicate: The value of the URI child is equal to a registered URI to further qualify a Service type identifier, in order to further specify the service as being a component service of a trust service provider issuing QC. Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIE/ADDSIEINFO/4 Normative source: ETSI TS 119 612 [1], clause 5.5.9.4. Target: European Union Member State Trusted List. Predicate: The value of the URI child is equal to a URI indicating some nationally defined specific qualification for a supervised/accredited Trust Service Token provisioning service Prescription level: permitted Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.5 Testing tsl:ServiceHistory element
| |
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.5.1 Testing tsl:ServiceTypeIdentifier element
|
For testing the tsl:ServiceTypeIdentifier child element of tsl:ServiceHistory element, the test assertions defined in clause 5.4.1 shall apply. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 30
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.5.2 Testing tsl:ServiceName element
|
For testing the tsl:ServiceName child element of tsl:ServiceHistory element, the test assertions defined in clause 5.4.2 shall apply.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.5.3 Testing tsl:ServiceDigitalIdentity element
|
For testing the tsl:ServiceDigitalIdentity child element of tsl:ServiceHistory element, the test assertions defined in clause 5.4.3.1 and the following test assertions shall apply: TA id: TL_EUMS/TSL/SVCHIST/SDI/1 Normative source: ETSI TS 119 612 [1], clause 5.6.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used. Predicate: The tsl:ServiceDigitalIdentity element does not contain any tsl:DigitalId/tsl:X509Certificate element Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCHIST/SDI/2 Normative source: ETSI TS 119 612 [1], clause 5.6.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used. Predicate: The tsl:ServiceDigitalIdentity element contains one and only one tsl:DigitalId/tsl:X509SKI child element whose value is a X.509 certificate subject identifier extension. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCHIST/SDI/3 Normative source: ETSI TS 119 612 [1], clause 5.6.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used. Predicate: The value of the tsl:DigitalId/ds:KeyInfo/tsl:X509SKI element represents the public key certified by all the X509 certificates present within the tsl:TSPService/tsl:ServiceInformation/tsl:ServiceDigitalIdentity/tsl:DigitalId/tsl:X509Certificate elements such as the tsl:TSPService is the element that contains the tsl:ServiceHistory where the tsl:ServiceDigitalIdentity under test is present. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCHIST/SDI/4 Normative source: ETSI TS 119 612 [1], clause 5.6.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used. Predicate: The tsl:ServiceDigitalIdentity element contains one and only one tsl:DigitalId/tsl:X509SubjectName element whose value is a string representation of an X509 certificate subject name as specified in XMLDSIG [3], clauses 4.5.4 and 4.5.4.1. Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCHIST/SDI/5 Normative source: ETSI TS 119 612 [1], clause 5.6.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND the tsl:ServiceDigitalIdentity element contains one tsl:DigitalId/tsl:X509SubjectName element. Predicate: The value of tsl:X509SubjectName child element is the string representation of the subject name of all the X509 certificates present within the tsl:TSPService/tsl:ServiceInformation/tsl:ServiceDigitalIdentity/tsl:DigitalId/tsl:X509Certificate elements such as the tsl:TSPService is the element that contains the tsl:ServiceHistory where the tsl:ServiceDigitalIdentity under test is present, computed as specified in XMLDSIG [3], clauses 4.5.4 and 4.5.4.1. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCHIST/SDI/6 Normative source: ETSI TS 119 612 [1], clause 5.6.3. Target: European Union Member State Trusted List. Prerequisite: PKI technology is used AND the tsl:ServiceDigitalIdentity element contains one tsl:DigitalId/ds:KeyInfo/ds:KeyValue element. Predicate: The value of the tsl:DigitalId/ds:KeyInfo/ds:KeyValue element represents the public key certified by all the X509 certificates present within the tsl:TSPService/tsl:ServiceInformation/tsl:ServiceDigitalIdentity/tsl:DigitalId/tsl:X509Certificate elements such as the tsl:TSPService is the element that contains the tsl:ServiceHistory where the tsl:ServiceDigitalIdentity under test is present. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 31 Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.5.4 Testing tsl:ServiceStatus element
|
For testing the tsl:ServiceStatus child element of tsl:ServiceHistory element, the test assertions defined in clause 5.4.4.2 and the following test assertions shall apply: TA id: TL_EUMS/TSL/SVCHIST/SVCSTAT/1 Normative source: ETSI TS 119 612 [1], clause 5.6.4. Target: European Union Member State Trusted List. Prerequisite: There exists a previous tsl:ServiceHistoryInstance element to the one that is the parent of the tsl:ServiceStatus element under test. Predicate: The transition from the value of the tsl:ServiceStatus child element within the previous tsl:ServiceHistoryInstance element in the historical section of the service, to the value of this element is one of the permitted in ETSI TS 119 612 [1], clause 5.5.1. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCHIST/SVCSTAT/2 Normative source: ETSI TS 119 612 [1], clause D.5.6. Target: European Union Member State Trusted List. Predicate: The possible values for tsl:ServiceStatus child element previous to any new value specified in ETSI TS 119 612 [1], clause 5.6.4, is one of the following: "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/undersupervision" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/supervisionincessation" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/supervisionceased" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/supervisionrevoked" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/accredited" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/accreditationceased" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/accreditationrevoked" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/granted" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/withdrawn" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/setbynationallaw" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/recognisedatnationallevel" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/deprecatedbynationallaw" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/deprecatedatnationallevel" Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SVCHIST/SVCSTAT/3 Normative source: ETSI TS 119 612 [1], clause D.5.6. Target: European Union Member State Trusted List. Prerequisite: The value of the tsl:ServiceType is not http://uri.etsi.org/TrstSvc/Svctype/CA/QC and "The value of the tsl:ServiceStatus is one of the following: "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/setbynationallaw" "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/deprecatedbynationallaw" Predicate: The value of this element is neither "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/setbynationallaw" nor "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/deprecatedbynationallaw" Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.5.5 Testing tsl:StatusStartingTime element
|
For testing the tsl:StatusStartingTime child element of tsl:ServiceHistory element, the test assertions defined in clause 5.4.5.1 and the following test assertions shall apply. TA id: TL_EUMS/TSL/SVCHIST/SVCSTARTTIME/1 Normative source: ETSI TS 119 612 [1], clause 5.5.5. Target: European Union Member State Trusted List. Prerequisite: There exists a previous tsl:ServiceHistoryInstance element to the one that is the parent of the tsl:StatusStartingTime element under test. Predicate: The value of this element is posterior than the value of the tsl:StatusStartingTime child element of the previous tsl:ServiceHistoryInstance child within the tsl:ServiceHistory element. Prescription level: mandatory Tag: EUMS Trusted List.
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.5.6 Testing tsl:ServiceInformationExtensions element
|
For testing the tsl:ServiceInformationExtensions child element of tsl:ServiceHistory element, the test assertions defined in clause 5.4.9 shall apply. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 32
|
f61ada9ae38a781d63da39fc9ea616a8
|
119 614-1
|
5.6 Testing ds:Signature element
|
For testing the ds:Signature the following test assertions shall apply. Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/1 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The Trusted List signature is a XAdES-BES or a XAdES-EPES signature as specified in ETSI TS 101 903 [2]. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/2 Normative source: ETSI TS 119 612 [1], clause B.1.0. Target: European Union Member State Trusted List. Predicate: The signature of a Trusted List is an enveloped signature. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/3 Normative source: ETSI TS 119 612 [1], clause B.1.1. Target: European Union Member State Trusted List. Predicate: The algorithms for generating the signature of a Trusted List are the following ones: the algorithms supported by XML Signature W3C Recommendation [3], the Elliptic Curve Digital Signature Algorithm (ECDSA) as defined in [9], and the SHA-2 algorithm as defined in [10]. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/4 Normative source: ETSI TS 119 612 [1], clause B.1.0. Target: European Union Member State Trusted List. Predicate: The value of the attribute Algorithm of the ds:CanonicalizationMethod child element of the ds:SignedInfo element of the Trusted list signature is set to "http://www.w3.org/2001/10/xml- exc-c14n#". Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/5 Normative source: ETSI TS 119 612 [1], clause B.1.0. Target: European Union Member State Trusted List. Predicate: The ds:SignedInfo element of the Trusted list signature contains a ds:Reference element with the URI attribute set to a value referencing the tsl:TrustServiceStatusList element enveloping the digital signature itself. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/6 Normative source: ETSI TS 119 612 [1], clause B.1.0. Target: European Union Member State Trusted List. Predicate: The ds:SignedInfo element of the Trusted list signature contains other ds:Reference elements in addition to the one that references the tsl:TrustServiceStatusList element enveloping the digital signature itself. Prescription level: permitted Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/7 Normative source: ETSI TS 119 612 [1], clause B.1.0. Target: European Union Member State Trusted List. Predicate: The ds:Reference element with the URI attribute set to a value referencing the tsl:TrustServiceStatusList element enveloping the digital signature itself contains one ds:Transforms element. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/8 Normative source: ETSI TS 119 612 [1], clause B.1.0. Target: European Union Member State Trusted List. Predicate: The ds:Transforms child element of the ds:Reference element with the URI attribute set to a value referencing the tsl:TrustServiceStatusList element enveloping the digital signature itself contains two ds:Transform elements. Prescription level: mandatory Tag: EUMS Trusted List. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 33 TA id: TL_EUMS/TSL/SIG/9 Normative source: ETSI TS 119 612 [1], clause B.1.0. Target: European Union Member State Trusted List. Predicate: The value of the attribute Algorithm of one of the first ds:Transform child element of the ds:Transforms child element of the ds:Reference element with the URI attribute set to a value referencing the tsl:TrustServiceStatusList element enveloping the digital signature itself is set to "http://www.w3.org/2000/09/xmldsig#enveloped-signature". Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/10 Normative source: ETSI TS 119 612 [1], clause B.1.0. Target: European Union Member State Trusted List. Predicate: The value of the attribute Algorithm of the second ds:Transform child element of the ds:Transforms child element of the ds:Reference element with the URI attribute set to a value referencing the tsl:TrustServiceStatusList element enveloping the digital signature itself is set to "http://www.w3.org/2001/10/xml-exc-c14n#". Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/11 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The issuer of the signing certificate of the Trusted List signature is the Trusted List Scheme Operator or a trusted service provider listed within the Trusted List or within another Trusted List that is part from the same community. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/12 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The Country Code attribute of the subject name field of the signing certificate of the Trusted List signature is equal to the value of tsl:SchemeInformation/SchemeTerritory element. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/13 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The Organization attribute of the subject name field of the signing certificate of the Trusted List signature is equal to the value of one of the tsl:SchemeInformation/SchemeOperatorName/Name elements. Prescription level: mandatory Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/14 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The Organization attribute of the subject name field of the signing certificate of the Trusted List signature is equal to the value of the UK English tsl:SchemeInformation/SchemeOperatorName/Name element. Prescription level: preferred Tag: EUMS Trusted List. Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/15 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The Organization attribute of the subject name field of the signing certificate of the Trusted List signature is equal to the value of a local language (transliterated to Latin script) tsl:SchemeInformation/SchemeOperatorName/Name element. Prescription level: permitted Tag: EUMS Trusted List. Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/16 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The signing certificate of the Trusted List signature contains the KeyUsage certificate extension. Prescription level: mandatory Tag: EUMS Trusted List. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 34 Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/17 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The KeyUsage extension of the signing certificate of the Trusted List signature is set to digitalSignature and/or to nonRepudiation value(s). Prescription level: mandatory Tag: EUMS Trusted List. Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/18 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The signing certificate of the Trusted List signature contains the ExtendedKeyUsage certificate extension. Prescription level: mandatory Tag: EUMS Trusted List. Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/19 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The ExtendedKeyUsage extension of the signing certificate of the Trusted List signature is set to the following value: id-tsl-kp-tslSigning ({ itu-t(0) identified-organization(4) etsi(0) tsl-specification (2231) id-tsl kp(3) }) Prescription level: mandatory Tag: EUMS Trusted List. Tag: EUMS Trusted List. TA id: TL_EUMS/TSL/SIG/20 Normative source: ETSI TS 119 612 [1], clause 5.7.1. Target: European Union Member State Trusted List. Predicate: The signing certificate of the Trusted List signature contains the SubjectKeyIdentifier certificate extension. Prescription level: mandatory Tag: EUMS Trusted List. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 35 Annex A (normative): Test assertions derived from XML Schema A.1 Introduction This annex specifies test assertions focussed on testing the structure of the elements specified by ETSI TS 119 612 [1] according to its XML Schema. The following notation is used throughout this annex for specifying the inner structure of instances of XML types defined by ETSI TS 119 612 [1] XML Schema: • Entities specifying the inner structure of instances of XML types may be elements or attributes. • Elements are identified by the corresponding namespace prefix and name. Attributes are identified by their names if they are not defined within any namespace or by the namespace prefix and name if they are defined within a certain namespace. Example: Id. • A list of entities separated by ',' characters represent an ordered list. • (): represents a group of ordered entities. Internally, the entities order is preserved. • Modifiers: particles that modify certain aspects of the entities or groups they apply to: - ?: When applied to one entity means that there may appear 0 or 1 instances of that entity. When applied to a group means that there may appear 0 or 1 instances of that group. - +: When applied to one entity means that there shall appear 1 or more instances of that entity. When applied to a group means that there shall appear 1 or more instances of that group. - *: When applied to one entity means that there may appear 0, 1, or more instances of that entity. When applied to a group means that there may appear 0, 1, or more instances of that group. - noOrder(): this modifier may only be applied to a group of entities. When this occurs the entities within the group may appear in any order within the specified XML type instance. - choice(): this modifier may only be applied to a group of entities. When this occurs only one of the entities of the group may appear. A.2 Testing auxiliary types contents A.2.1 Introduction ETSI TS 119 612 [1] defines a number of auxiliary types that its XML Schema reuses for a number of elements of the XML representation of a Trusted List. The present clause defines test assertions directly derived from the XML Schema for these auxiliary types. A.2.2 Testing tsl:NonEmptyNormalizedString instances This clause defines test assertions for any element derived from or containing children instances of tsl:NonEmptyNormalizedString type. TA id: TL_SCH/NEMPTYNSTR/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:NonEmptyNormalizedString type has a non-empty value Prescription level: mandatory Tag: Trusted Lists ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 36 TA id: TL_SCH/NEMPTYNSTR/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:NonEmptyNormalizedString type does not have any attribute Prescription level: mandatory Tag: Trusted Lists A.2.3 Testing tsl:NonEmptyString instances This clause defines test assertions for any element derived from or containing children instances of tsl:NonEmptyStringType type. TA id: TL_SCH/NEMPTYSTR/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:NonEmptyString type has a non-empty value Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/NEMPTYSTR/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:NonEmptyNormalizedString type does not have any attribute Prescription level: mandatory Tag: Trusted Lists A.2.4 Testing tsl:MultiLangStringType instances This clause defines test assertions for any element derived from or containing children instances of tsl:MultiLangStringType type. For testing any instance of tsl:MultiLangStringType type the test assertions defined in clause A.2.3 and the following test assertions shall apply: TA id: TL_SCH/MULTILANGSTR/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The set of attributes (leaving apart the attributes declaring namespaces) of one instance of tsl:MultiLangStringType is as follows: lang Prescription level: mandatory Tag: Trusted Lists A.2.5 Testing tsl:MultiLangNormStringType instances This clause defines test assertions for any element derived from or containing children instances of tsl:MultiLangNormStringType type. For testing any instance of tsl:MultiLangNormStringType type the test assertions defined in clause A.2.3 and the following test assertions shall apply: TA id: TL_SCH/MULTILANGNORMSTR/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The set of attributes (leaving apart the attributes declaring namespaces) of one instance of tsl:MultiLangNormStringType is as follows: lang Prescription level: mandatory Tag: Trusted Lists A.2.6 Testing tsl:InternationalNamesType instances For testing any instance of tsl:InternationalNamesType type the following test assertions shall apply: TA id: TL_SCH/INTNAMES/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:InternationalNamesType type in terms of its children is as follows: tsl:Name+. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 37 Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/INTNAMES/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:InternationalNamesType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists For testing any tsl:Name child element of an instance of tsl:InternationalNamesType the test assertions defined in clause A.2.5 shall apply. A.2.7 Testing tsl:NonEmptyURIType instances This clause defines test assertions for any element derived from or containing children instances of tsl:NonEmptyURIType type. TA id: TL_SCH/NEMPTYURI/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:NonEmptyURIType type has a non-empty value Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/NEMPTYURI/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The value of the attribute type of an instance of tsl:NonEmptyURIType type is a valid URI Reference. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/NEMPTYURI/3 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:NonEmptyURIType type does not have any attribute Prescription level: mandatory Tag: Trusted Lists A.2.8 Testing tsl:NonEmptyURIListType instances This clause defines test assertions for any element derived from or containing children instances of tsl:NonEmptyURIListType type. TA id: TL_SCH/NEMPTYURILIST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance tsl:NonEmptyURIListType is as follows: tsl:URI+ Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/NEMPTYURILIST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:NonEmptyURIListType type does not have any attribute Prescription level: mandatory Tag: Trusted Lists Each tsl:URI child is an instance of tsl:NonEmptyURIType type. For testing the structure of each tsl:URI child the test assertions defined in clause A.2.7 shall apply. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 38 A.2.9 Testing tsl:NonEmptyMultiLangURIType instances This clause defines test assertions for any element derived from or containing children instances of tsl:NonEmptyMultiLangURIType type. For testing the structure of an instance of tsl:NonEmptyMultiLangURIType type the following test assertions shall apply: TA id: TL_SCH/NEMPTYMULTILANGURI/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:NonEmptyMultiLangURIType type has a non-empty value Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/NEMPTYMULTILANGURI/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The value of the attribute type of an instance of tsl:NonEmptyMultiLangURIType type is a valid URI Reference. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/NEMPTYMULTILANGURI/3 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The set of attributes (leaving apart the attributes declaring namespaces) of one instance of tsl:NonEmptyMultiLangURIType is as follows: lang Prescription level: mandatory Tag: Trusted Lists A.2.10 Testing tsl:NonEmptyMultiLangURIListType instances This clause defines test assertions for any element derived from or containing children instances of tsl:NonEmptyMultiLangURIListType type. For testing the structure of an instance of tsl:NonEmptyMultiLangURIListType type the following test assertions shall apply: TA id: TL_SCH/NEMPTYMULTILANGURILIST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance tsl:NonEmptyMultiLangURIListType is as follows: tsl:URI+ Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/NEMPTYURILIST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:NonEmptyMultiLangURIListType type does not have any attribute Prescription level: mandatory Tag: Trusted Lists Each tsl:URI child is an instance of tsl:NonEmptyMultiLangURIType type. For testing the structure of each tsl:URI child the test assertions defined in clause A.2.9 shall apply. A.2.11 Testing tsl:AttributedNonEmptyURIType instances For testing the structure of instances of tsl:AttributedNonEmptyURIType type the following test assertions shall apply: TA id: TL_SCH/ATTNEMPTYURI/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:AttributedNonEmptyURI type has a non-empty value Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/ATTNEMPTYURI/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 39 Predicate: The set of attributes (leaving apart the attributes declaring namespaces) of one instance of tsl:AttributedNonEmptyURI is as follows: type Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/NEMPTYURI/3 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The value of an instance of tsl:NonEmptyURIType type is a valid URI Reference. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/NEMPTYURI/4 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The value of the attribute type of an instance of tsl:NonEmptyURIType type is a valid URI Reference. Prescription level: mandatory Tag: Trusted Lists A.2.12 Testing tsl:AddressType instances A.2.12.1 Testing structure TA id: TL_SCH/ADDR/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:AddressType type in terms of its children is as follows: tsl:PostalAddresses, tsl:ElectronicAddress. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/INTNAMES/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:AddressType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists For testing the structure of tsl:PostalAddresses element the test assertions of clause A.2.12.2 shall apply. For testing the structure of tsl:ElectronicAdress element the test assertions of clause A.2.12.3 shall apply. A.2.12.2 Testing tsl: PostalAddressListType instances A.2.12.2.1 Testing tsl:PostalAddressListType instances TA id: TL_SCH/POSTADDRLIST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:PostalAddressListType in terms of its children is as follows: tsl:PostalAddress+. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/POSTADDRLIST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:PostalAddressListType does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists For testing the structure of tsl:PostalAddress element the test assertions of clause A.2.12.2.2 shall apply. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 40 A.2.12.2.2 Testing tsl:PostalAddressType instances TA id: TL_SCH/POSTADDR/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:PostalAddressType in terms of its children is as follows: tsl:StreetAddress, tsl:Locality, tsl:StateOrProvince?, tsl:PostalCode?, tsl:CountryName. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/POSTADDR/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The set of attributes (leaving apart the attributes declaring namespaces) of one instance of tsl:PostalAddressType is as follows: lang Prescription level: mandatory Tag: Trusted Lists The elements tsl:StreetAddress, tsl:Locality, tsl:StateOrProvince, tsl:PostalCode, and tsl:CountryName are instances of tsl:NonEmptyString type. For testing the structure of each of them the test assertions defined in clause A.2.3 shall apply. A.2.12.3 Testing tsl: ElectronicAddressType instances TA id: TL_SCH/ELADDR/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:ElectronicAddressType in terms of its children is as follows: tsl:URI+. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/ELADDR/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:ElectronicAddressType does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:URI children are instances of tsl:NonEmptyMultiLangURIType. For testing the structure of each tsl:URI child the test assertions defined in clause A.2.9 shall apply. A.2.13 Testing tsl:ExtensionType instances TA id: TL_SCH/EXT/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:ExtensionType contains the boolean attribute Critical Prescription level: mandatory Tag: Trusted Lists The test assertions for testing the structure of the different extensions specified by ETSI TS 119 612 [1] will be defined in the clauses where these extensions are addressed. A.2.14 Testing tsl:ExtensionsListType instances TA id: TL_SCH/EXTSLIST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:ExtensionsListType in terms of its children is as follows: tsl:Extension+. Prescription level: mandatory Tag: Trusted Lists ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 41 TA id: TL_SCH/EXTSLIST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:ExtensionsListType does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists A.3 Testing Trusted List structure A.3.1 Testing tsl:TrustServiceStatusList element TA id: TL_SCH/TL/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of the element tsl:TrustServiceStatusList in terms of its children is as follows: tsl:SchemeInformation, tsl:TrustServiceProviderList?, ds:Signature?. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/TL/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The set of attributes (leaving apart the attributes declaring namespaces) of the element tsl:TrustServiceStatusList is as follows: noOrder(TSLTag, Id?) Prescription level: mandatory Tag: Trusted Lists A.3.2 Testing tsl:SchemeInformation element TA id: TL_SCH/SCHI/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of the element tsl:SchemeInformation in terms of its children is as follows: tsl:TSLVersionIdentifier, tsl:TSLSequenceNumber, tsl:TSLType, tsl:SchemeOperatorName, tsl:SchemeOperatorAddress, tsl:SchemeName, tsl:SchemeInformationURI, tsl:StatusDeterminationApproach, tsl:SchemeTypeCommunityRules?, tsl:SchemeTerritory?, tsl:PolicyOrLegalNotice?, tsl:HistoricalInformationPeriod, tsl:PointersToOtherTSL?, tsl:ListIssueDateTime, tsl:NextUpdate, tsl:DistributionPoints?, tsl:SchemeExtensions?. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/SCHI/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The element tsl:SchemeInformation does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:TSLType child is an instance of tsl:NonEmptyURIType. For testing the structure of each tsl:TSLType child the test assertions defined in clause A.2.7 shall apply. The tsl:SchemeOperatorName and tsl:SchemeName children are instances of tsl:InternationalNamesType. For testing the structure of each tsl:SchemeOperatorName or tsl:SchemeName child the test assertions defined in clause A.2.6 shall apply. The tsl:SchemeOperatorAddress child is an instance of tsl:AddressType. For testing the structure of each tsl:SchemeOperatorAddress child the test assertions defined in clause A.2.12 shall apply. The tsl:SchemeInformationURI child is an instance of tsl:NonEmptyMultiLangURIListType. For testing the structure of each tsl:SchemeInformationURI child the test assertions defined in clause A.2.10 shall apply. The tsl:StatusDeterminationApproach child is an instance of tsl:NonEmptyURIType. For testing the structure of each tsl:StatusDeterminationApproach child the test assertions defined in clause A.2.7 shall apply. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 42 The tsl:SchemeTypeCommunityRules child is an instance of tsl:NonEmptyMultiLangURIListType. For testing the structure of each tsl:SchemeTypeCommunityRules child the test assertions defined in clause A.2.10 shall apply. The tsl:PolicyOrLegalNotice child is an instance of tsl:PolicyOrLegalNoticeType. For testing the structure of each tsl:PolicyOrLegalNotice child the test assertions defined in clause A.3.3 shall apply. The tsl:PointersToOtherTSL child is an instance of tsl:OtherTSLPointersType. For testing the structure of each tsl:PointersToOtherTSL child the test assertions defined in clause A.3.4 shall apply The tsl:DistributionPoints child is an instance of tsl:NonEmptyURIListType. For testing the structure of each tsl:DistributionPoints child the test assertions defined in clause A.2.8 shall apply. A.3.3 Testing tsl:PolicyOrLegalNoticeType type TA id: TL_SCH/POLLEGNOT/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:PolicyOrLegalNoticeType type in terms of its children is as follows: tsl:Policy+, tsl:LegalNotice+. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/POLLEGNOT/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:PolicyOrLegalNoticeType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:Policy child is an instance of tsl:NonEmptyMultiLangURIType. For testing the structure of each tsl:Policy child the test assertions defined in clause A.2.9 shall apply. The tsl:LegalNotice child is an instance of tsl:MultiLangStringType. For testing the structure of each tsl:LegalNotice child the test assertions defined in clause A.2.4 shall apply. A.3.4 Testing tsl:OtherTSLPointersType type TA id: TL_SCH/PTR2TLS/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:OtherTSLPointerTypetype in terms of its children is as follows: ServiceDigitalIdentities?, tsl:TSLLocation, tsl:AdditionalInformation?. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/PTR2TLS/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:OtherTSLPointerType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:TSLLocation child is an instance of tsl:NonEmptyURIType type. For testing the structure of each tsl:TSLLocation child the test assertions defined in clause A.2.7 shall apply. The tsl:ServiceDigitalIdentities child is an instance of tsl:ServiceDigitalIdentityListType type. For testing the structure of each tsl:ServiceDigitalIdentities child the test assertions defined in clause A.3.5 shall apply. The tsl:AdditionalInformation child is an instance of tsl:AdditionalInformationType type. For testing the structure of each tsl:TSLLocation child the test assertions defined in clause A.3.8 shall apply. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 43 A.3.5 Testing tsl:ServiceDigitalIdentityListType type TA id: TL_SCH/SVCDIGIDLIST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:ServiceDigitalIdentityListType in terms of its children is as follows: ServiceDigitalIdentity+. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/SVCDIGIDLIST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:ServiceDigitalIdentityListType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:ServiceDigitalIdentity child is an instance of tsl:DigitalIdentityListType type. For testing the structure of each tsl:ServiceDigitalIdentity child the test assertions defined in clause A.3.6 shall apply. A.3.6 Testing tsl:DigitalIdentityListType type TA id: TL_SCH/DIGIDLIST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:DigitalIdentityListType in terms of its children is as follows: DigitalId+. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/DIGIDLIST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:DigitalIdentityListType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:DigitalId child is an instance of tsl:DigitalIdentityType type. For testing the structure of each tsl:DigitalId child the test assertions defined in clause A.3.7 shall apply. A.3.7 Testing tsl:DigitalIdentityType type TA id: TL_SCH/DIGID/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:DigitalIdentityType in terms of its children is as follows: tsl:X509Certificate | tsl:X509SubjectName | ds:KeyValue | tsl:X509SKI | tsl:Other. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/DIGID/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:DigitalIdentityType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists NOTE: The contents of tsl:Other child have been left open. It is out of the scope of the present document to specify any conformance assertion for this child element. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 44 A.3.8 Testing tsl:AdditionalInformationType type TA id: TL_SCH/ADDINFO/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:AdditionalInformationType in terms of its children is as follows: tsl:TextualInformation, tsl:OtherInformation. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/ADDINFO/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:AdditionalInformationType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists NOTE: The contents of tsl:OtherInformation child have been left open. It is out of the scope of the present document to specify any conformance assertion for this child element. A.3.9 Testing tsl:TrustServiceProviderList TA id: TL_SCH/TSPLIST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of the element tsl:TrustServiceProviderList in terms of its children is as follows: tsl:TrustServiceProvider+. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/TSPLIST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The element tsl:TrustServiceProviderList does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:TrustServiceProvider child is an instance of tsl:TSPType type. For testing the structure of each tsl:TrustServiceProvider child the test assertions defined in clause A.3.10 shall apply. A.3.10 Testing tsl:TSPType type TA id: TL_SCH/TSP/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:TSPType type in terms of its children is as follows: tsl:TSPInformation, tsl:TSPServices. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/TSP/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:TSPType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:TSPInformation child is an instance of tsl:TSPInformationType type. For testing the structure of each tsl:TSPInformation child the test assertions defined in clause A.3.11 shall apply. The tsl:TSPServices child is an instance of tsl:TSPServicesListType type. For testing the structure of each tsl:TSPServices child the test assertions defined in clause A.3.12 shall apply. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 45 A.3.11 Testing tsl:TSPInformationType TA id: TL_SCH/TSPINFO/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:TSPInformationType type in terms of its children is as follows: tsl:TSPName, tsl:TSPTradeName, tsl:TSPAddress, tsl:TSPInformationURI, tsl:TSPInformationExtensions. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/TSPINFO/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:TSPInformationType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:TSPName and tsl:TSPTradeName children are instances of tsl:InternationalNamesType. For testing the structure of each tsl:TSPName or tsl:TSPTradeName child the test assertions defined in clause A.2.6 shall apply. The tsl:TSPAddress child is an instance of tsl:AddressType. For testing the structure of each tsl:TSPAddress child the test assertions defined in clause A.2.12 shall apply. The tsl:TSPInformationURI child is an instance of tsl:NonEmptyMultiLangURIListType. For testing the structure of each tsl:TSPInformationURI child the test assertions defined in clause A.2.10 shall apply. A.3.12 Testing tsl:TSPServicesListType TA id: TL_SCH/SVCSLIST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:TSPServicesListType type in terms of its children is as follows: tsl:TSPService+. Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/SVCSLIST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:TSPServicesListType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:TSPService child is an instance of tsl:TSPServiceType. For testing the structure of each tsl:TSPService child the test assertions defined in clause A.3.13 shall apply. A.3.13 Testing tsl:TSPServiceType TA id: TL_SCH/SVC/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:TSPServiceType type in terms of its children is as follows: tsl:ServiceInformation, tsl:ServiceHistory? Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/SVC/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:TSPServiceType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 46 The tsl:ServiceInformation child is an instance of tsl:TSPServiceInformationType type. For testing the structure of each tsl:ServiceInformation child the test assertions defined in clause A.3.14 shall apply. The tsl:ServiceHistory child is an instance of tsl:ServiceHistoryType type. For testing the structure of each tsl:ServiceHistory child the test assertions defined in clause A.3.16 shall apply. A.3.14 Testing tsl:TSPServiceInformationType TA id: TL_SCH/SVCINFO/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:TSPServiceInformationType type in terms of its children is as follows: tsl:ServiceTypeIdentifier, tsl:ServiceName, tsl:ServiceDigitalIdentity, tsl:ServiceStatus, tsl:StatusStartingTime, tsl:SchemeServiceDefinitionURI?, tsl:ServiceSupplyPoints?, TSPSServiceDefinitionURI?, tsl:ServiceInformationExtensions? Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/SVCINFO/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:TSPServiceInformationType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:ServiceTypeIdentifier child is an instance of tsl:NonEmptyURIType. For testing the structure of each tsl:ServiceTypeIdentifier child the test assertions defined in clause A.2.7 shall apply. The tsl:ServiceName child is an instance of tsl:InternationalNamesType. For testing the structure of each tsl:ServiceName child the test assertions defined in clause A.2.6 shall apply. The tsl:ServiceDigitalIdentity child is an instance of tsl: DigitalIdentityListType type. For testing the structure of each tsl:ServiceDigitalIdentity child the test assertions defined in clause A.3.6 shall apply. The tsl:ServiceStatus child is an instance of tsl:NonEmptyURIType. For testing the structure of each tsl:ServiceStatus child the test assertions defined in clause A.2.7 shall apply. The tsl:SchemeServiceDefinitionURI child is an instance of tsl:NonEmptyMultiLangURIListType. For testing the structure of each tsl:SchemeServiceDefinitionURI child the test assertions defined in clause A.2.10 shall apply. The tsl:ServiceSupplyPoints child is an instance of tsl:ServiceSupplyPointsType type. For testing the structure of each tsl:ServiceSupplyPoints child the test assertions defined in clause A.2.10 shall apply. The tsl:TSPServiceDefinitionURI child is an instance of tsl:NonEmptyMultiLangURIListType. For testing the structure of each tsl:TSPServiceDefinitionURI child the test assertions defined in clause A.3.15 shall apply. A.3.15 Testing tsl:ServiceSupplyPointsType TA id: TL_SCH/SVCSUPPTS/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:ServiceSupplyPointsType type in terms of its children is as follows: tsl:ServiceSupplyPoint+ Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/SVCSUPPTS/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:ServiceSupplyPointsType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 47 Tag: Trusted Lists The tsl:ServiceSupplyPoint child is an instance of tsl:AttributedNonEmptyURIType. For testing the structure of each tsl:ServiceSupplyPoint child the test assertions defined in clause A.2.11 shall apply. A.3.16 Testing tsl:ServiceHistoryType TA id: TL_SCH/SVCHIST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:ServiceHistoryType type in terms of its children is as follows: tsl:ServiceHistoryInstance+ Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/SVCHIST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:ServiceHistoryType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:ServiceHistoryInstance child is an instance of tsl:ServiceHistoryInstanceType type. For testing the structure of each tsl:ServiceHistoryInstance child the test assertions defined in clause A.3.17 shall apply. A.3.17 Testing tsl:ServiceHistoryInstanceType TA id: TL_SCH/SVCHISTINST/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:ServiceHistoryInstanceType type in terms of its children is as follows: tsl:ServiceTypeIdentifier, tsl:ServiceName, tsl:ServiceDigitalIdentity, tsl:ServiceStatus, tsl:StatusStartingTime, tsl:ServiceInformationExtensions? Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/HISTINST/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:ServiceHistoryInstanceType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:ServiceTypeIdentifier child is an instance of tsl:NonEmptyURIType. For testing the structure of each tsl:ServiceTypeIdentifier child the test assertions defined in clause A.2.7 shall apply. The tsl:ServiceName child is an instance of tsl:InternationalNamesType. For testing the structure of each tsl:ServiceName child the test assertions defined in clause A.2.6 shall apply. The tsl:ServiceDigitalIdentity child is an instance of tsl: DigitalIdentityListType type. For testing the structure of each tsl:ServiceDigitalIdentity child the test assertions defined in clause A.3.6 shall apply. The tsl:ServiceStatus child is an instance of tsl:NonEmptyURIType. For testing the structure of each tsl:ServiceStatus child the test assertions defined in clause A.2.7 shall apply. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 48 A.3.18 Testing Extensions A.3.18.1 Testing tsl:AdditionalServiceInformationType type TA id: TL_SCH/EXT/ADDSIE/1 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tsl:AdditionalServiceInformationType type in terms of its children is as follows: tsl:URI, tsl:InformationValue?, tsl:OtherInformation? Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/ADDSIE/2 Normative source: [1]- XMLSchema (file ts_119612v020201_201601xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tsl:ServiceHistoryInstanceType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tsl:URI child is an instance of tsl:NonEmptyMultiLangURIType. For testing the structure of each tsl:URI child the test assertions defined in clause A.2.9 shall apply. NOTE: The contents of tsl:OtherInformation child have been left open. It is out of the scope of the present document to specify any conformance assertion for this child element. A.3.18.2 Testing sie:QualificationsType type A.2.18.2.1 Testing sie:QualificationsType TA id: TL_SCH/EXT/QUALS/1 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of sie:QualificationsType type in terms of its children is as follows: sie:QualificationElement+ Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/QUALS/2 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of sie:QualificationsType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists A.3.18.2.2 Testing sie:QualificationElement element TA id: TL_SCH/EXT/QUALEL/1 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of the element sie:QualificationElement in terms of its children is as follows: sie:Qualifiers, sie:CriteriaList Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/QUALEL/2 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The element sie:QualificationElement does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 49 A.3.18.2.3 Testing sie:Qualifiers element TA id: TL_SCH/EXT/QUALIFIERS/1 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of the element sie:Qualifiers in terms of its children is as follows: sie:Qualifier+ Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/QUALIFIERS/2 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The element sie:Qualifiers does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/QUALIFIERS/3 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The value of each child element sie:Qualifier of sie:Qualifiers is a valid URI Reference Prescription level: mandatory Tag: Trusted Lists A.3.18.2.4 Testing sie:CriteriaListType type TA id: TL_SCH/EXT/CRITLIST/1 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of sie:CriteriaListType type in terms of its children is as follows: sie:KeyUsage*, sie:PolicySet*, sie:CriteriaList*, sie:Description?, sie:OtherCriteriaList? Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/CRITLIST/2 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The set of attributes (leaving apart the attributes declaring namespaces) of an instance of sie:CriteriaListType as follows: assert Prescription level: mandatory Tag: Trusted Lists Each sie:CriteriaList child is an instance of sie:CriteriaListType. For testing the structure of each sie:CriteriaList child the test assertions defined in the present clause shall apply. Below follow the test assertions that shall apply for checking the inner structure of sie:KeyUsage child element. TA id: TL_SCH/EXT/KEYUS/1 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of the element sie:KeyUsage in terms of its children is as follows: sie:KeyUsageBit(1..9) Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/KEYUS/2 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The element sie:KeyUsage does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/KEYUS/3 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The set of attributes (leaving apart the attributes declaring namespaces) of the element sie:KeyUsageBit is as follows: name Prescription level: mandatory Tag: Trusted Lists ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 50 Below follow the test assertions that shall apply for checking the inner structure of sie:PolicySet child element. TA id: TL_SCH/EXT/POLSET/1 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of the element sie:PolicySet in terms of its children is as follows: sie:PolicyIdentifier+ Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/POLSET/2 Normative source: [1]- XMLSchema (file ts_119612v020101_sie_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The element sie:PolicySet does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The child sie:PolicyIdentifier is an instance of xades:ObjectIdentifier. For testing the structure of the sie:PolicyIdentifier child the test assertions specified in clause A.4 of the present document shall apply. A.3.18.3 Testing tslx:ExtendedKeyUsageType type TA id: TL_SCH/EXT/EXTKUS/1 Normative source: [1]- XMLSchema (file ts_119612v020101_additionaltypes_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tslx:ExtendedKeyUsageType type in terms of its children is as follows: tslx:KeyPurposeId+ Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/EXTKUS/2 Normative source: [1]- XMLSchema (file ts_119612v020101_additionaltypes_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tslx:ExtendedKeyUsageType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists Each child tslx:KeyPurposeId is an instance of xades:ObjectIdentifier. For testing the structure of each tslx:KeyPurposeId child the test assertions specified in clause A.4 of the present document shall apply. A.3.18.4 Testing tslx:TakenOverByType type TA id: TL_SCH/EXT/TKOVER/1 Normative source: [1]- XMLSchema (file ts_119612v020101_additionaltypes_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tslx:TakenOverByType type in terms of its children is as follows: tslx:URI, tslx:TSPName, tsl:SchemeOperatorName, tsl:SchemeTerritory, tslx:OtherQualifier* Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/TKOVER/2 Normative source: [1]- XMLSchema (file ts_119612v020101_additionaltypes_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of tslx:TakenOverByType type does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tslx:URI child is an instance of tsl:NonEmptyMultiLangURIType type. For testing the structure of the tslx:URI child the test assertions defined in clause A.2.9 shall apply. The tslx:TSPName child is instance of tsl:InternationalNamesType. For testing the structure of the tslx:TSPName child the test assertions defined in clause A.2.6 shall apply. The tsl:SchemeOperatorName and tsl:SchemeName children are instances of tsl:InternationalNamesType. For testing the structure of each tsl:SchemeOperatorName or tsl:SchemeName child the test assertions defined in clause A.2.6 shall apply. ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 51 A.3.18.5 Testing tslx:CertSubjectDNAttribute TA id: TL_SCH/EXT/CSDNA/1 Normative source: [1]- XMLSchema (file ts_119612v020101_additionaltypes_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of tslx:CertSubjectDNAttribute element in terms of its children is as follows: tslx:AttributeOID+ Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/CSDNA/2 Normative source: [1]- XMLSchema (file ts_119612v020101_additionaltypes_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The element tslx:CertSubjectDNAttribute does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists The tslx:AttributeOID child is an instance of xades:ObjectIdentifierType type. For testing the structure of the tslx:AttributeOID child the test assertions defined in clause A.4 shall apply. A.3.18.6 Testing tslx:MimeType TA id: TL_SCH/EXT/CSDNA/1 Normative source: [1]- XMLSchema (file ts_119612v020101_additionaltypes_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The tslx:MimeType element does not contain any XML element Prescription level: mandatory Tag: Trusted Lists TA id: TL_SCH/EXT/CSDNA/2 Normative source: [1]- XMLSchema (file ts_119612v020101_additionaltypes_xsd.xsd) Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The element tslx:MimeType does not contain any attribute(leaving apart the attributes declaring namespaces) Prescription level: mandatory Tag: Trusted Lists A.4 Test assertions for xades:ObjectIdentifierType This clause defines test assertions for any element derived from or containing children instances of xades:ObjectIdentifierType type as defined in ETSI TS 101 903 [2]. TA id: TSL_SCH/OID/1 Normative source: [2] - clause 7.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of xades:ObjectIdentifierType type in terms of its children is as follows: xades:Identifier, xades:Description?, xades:DocumentationReferences?. Prescription level: mandatory Tag: Trusted Lists TA id: TSL_SCH/OID/2 Normative source: [2] - clause 7.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of xades:ObjectIdentifierType type does not contain any attribute (leaving apart the attributes declaring namespaces). Prescription level: mandatory Tag: Trusted Lists TA id: TSL_SCH/OID/ID/1 Normative source: [2] - clause 7.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of xades:IdentifierType type does not contain any children. Prescription level: mandatory Tag: Trusted Lists ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 52 TA id: TSL_SCH/OID/ID/2 Normative source: [2] - clause 7.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of xades:IdentifierType type has a valid URI Reference as value. Prescription level: mandatory Tag: Trusted Lists TA id: TSL_SCH/OID/ID/3 Normative source: [2] - clause 7.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The set of attributes (leaving apart the attributes declaring namespaces) of one instance of xades:IdentifierType is as follows: Qualifier?. Prescription level: mandatory Tag: Trusted Lists TA id: TSL_SCH/OID/ID/4 Normative source: [2] - clause 7.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The Qualifier attribute of an instance of xades:IdentifierType has one of the following values: "OIDAsURI" or "OIDAsURN". Prescription level: mandatory Tag: Trusted Lists TA id: TSL_SCH/OID/DOCREFS/1 Normative source: [1]- clause 5.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: The inner structure of an instance of xades:DocumentationReferencesType type in terms of its children is as follows: xades:DocumentationReference+. Prescription level: mandatory Tag: Trusted Lists TA id: TSL_SCH/OID/DOCREFS/2 Normative source: [2] - clause 7.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: An instance of xades:DocumentationReferencesType type does not have any attribute. Prescription level: mandatory Tag: Trusted Lists TA id: TSL_SCH/OID/DOCREFS/DOCREF/1 Normative source: [2] - clause 7.1.2 Target: XAdES signature generator claiming conformance to XAdES signatures either as specified in [1] or in [2] Predicate: Element xades:DocumentationReference does not have any children. Prescription level: mandatory Tag: Trusted Lists TA id: TSL_SCH/OID/DOCREFS/DOCREF/2 Normative source: [2] - clause 7.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: Element xades:DocumentationReference has a valid URI Reference as value. Prescription level: mandatory Tag: Trusted Lists TA id: TSL_SCH/OID/DOCREFS/DOCREF/3 Normative source: [2] - clause 7.1.2 Target: Trusted Lists as specified in ETSI TS 119 612 [1] Predicate: Element xades:DocumentationReference does not have any attribute. Prescription level: mandatory Tag: Trusted Lists ETSI ETSI TS 119 614-1 V1.1.1 (2016-06) 53 History Document history V1.1.1 June 2016 Publication
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
1 Scope
|
The present document specifies a format and mechanisms for establishing, locating, accessing and authenticating a trusted list which makes available trust service status information so that interested parties may determine the status of a listed trust service at a given time. It defines the format and semantics of a TL as well as the mechanisms for accessing TLs. It also provides guidance for locating and authenticating TLs. The present document applies to European Union Member State (EU MS) trusted lists as a means to express trust service status information with regards to their compliance with the relevant provisions laid down in Regulation (EU) No 910/2014 [i.10] and in its applicable secondary legislation. In the context of non-EU countries or international organizations, scheme operators may issue trusted lists in accordance with the present document to facilitate mutual recognition of digital signatures. In addition, the present document defines requirements for relying parties to use TLs and the status information held within them.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
2 References
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
2.1 Normative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found in the ETSI docbox. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long-term validity. The following referenced documents are necessary for the application of the present document. [1] Recommendation ITU-T X.509: "Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks". [2] ETSI TS 119 312: "Electronic Signatures and Infrastructures (ESI); Cryptographic Suites". [3] ETSI EN 319 132-1 (V1.3.1): "Electronic Signatures and Trust Infrastructures (ESI); XAdES digital signatures; Part 1: Building blocks and XAdES baseline signatures". [4] W3C® Recommendation 11 April 2013: "XML Signature Syntax and Processing. Version 1.1". [5] ISO/IEC 10646:2020: "Information technology — Universal coded character set (UCS)". [6] IETF RFC 2368: "The mailto URL scheme". [7] IETF RFC 2616: "Hypertext Transfer Protocol - HTTP/1.1". [8] IETF RFC 3986: "Uniform Resource Identifier (URI): Generic Syntax". [9] IETF RFC 5322: "Internet Message Format". [10] FIPS Publication 180-4 (2015): "Secure Hash Standard (SHS)". [11] IETF RFC 5646: "Tags for Identifying Languages". [12] IETF RFC 5280: "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile". [13] ISO/IEC 6429:1992: "Information technology — Control functions for coded character sets". ETSI ETSI TS 119 612 V2.4.1 (2025-08) 10 [14] ISO/IEC 2022:1994: "Information technology — Character code structure and extension techniques". [15] ISO 3166-1:2020: "Codes for the representation of names of countries and their subdivisions — Part 1: Country codes". [16] ISO 8601:2019 (parts 1 and 2): "Date and time — Representations for information interchange". [17] IETF RFC 3966: "The tel URI for Telephone Numbers".
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
2.2 Informative references
|
References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long-term validity. The following referenced documents may be useful in implementing an ETSI deliverable or add to the reader's understanding, but are not required for conformance to the present document. [i.1] ETSI TS 102 853: "Electronic Signatures and Infrastructures (ESI); Signature validation procedures and policies". [i.2] Commission Decision 2009/767/EC of 16 October 2009 setting out measures facilitating the use of procedures by electronic means through the points of single contact under Directive 2006/123/EC of the European Parliament and of the Council on services in the internal market. [i.3] Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. [i.4] Regulation (EC) No 765/2008 of the European Parliament and of the Council of 9 July 2008 setting out the requirements for accreditation and market surveillance relating to the marketing of products and repealing Regulation (EEC) No 339/93. [i.5] ETSI TS 101 456: "Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing qualified certificates". [i.6] ETSI TS 102 231 (V3.1.2): "Electronic Signatures and Infrastructures (ESI); Provision of harmonized Trust-service status information". [i.7] W3C® Technical Report #20 Revision 7: "Unicode in XML and other Markup Languages". [i.8] ISO/IEC 17000:2004: "Conformity assessment - Vocabulary and general principles". [i.9] ETSI EN 319 412-5: "Electronic Signatures and Infrastructures (ESI); Certificate Profiles; Part 5: QCStatements". [i.10] Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing Directive 1999/93/EC. NOTE: Since its publication and entry into force, that regulation has been amended by Regulation (EU) 2024/1183 and Directive (EU) 2022/2555. [i.11] IETF RFC 6960: "X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP". [i.12] ISO/IEC 9594-8:2014: "Information technology — Open System Interconnection — The Directory: Public-key and attribute certificate frameworks". [i.13] The Unicode® Standard. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 11
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
3 Definition of terms, symbols and abbreviations
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
3.1 Terms
|
For the purposes of the present document, the following terms apply: advanced electronic seal: As defined in Regulation (EU) No 910/2014 [i.10]. advanced electronic signature: As defined in Regulation (EU) No 910/2014 [i.10]. advanced electronic signature under e-signature Directive: Advanced electronic signature as defined in Directive 1999/93/EC [i.3]. approval: assertion that a trust service, falling within the oversight of a particular scheme, has been either positively endorsed or assessed for compliance against the relevant requirements (active approval) or has received no explicit restriction since the time at which the scheme was aware of the existence of the said service (passive approval) approval scheme: any organized process of supervision, monitoring, assessment or such practices that are intended to apply oversight with the objective of ensuring adherence to specific criteria in order to maintain trust in the services under the scope of the scheme certification authority: authority trusted by one or more users to create and assign certificates NOTE 1: A certification authority can be: 1) a trust service provider that creates and assigns public key certificates; or 2) a technical certificate generation service that is used by a certification-service-provider that creates and assign public key certificates. NOTE 2: See ISO/IEC 9594-8 [i.12] and Recommendation ITU-T X.509 [1]. certification-service-provider: As defined in Directive 1999/93/EC [i.3]. conformity assessment: process demonstrating whether specified requirements relating to a product, process, service, system, person or body have been fulfilled NOTE: From Regulation (EC) No 765/2008 [i.4] and clause 2.1 of ISO/IEC 17000 [i.8]. digital signature: data appended to, or a cryptographic transformation (see cryptography) of a data unit that allows a recipient of the data unit to prove the source and integrity of the data unit and protect against forgery e.g. by the recipient electronic archiving: As defined in Regulation (EU) No 910/2014 [i.10]. electronic attestation of attributes: As defined in Regulation (EU) No 910/2014 [i.10]. electronic ledger: As defined in Regulation (EU) No 910/2014 [i.10]. electronic seal: As defined in Regulation (EU) No 910/2014 [i.10]. electronic signature: As defined in Regulation (EU) No 910/2014 [i.10]. (EU) qualified certificate: Qualified certificate as specified in Regulation (EU) No 910/2014 [i.10]. qualified certificate under e-signature Directive: public key certificate which meets the requirements laid down in Directive 1999/93/EC [i.3] annex I, and is provided by a certification-service-provider who fulfils the requirements laid down in its annex II qualified electronic archiving service: As defined in Regulation (EU) No 910/2014 [i.10]. qualified electronic attestation of attributes: As defined in Regulation (EU) No 910/2014 [i.10]. qualified electronic ledger: As defined in Regulation (EU) No 910/2014 [i.10]. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 12 qualified electronic seal: As defined in Regulation (EU) No 910/2014 [i.10]. qualified electronic signature: As defined in Regulation (EU) No 910/2014 [i.10]. qualified electronic signature/seal creation device: As defined in Regulation (EU) No 910/2014 [i.10]. remote electronic seal creation devices: configured software or hardware used to create an electronic seal and that is managed by a trust service provider remote electronic signature creation devices: configured software or hardware used to create an electronic signature and that is managed by a trust service provider remote qualified electronic seal creation device: As defined in Regulation (EU) No 910/2014 [i.10]. remote qualified electronic signature creation device: As defined in Regulation (EU) No 910/2014 [i.10]. scheme operator: body responsible for the operation and/or management of any kind of assessment scheme, whether they are governmental, industry or private, etc. seal creator: As defined in Regulation (EU) No 910/2014 [i.10]. secure signature creation device: Signature creation device, as defined in Article 2.5 of Directive 1999/93/EC [i.3], which meets the requirements laid down in annex III of [i.3]. signatory: As defined in Regulation (EU) No 910/2014 [i.10]. signer: entity being the creator of a signature supervision system: system that allows for the supervision of trust service providers and the services they provide, for compliance with relevant requirements trust service: electronic service which enhances trust and confidence in electronic transactions NOTE: Such trust services are typically but not necessarily using cryptographic techniques or involving confidential material. trust service provider: entity which provides one or more electronic trust services trust service token: physical or binary (logical) object generated or issued as a result of the use of a trust service NOTE: Examples of binary trust service tokens are: certificates, CRLs, time-stamp tokens, OCSP responses. Physical tokens can be devices on which binary objects (tokens or credentials) are stored. Equally, a token can be the performance of an act and the generation of an electronic record, e.g. an insurance policy or share certificate. trusted list: list that provides information about the status and the status history of the trust services from trust service providers regarding compliance with the applicable requirements and the relevant provisions of the applicable legislation NOTE: In the context of European Union Member States, as specified in Regulation (EU) No 910/2014 [i.10], it refers to a EU Member State list including information related to the qualified trust service providers for which it is responsible, together with information related to the qualified trust services provided by them. In the context of non-EU countries or international organizations, it refers to a list meeting the requirements of the present document and providing assessment scheme based approval status information about trust services from trust service providers, for compliance with the relevant provisions of the applicable approval scheme and the relevant legislation. (voluntary) accreditation: any permission, setting out rights and obligations specific to the provision of trust services, to be granted upon request by the trust service provider concerned, by the public or private body charged with the elaboration of, and supervision of compliance with, such rights and obligations, where the trust service provider is not entitled to exercise the rights stemming from the permission until it has received the decision by the body XML Advanced Electronic Signature (XAdES): As defined in ETSI EN 319 132-1 [3]. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 13
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
3.2 Symbols
|
Void.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
3.3 Abbreviations
|
For the purposes of the present document, the following abbreviations apply: ACA Attribute Certification Authority AP Asia Pacific ARL Authority Revocation List BMP Basic Multilingual Plane CA Certification Authority CC Country Code CP Certificate Policy CPS Certification Practices Statement CR Carriage Return CRL Certificate Revocation List DN Distinguished Name EC European Commission ECDSA Elliptic Curve Digital Signature Algorithm EDS Electronic Delivery Service EEA European Economic Area EL Elláda (Greece) NOTE: ISO 3166-1 [15] Alpha 2 country code for Greece. EU European Union EUMS European Union Member States FTP File Transfer Protocol GCC Gulf Cooperation Council GTC General Terms & Conditions HTML HyperText Markup Language HTTP HyperText Transfer Protocol ISO International Organization for Standardization LDAP Lightweight Directory Access Protocol LF Line Feed LOTL List Of Trusted Lists MS Member State OCSP Online Certificate Status Protocol OID Object IDentifier OJEU Official Journal of the European Union PIN Personal Identification Number PKC Public Key Certificate PKI Public Key Infrastructure PSES Preservation Service for Electronic Signatures QC Qualified Certificate QCP Qualified Certificate Policy QSCD Qualified Signature/Seal Creation Device RA Registration Authority REM Registered Electronic Mail RGS Référentiel Général de Sécurité RTF Rich Text Format SGML Standard Generalized Markup Language SHA Secure Hash Algorithm SSCD Secure Signature Creation Device TAB TABulator TC Technical Committee TDP TL Distribution Point TL Trusted List TLSO Trusted List Scheme Operator ETSI ETSI TS 119 612 V2.4.1 (2025-08) 14 TSA Time-Stamping Authority TSL Trust-service Status List TSP Trust Service Provider TST Time-Stamp Token TSU Time Stamping Unit UCS Universal Character Set UK United Kingdom NOTE: ISO 3166-1 [15] Alpha 2 country code for Great-Britain. URI Uniform Resource Identifier UTC Coordinated Universal Time UTF Unicode Transformation Format WWW World Wide Web XHTML eXtended HTML XML eXtensible Markup Language
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
4 Overall structure of trusted lists
|
Trusted List Scheme Operators (TLSOs) which maintain a TL in compliance with the present document shall comply with: • the format and semantics of a TL, as specified in clause 5; • the mechanisms to be used to support relying parties locating, accessing and authenticating TLs, as specified in clause 6. The logical model of the trusted list is shown in figure 1. It has the following logical component parts. There shall be only one occurrence of the first two and last components (i.e. 1., 2. and 6.). The other components may be replicated as illustrated in figure 1: 1) A trusted list tag (Tag): This tag facilitates the identification of the trusted list during electronic searches. The contents of the tag are specified in clause 5.2.1. 2) Information on the trusted list and its issuing scheme (Scheme information): The list commences with key information about the list itself and the nature of the scheme which has determined the information found in, and through, the list. This TL and scheme information is specified in clause 5.3 and it includes: - A trusted list format version identifier. - A trusted list sequence (or release) number. - A trusted list type information. - A trusted list scheme operator information (e.g. name, address, contact information of the body in charge of establishing, publishing securely and maintaining the trusted list). - Information about the underlying approval scheme(s) to which the trusted list is associated, including but not limited to: the country in which it applies; information on or reference to the location where information on the approval scheme(s) can be found (scheme model, rules, criteria, applicable community, type, etc.); period of retention of (historical) information. - Trusted list policy and/or legal notice, liabilities, responsibilities. - Trusted list issue date and time and next planned update. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 15 3) Unambiguous identification information about every TSP recognized in the scheme (TSP information): It is a sequence of fields holding unambiguous identification information about every listed TSP under the scheme. The contents of the TSP information fields are specified in clause 5.4 and include: - The TSP organization name as used in formal legal registrations. - The TSP address and contact information. - Additional information on the TSP either included directly or by reference to a location from where such information can be downloaded. 4) For each of the listed TSPs, the details of their specific trust services (Service information) whose current status is recorded within the TL are provided as a sequence of fields holding unambiguous identification of a listed trust service provided by the TSP. The contents of the service information field are specified in clause 5.5 and it includes the following for each trust service from a listed TSP: - An identifier of the type of service. - (Trade) name of this service. - An unambiguous unique identifier of the service. - An identifier of the current status of the service. - The current status starting date and time. - Additional information on the service (directly included or included by reference to a location from which information can be downloaded): service definition information provided by the scheme operator, access information with regards to the service, service definition information provided by the TSP and service information extensions. 5) (Service approval history) For each listed trust service, information on the status history when applicable is available in the service approval history information or a sequence of such information. The contents of the history information fields are specified in clause 5.6. 6) (Digital signature) The TL is a digitally signed list for authentication purposes. The contents of the digital signature field are specified in clause 5.7. The number of TSPs, of services per TSP, and of history sections per service is unbounded. The structure of the TL is further described in the following clauses by each component part and its fields. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 16 Tag TSL tag (clause 5.2.1) Signed TSL Scheme information TSL version identifier (clause 5.3.1) TSL sequence number (clause 5.3.2) TSL type (clause 5.3.3) Scheme operator name (clause 5.3.4) Scheme operator address (clause 5.3.5) Scheme name (clause 5.3.6) Scheme information URI (clause 5.3.7) Status determination approach (clause 5.3.8) Scheme type/community/rules (clause 5.3.9) Scheme territory (clause 5.3.10) TSL policy/legal notice (clause 5.3.11) Historical information period (clause 5.3.12) Pointers to other TSLs (clause 5.3.13) List issue date and time (clause 5.3.14) Next update (clause 5.3.15) Distribution points (clause 5.3.16) Scheme extensions (clause 5.3.17) List of Trust Service Providers (clause 5.3.18) TSP 1 informa- tion TSP name (clause 5.4.1) TSP trade name (clause 5.4.2) TSP address (clause 5.4.3) TSP information URI (clause 5.4.4) TSP information extensions (clause 5.4.5) List of services (clause 5.4.6) Service information (clause 5.5) Service type identifier (clause 5.5.1) Service name (clause 5.5.2) Service digital identity (clause 5.5.3) Service current status (clause 5.5.4) Current status starting date and time (clause 5.5.5) Scheme service definition URI (clause 5.5.6) Service supply points (clause 5.5.7) TSP service definition URI (clause 5.5.8) Service information extensions (clause 5.5.9) Service approval history (clause 5.5.10) History information (clause 5.6) Service type identifier (clause 5.6.1) Service name (clause 5.6.2) Service digital identity (clause 5.6.3) Service previous status (clause 5.6.4) Previous status starting date and time (clause 5.6.5) Service information extensions (clause 5.6.6) TSP 1 Service 1 History 2 Idem for TSP 1 Service 1 History 2 (prior to history 1) TSP 1 Service 2 Idem for TSP 1 Service 2 (as applicable) TSP 1 Service 2 History 1 Idem for TSP 1 Service 2 History 1 TSP 2 Informa-tion Idem for TSP 2 (as applicable) Idem for TSP 2 Service 1 Idem for TSP 2 Service 1 History 1 Digital Signature (clause 5.7) Digital signature algorithm identifier (clause 5.7.2) Digital signature value (clause 5.7.3) Figure 1: Logical model of the trusted list ETSI ETSI TS 119 612 V2.4.1 (2025-08) 17
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5 Trusted list format and content
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.1 General principles for trusted lists
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.1.1 Trusted List Format
|
A TL shall be issued in XML format as specified in annexes B and C. If the scheme operator or any party provides means to represent one TL in different formats, they shall contain exactly the same information as provided in the XML format of the TL.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.1.2 Use of Uniform Resource Identifiers
|
In the definitions of TL fields given in the present document, many use Uniform Resource Identifiers (URIs) to indicate the meaning of the field concerned. Within these definitions a "common name" may be used to broadly and simply describe the specific values or meanings of the field. These common names are linked to their declaration in annex D, which formally states all specific URIs used in the present document, with their meanings. Some fields allow to use different URIs, which have the same purpose, to be registered and described by the scheme operator or another entity and recognized by the intended user community. Such URIs may be registered with ETSI. Information on URI registration can be found in clause D.3. Where fields are defined as being of or using the type URI, implementers shall use general syntax as specified by IETF RFC 3986 [8].
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.1.3 Date-time indication
|
All fields carrying date-time values shall comply with the following rules: 1) the date-time values shall be a character string formatted according to ISO 8601 [16]; and 2) the date-time value shall be expressed as Coordinated Universal Time (UTC): its value shall contain year with four digits, month, day, hour, minute, second (without decimal fraction) and the UTC designator "Z". The time scale shall be based on the second.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.1.4 Language support
|
Trusted lists shall be issued supporting at least the UK English language, using the 'en' language code as specified in IETF RFC 5646 [11] and annex E, and may be issued supporting multiple (national) languages. For all the fields where support of multiple language is applicable, the field format specifications refer to the use of multilingual character string or pointer to which the following general rules shall apply: 1) A multilingual character string shall be a character string as defined in ISO/IEC 10646 [5] encoded in UTF-8. Each multilingual character string shall consist of two parts: a tag, conformant to IETF RFC 5646 [11] and in lower case, that identifies the language in which the string is expressed, and the text in that language. The same content may be represented in multiple languages by a sequence of multilingual character strings. 2) A multilingual pointer shall be a URI that identifies a resource expressed in a particular language. Each multilingual pointer shall consist of two parts: a tag, conformant to IETF RFC 5646 [11], that identifies the language in which the content pointed-to by the URI is expressed, and the URI expressed as a character string with the syntax specified by IETF RFC 3986 [8], identifying a resource expressed in the given language. The same content may be represented in multiple languages by a sequence of multilingual pointers. Whenever the native terms cannot be represented using the Latin alphabet, as defined in ISO/IEC 10646 [5], one issue of the term in the native language plus one issue with a transliteration to the Latin alphabet shall be used. Implementers should also comply with the Unicode Standard [i.13]. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 18 Further detailed requirements regarding multilingual implementation are specified in normative annex E.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.1.5 Value of Country Code fields
|
All fields carrying Country Codes values, denoted by "CC", shall be in capital letters and in accordance with either: a) ISO 3166-1 [15] Alpha 2 codes with the following exceptions: 1) the Country Code for United Kingdom shall be "UK"; 2) the Country Code for Greece shall be "EL"; 3) when the scope of the field is the European Union and/or the European Commission the code "EU" shall be used; or b) commonly used extensions with regional scope (e.g. AP for Asia Pacific, ASIA); or c) another identifier recognized for identifying multi-state grouping and that does not conflict with a), or b) (e.g. GCC, ASEAN).
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.2 Trusted List tag
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.2.1 TSL Tag
|
Presence: This field shall be present. Description: The TL is tagged to facilitate its identification during electronic searches. The tag is an attribute of <tsl:TrustServiceStatusList> root element. Format: A character string which indicates that the data structure is a TL. This shall be the character representation of the TSLTag URI. Value: A unique value enabling a web-searching tool to establish during a WWW-wide search for TLs that a resource it has located is indeed a TL. Only the characters required to fully represent the URI shall be present.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3 Scheme information
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.1 TSL version identifier
|
Presence: This field shall be present. Description: It specifies the version of the TL format. Format: Integer. Value: It shall be "6". NOTE: This field will only be incremented when the rules for parsing the TL change, e.g. through addition/removal of a field or a change to the values or meaning of an existing field. Revisions to the specification which do not change the parsing rules of the TL may be made without revision to this field. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 19
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.2 TSL sequence number
|
Presence: This field shall be present. Description: It specifies the sequence number of the TL. Format: Integer. Value: At the first release of the TL, the value of the sequence number shall be 1. The value shall be incremented at each subsequent release of the TL and shall not, under any circumstance, be re-cycled to "1" or to any value lower than the one of the TL currently in force.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.3 TSL type
|
Presence: This field shall be present. Description: It specifies the type of the trusted list. It permits a parser to determine the form of any following field to expect according to the present document. Format: An indicator expressed as a URI. Value: In the context of EU Member State trusted lists, the URI shall be set to "http://uri.etsi.org/TrstSvc/TrustedList/TSLType/EUgeneric" as defined in clause D.5. TLSOs from non-EU countries and international organizations shall use: - the following URI as defined in clause D.6: "http://uri.etsi.org/TrstSvc/TrustedList/TSLType/CClist where "CC" (see clause 5.1.5) identifies the community to which the URI applies and is as used in the 'Scheme territory field' (clause 5.3.10); or - a URI defined on purpose or registered under ETSI Identified Organization Domain as described in clause D.3 of the present document. NOTE: In the context of non-EU countries or international organizations, it refers to a list meeting the requirements of the present document and providing assessment scheme based approval status information about trust services from trust service providers which are approved by the competent trusted list scheme operator or by the State or body in charge and from which the TLSO depends or by which it is mandated, for compliance with the relevant provisions of the applicable approval scheme and the applicable legislation. This may be used to enable in practice any interested party to determine whether a trust service from a non-EU country or an international organization, is or was operating under an approval scheme, currently or at some time in the past (e.g. at the time the service was provided, or at the time at which a transaction reliant on that service took place). The adoption of the present document for such non-EU countries or international organizations trusted lists will facilitate the declaration of mutual recognition between trust services and trust services outputs. When the TL contains exclusively a list of pointers towards other TLs and TL Issuers which are independently responsible for the approval or recognition of a community of trust services through a process of direct oversight (whether voluntary or regulatory), the URI shall be set: - in the context of EU Member States' trusted lists, to: "http://uri.etsi.org/TrstSvc/TrustedList/TSLType/EUlistofthelists" as defined in clause D.5; or - in the context of non-EU countries and international organizations trusted lists, to: "http://uri.etsi.org/TrstSvc/TrustedList/TSLType/CClistofthelists" as defined in clause D.6 where "CC" (see clause 5.1.5) identifies the community to which the URI applies and is as used in the 'Scheme territory field' (clause 5.3.10); or a URI defined on purpose or registered under ETSI Identified Organization Domain as described in clause D.3 of the present document. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 20
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.4 Scheme operator name
|
Presence: This field shall be present. Description: It specifies the name of the entity in charge of establishing, publishing, signing and maintaining the trusted list. Format: A sequence of multilingual character strings (see clause 5.1.4). Value: The name of the scheme operator shall be the formal name under which the associated legal entity or mandated entity (e.g. for governmental administrative agencies) associated with the legal entity in charge of establishing, publishing and maintaining the trusted list operates. It shall be the name used in formal legal registration or authorization and to which any formal communication should be addressed.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.5 Scheme operator address
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.5.0 General
|
Presence: This field shall be present. Description: It specifies the address of the legal entity or mandated organization identified in the 'Scheme operator name' field (clause 5.3.4) for both postal and electronic communications. Format: This is a multi-part field consisting of the scheme operator physical address specified in clause 5.3.5.1 and the scheme operator electronic address specified in clause 5.3.5.2.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.5.1 Scheme operator postal address
|
Presence: This field shall be present. Description: It specifies the postal address of the legal entity identified in clause 5.3.4, with the provision for the inclusion of the address in multiple languages. Format: Sequence(s) of multilingual character strings (see clause 5.1.4). Each sequence of character strings shall give the following attributes pertaining to the legal entity: - street address (sub-components internally delimited by ";"); - locality (town/city); - optionally, if applicable, State or Province name; - postal code, if applicable; - country name as a two-character code in accordance with clause 5.1.5 (a). Value: This shall be a postal address at which the scheme operator provides a help line service which is operated through conventional (physical) mail and which is processed as would be expected by normal business services. Users (subscribers, relying parties) should use this address as the contact point for enquiries, complaints, etc. to the scheme operator. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 21
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.5.2 Scheme operator electronic address
|
Presence: This field shall be present. Description: It specifies the email address, the web-site URI and optional telephone number of the legal entity identified in clause 5.3.4 for electronic communications. Format: A sequence of multilingual character strings (see clause 5.1.4) giving: - mandatorily, an e-mail address as a URI, in the form specified by IETF RFC 3986 [8], with the URI scheme defined in IETF RFC 2368 [6]; - mandatorily, a web-site as a URI, in the form specified by IETF RFC 3986 [8]; - optionally, a telephone number as a URI, in the form specified by IETF RFC 3986 [8], with the "tel" URI scheme defined in IETF RFC 3966 [17]. The first two character strings shall be present. The third one is optional. Value: The e-mail address, and the telephone number when present, shall be an address, and respectively a phone number when present, at which the scheme operator provides a help line service which addresses TL-related matters and which are processed as would be expected by normal business services. As regards a web-site URI, this shall lead to a capability whereby the user may communicate with a help line service which addresses TL-related matters and which is processed as would be expected by normal business services.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.6 Scheme name
|
Presence: This field shall be present. Description: It specifies the name under which the scheme operates. Format: A sequence of multilingual character strings (see clause 5.1.4), defined as follows: - The English version shall be a character string structured as follows: CC:EN_name_value; where: 'CC' is the code used in the 'Scheme territory field' (clause 5.3.10); ':' is used as the separator; 'EN_name_value' is the name of the scheme. - Any national language version shall be a character string structured as follows: CC:name_value; where: 'CC' is the code used in the 'Scheme territory field' (clause 5.3.10); ':' is used as the separator; 'name_value' is the national language official translation of the above EN_name_value. Value: The name of the scheme shall be the name which is used in formal references to the scheme in question, shall be unique and shall not be used by any other scheme operated by the same entity. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 22
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.7 Scheme information URI
|
Presence: This field shall be present. Description: It specifies the URI(s) where users (relying parties) can obtain scheme-specific information. Format: A sequence of multilingual pointers (see clause 5.1.4). Value: The referenced URI(s) shall provide a path to information describing appropriate information about the scheme, including: - scope and context of the trusted list; - general description and detailed information about underlying (approval) scheme; - information about the process and procedures followed: by the TLSO, or the body from which it depends or by which it is mandated, being in charge to approve TSPs; and by the TSPs for being approved; - information about the criteria against which TSPs are approved; - information about the criteria and rules used to select assessors and defining how TSPs are assessed by them; - where separate bodies provide separate aspects of supervision, accreditation and scheme operation, the separate responsibilities and any liabilities of each body; and - other contact and general information that may apply to the scheme operation.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.8 Status determination approach
|
Presence: This field shall be present. Description: It specifies the identifier of the status determination approach. Format: An indicator expressed as a URI. Value: In the context of EU Member State trusted lists, the URI shall be set to "http://uri.etsi.org/TrstSvc/TrustedList/StatusDetn/EUappropriate" as defined in clause D.5. TLSOs from non-EU countries and international organizations shall use either: - the "http://uri.etsi.org/TrstSvc/TrustedList/StatusDetn/CCdetermination" URI as defined in clause D.6 and where "CC" is replaced by the code used in the 'Scheme territory field' (clause 5.3.10); or - a URI defined on purpose or registered under ETSI Identified Organization Domain as described in clause D.3 of the present document. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 23
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.9 Scheme type/community/rules
|
Presence: This field shall be present. Description: It specifies the URI(s) where users (relying parties) can obtain scheme type/community/rules information against which services included in the list are approved and assessed, and from which the type of scheme or community may be determined. Format: A sequence of multilingual pointers (see clause 5.1.4). Value: The referenced URI(s) shall identify: - the specific policy/rules against which services included in the list are approved and assessed, and from which the type of scheme or community may be determined; - the description about how to use and interpret the content of the trusted list. Where more than one URI is provided, each shall be a complete subset of the policy defined by its predecessor (e.g. a supra-national policy might be overarching; separate nations part of this supra- national entity may have their own implementations as part of this supra-national high-level policy). When TLSOs participate to a wider scheme for issuing trusted lists which share common rules and which point towards a descriptive text that applies to the TL of each TLSO, a URI common to all TLSO shall be used: - denoting participation of the trusted list (identified via the "TSL type" (see clause 5.3.3) and "Scheme name" (clause 5.3.6)) in a wider scheme of trusted lists (i.e. a TL listing pointers to all members publishing and maintaining a trusted list); - identifying a resource from where users can obtain policy/rules against which services included in the lists are assessed; - identifying a resource from where users can obtain description about how to use and interpret the content of the trusted lists. These usage rules shall be common to all trusted lists being part of the wider scheme of schemes whatever the type of listed services. In the context of EU Member States' trusted lists, this common URI shall be set to "http://uri.etsi.org/TrstSvc/TrustedList/schemerules/EUcommon" as defined in clause D.5. This field shall include a URI specific to a country's (national) trusted list and point towards a descriptive text that applies to this country's (national) TL: - using the following URI as defined in clause D.4: http://uri.etsi.org/TrstSvc/TrustedList/schemerules/CC; where CC is replaced by the code used in the 'Scheme territory' field (clause 5.3.10); TLSOs may define additional URIs from the above specific URI (i.e. sub-URIs defined from this specific URI used as root). The definition and management of the sub-structure under the above URIs is under the responsibility of the TLSO; or - in the context of non-EU countries and international organizations only, using a URI defined on purpose or registered under ETSI Identified Organization Domain as described in clause D.3. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 24
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.10 Scheme territory
|
Presence: This field shall be present. Description: It specifies the country or territory in which the scheme is established and applies. Format: Character string in accordance with clause 5.1.5.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.11 TSL policy/legal notice
|
Presence: This field shall be present. Description: It specifies the scheme's policy or provides a notice concerning the legal status of the scheme or legal requirements met by the scheme for the jurisdiction in which the scheme is established and/or any constraints and conditions under which the TL is maintained and published. Format: Either: a) a sequence of multilingual pointers (see clause 5.1.4) for specific use as a pointer to the policy or notice; or b) a sequence of multilingual character strings (see clause 5.1.4) providing the actual text of any such policy or notice, in as many languages as necessary. Value: Any referenced text shall provide information describing the policy under which the Scheme Operator operates or any relevant legal notices with which users of the TL should be aware.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.12 Historical information period
|
Presence: This field shall be present. Description: It specifies the duration over which historical information in the TL is maintained once it has been included. Format: Integer. Value: The value of this integer shall be '65535', which signifies that historical information provided in the trusted list shall never be removed.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.13 Pointers to other TSLs
|
Presence: This field shall be present for EU Member States' trusted lists. It is optional for non-EU countries and international organizations. Description: It references any relevant trusted list or any relevant list of trusted lists. Format: Sequence of one or more tuples, each tuple giving: a) a string containing the URI of the machine processable format of another TL; b) one or more digital identities, all representing the issuer of the TL pointed to, formatted as specified in clause 5.5.3; and c) additional information as a set of TL Qualifiers: • TSLType, as defined in clause 5.3.3; • Scheme operator name, as defined in clause 5.3.4; • Scheme type/community/rules, as defined in clause 5.3.9; • Scheme territory, as defined in clause 5.3.10; and • Mime type, as one of the media types defined in clause 6.2. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 25 Value: More than one digital identity may be used to help the management of the pointed-to list signing process (e.g. in case of expiration/substitution of pointed-to list signing keys or more than a single signing key is allowed to sign this list). One of such digital identities shall allow successful authentication of the pointed-to list before its use. In the context of EU Member State trusted lists, this field shall include the pointer to a European Commission compiled list of links (pointers) towards all trusted lists from the Member States, the so-called List Of Trusted Lists (LOTL) as it is notified in the Official Journal of the European Union. The referenced digital identities, validly representing the issuer(s) of the LOTL pointed to, formatted as specified in clause 5.5.3 (Service digital identity) shall be as published in the Official Journal of the European Union. For non-EU countries and international organizations, this field may reference any relevant trusted list or list of trusted lists (e.g. the European List Of Trusted List as it is notified in the Official Journal of the European Union).
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.14 List issue date and time
|
Presence: This field shall be present. Description: It specifies the date and time on which the trusted list was issued. Format: Date-time value (see clause 5.1.3). Value: Coordinated Universal Time (UTC) at which the TL was issued. NOTE: See also the applicable requirement on TLSO to ensure the consistency of the (re)-issuance of a trusted list and the actual date when a service status has been updated (clause 5.5.5).
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.15 Next update
|
Presence: This field shall be present. Description: It specifies the date and time by which, at the latest, an update of the TL will be made available by the scheme operator or be null to indicate a closed TL. Format: Date-time value (see clause 5.1.3). Value: Coordinated Universal Time (UTC) by which, at the latest, an update of the TL shall be issued. The scheme operator shall issue and publish an update of the TL before that Next Update date and time whenever the underlying approval scheme will require so, in particular when changes occur to TSP or service related information (e.g. its status). In the event of no interim status changes to any TSP or service covered by the scheme, the TL shall be re-issued by the time of expiration of the last TL issued. TL with a Next update occurring in the past shall be discarded as expired as a measure to reduce the risk of a substitution by an attacker with an old TL. Applications shall consider, in the event they implement some caching mechanism, that other TLs could be issued and published before 'Next update' date and time. See annex I for further information on application of trusted lists. The difference between the 'Next update' date and time and the 'List issue date and time' shall not exceed six (6) months. If a scheme ceases operations or halts publication of its TL, a final version shall be published with all services' status shown as "expired" (see Service current status) and this field set null. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 26
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.16 Distribution points
|
Presence: This field is optional. Description: When used, it specifies locations where the current TL is published and where updates to the current TL can be found. Format: Non-empty sequence of URIs. Value: Dereferencing the given URI will always deliver the latest update of this TL. If multiple distribution points are specified, they all shall provide identical copies of the current TL or its updated version.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.17 Scheme extensions
|
Presence: This field shall not be present for EU Member States' trusted lists. It is optional for non-EU countries and international organizations. Description: It provides specific scheme-related information and enhancements that do not require a change in the version identifier, which can be interpreted by all accessing parties according to the specific scheme's rules. Format: Sequence of Scheme extensions whose format is left open. Each extension shall have an indication of its criticality. Value: Each extension of the sequence shall be selected by the TLSO according to the information it wishes to convey within its TL. The meaning and value of each extension shall be defined by its source specifications being either the TLSOs own definition or any other extension definition produced by another entity, such as a community or federation of schemes, a standards body, etc. The criticality indication shall have the same semantics as with extensions in X.509-certificates [1]. A system using TLs shall reject the TL if it encounters a critical extension it does not recognize, while a non-critical extension may be ignored if it is not recognized.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.3.18 Trust Service Provider List
|
Presence: If no TSP is or was approved in the context of the trusted list scheme, this field shall not be present. If one or more TSP services are or were approved under the TL scheme, this field shall be present. Description: List of TSPs and their trust services approved in accordance with the trusted list scheme. Format: Sequence of Trust Service Provider elements, where each Trust Service Provider element is a tuple made of a TSP Information element (see clause 5.4) and a TSP Services element, where the TSP Services element is a sequence of TSP Service elements, where each of such TSP Service element is a tuple made of a Service Information element (see clause 5.5) and a conditional Service History element. Each of such Service History element, when present, is a sequence of Service History Instance elements (see clause 5.6). Value: It shall contain a sequence identifying each TSP providing one or more of approved services, with details on the status and status history of each of the TSP's services, as illustrated in figure 1 (see clause 4). ETSI ETSI TS 119 612 V2.4.1 (2025-08) 27
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4 TSP information
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4.1 TSP name
|
Presence: This field shall be present. Description: It specifies the name of the legal entity, or when applicable the natural person, responsible for the TSP's services that are or were recognized by the scheme, in particular for the TSP's services that are or were approved under the applicable scheme. Format: A sequence of multilingual character strings (see clause 5.1.4). Value: The name of the legal entity, or when applicable the natural person, responsible for the TSP shall be the name which is used in formal legal registrations and official records and to which any formal communication, whether physical or electronic, should be addressed.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4.2 TSP trade name
|
Presence: This field shall be present. Description: It specifies an official registration identifier as registered in official records, where such a registered identifier exists, that unambiguously identifies the TSP. It may additionally be used to specify an alternative name under which the TSP identifies itself in the specific context of the provision of those of its services which are to be found in this TL under its 'TSP name' (clause 5.4.1) entry. Format: A sequence of multilingual character strings (see clause 5.1.4). Value: It shall include an official registration identifier as registered in official records, where such a registered identifier exists, that unambiguously identifies the TSP. When the TSP is a legal person, that identifier shall be expressed using the following structure for the corresponding character string in the presented order: a) 3 character legal person identity type reference, having one of the following defined values: i) "VAT" for identification based on a national value added tax identification number; or ii) "NTR" for identification based on an identifier from a national register, e.g. a national trade register. When both a national value added tax identification number and one (or more) other national identification number exist, the national value added tax identification number shall be used to identify the listed TSP. When no registered identifier exists for a listed TSP, the TLSO shall allocate an identifier, register such identifier at TLSO level and use the "NTR" value for the identity type reference. b) 2 character ISO 3166-1 [15] country code; c) hyphen-minus "-" (0x2D (ASCII), U+002D (UTF-8)); and d) identifier (according to country and identity type reference). When the TSP is a natural person, that identifier shall be expressed using the following structure for the corresponding character string in the presented order: a) 3 character natural person identity type reference, having one of the following defined values: i) "PAS" for identification based on passport number; ii) "IDC" for identification based on national identity card number; ETSI ETSI TS 119 612 V2.4.1 (2025-08) 28 iii) "PNO" for identification based on (national) personal number (national civic registration number); or iv) "TIN" Tax Identification Number according to the European Commission - Tax and Customs Union (http://ec.europa.eu/taxation_customs/tin/tinByCountry.html). b) 2 character ISO 3166-1 [15] country code; c) hyphen-minus "-" (0x2D (ASCII), U+002D (UTF-8)); and d) identifier (according to country and identity type reference). It may additionally include any name under which the legal entity, or when applicable the natural person, responsible for the TSP operates, in the specific context of the delivery of those of its services which are to be found in this TL. NOTE: Where a single TSP legal entity, or when applicable a natural person, is providing services under different trade names or under different specific contexts, there might be as many TSP entries as such specific contexts (e.g. Name/Trade Name entries). An alternative is to list each and every TSP (legal entity or when applicable natural person) only once and provide Service specific context information. This is up to the Scheme Operator to discuss and agree with the TSP the most suitable approach.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4.3 TSP address
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4.3.0 General
|
Presence: This field shall be present. Description: It specifies the address of the legal entity or mandated organization, or when applicable the natural person, identified in the 'TSP name' field (clause 5.4.1) for both postal and electronic communications. Format: This is a multi-part field consisting of the TSP physical address specified in clause 5.4.3.1 and the TSP electronic address specified in clause 5.4.3.2. Value: In case of termination or cessation of the entire set of services provided by a listed TSP (e.g. bankruptcy), the TSP address shall be replaced by the address the Scheme Operator uses for enquiries about the terminated services (e.g. a specific dedicated email address and a specific webpage with relevant information including contact information).
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4.3.1 TSP postal address
|
Presence: This field shall be present. Description: It specifies the postal address of the TSP identified in clause 5.4.1, with the provision for the inclusion of the address in multiple languages. Format: As specified in clause 5.3.5.1. Value: This shall be a postal address at which the TSP provides a customer care or help line service, operated through conventional (physical) mail and processed as would be expected by normal business services.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4.3.2 TSP electronic address
|
Presence: This field shall be present. Description: It specifies an email address, a web-site URI, and an optional telephone number of the TSP identified in clause 5.4.1, to be used for electronic communications. Format: As specified in clause 5.3.5.2. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 29 Value: The e-mail address, and the telephone number when present, shall be an address, and respectively a phone number when present, at which the TSP provides a customer care or help line service which is related to the listed services and which are processed as would be expected by normal business services. As regards a web-site URI, this shall lead to a capability whereby the user may communicate with a customer care or help line service which is related to the listed services and which is processed as would be expected by normal business services.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4.4 TSP information URI
|
Presence: This field shall be present. Description: It specifies the URI(s) where users (e.g. relying parties) can obtain TSP-specific information. Format: Sequence of multilingual pointers (see clause 5.1.4). Value: The referenced URI(s) shall provide a path to information describing or leading to the description of the last and previous versions of the TSP's Practices Statements and/or Policies (e.g. CPS/CPs), the general terms and conditions of the TSP, legal issues, its customer care policies and other generic information which applies to all of its services listed under its TSP entry in the TL. Where a single TSP entity is providing services under different trade names or under different specific contexts, and this has been reflected in as many TSP entries as such specific contexts, this field shall specify information related to the specific set of services listed under a particular TSP/TradeName entry. In case of termination or cessation of the entire set of services provided by a listed TSP (e.g. bankruptcy), the TSP information URI shall be replaced by the specific URI the Scheme Operator uses for providing information about the terminated services (i.e. a specific dedicated webpage with relevant information) including the last and previous versions of the TSP's Practices Statements and/or Policies (e.g. CPS/CPs), GTC, maintained certificate validity status services or last CRL(s)/ARL(s) when all certificates have been revoked, etc.).
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4.5 TSP information extensions
|
Presence: This field is optional. Description: It may be used by scheme operators to provide specific TSP-related information, to be interpreted according to the specific scheme's rules. Format: Sequence of TSP extensions whose format is left open. Value: Each TSP information extension may be selected by the scheme operator according to the meaning and information it wishes to convey within its TL. The meaning of each extension is hence defined by its source specification, that specification being either the scheme operator's own definition or any other extension definition produced by another entity, such as a community or federation of schemes, a standards body, etc. In the context of EU Member State trusted lists, the TSP information extensions, when used, shall not be made critical.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.4.6 TSP Services (list of services)
|
Presence: This field shall be present. Description: It contains a sequence identifying each of the TSP's recognized services and the approval status (and history of that status) of that service. Format: A sequence of TSP Service elements, where each of such TSP Service element is a tuple made of a Service Information element (see clause 5.5) and a conditional Service History element. Each of such Service History element, when present, is a sequence of Service History Instance elements (see clause 5.6). ETSI ETSI TS 119 612 V2.4.1 (2025-08) 30 Value: At least one service shall be listed, even if the information held is entirely historical. As the retention of historical information about listed services is required by clause 5.3.12, that historical information shall be retained even if the service's present status would not normally require it to be listed (e.g. the service is withdrawn). Thus a TSP shall be included even when its only listed service is in such a state, so as to preserve the history.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5 Service information
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.1 Service type identifier
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.1.0 General requirements
|
Presence: This field shall be present. Description: It specifies the identifier of the service type. Format: An indicator expressed as a URI. Value: The quoted URI shall be: a) one of the URIs specified in clause 5.5.1.1 corresponding to the type of listed trust service for qualified trust services specified in Regulation (EU) No 910/2014 [i.10]; or b) one of the URIs specified in clause 5.5.1.2 corresponding to the type of listed trust service for non-qualified trust services specified in Regulation (EU) No 910/2014 [i.10]; or c) one of the URIs specified in clause 5.5.1.3 corresponding to the type of listed trust service for trust services that are not specified in Regulation (EU) No 910/2014 [i.10] but specified on a EU MS national basis, a non-EU country basis or on the basis of an international organization specifications; or d) any other URI value registered and described by the scheme operator or another entity. NOTE: Any organization can request an object identifier under the etsi-identified organization node or a URI root as detailed on https://portal.etsi.org/PNNS.aspx. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 31
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.1.1 Regulation (EU) No 910/2014 qualified trust service types
|
(a) URI: http://uri.etsi.org/TrstSvc/Svctype/CA/QC Description: A qualified certificate issuing trust service creating and signing qualified certificates based on the identity and other attributes verified by the relevant registration services, and under which are provided the relevant and related revocation and certificate validity status information services (e.g. CRLs, OCSP responses) in accordance with EU Directive 1999/93/EC [i.3] or with Regulation (EU) No 910/2014 [i.10] whichever is in force at the time of provision. This may also include generation and/or management of the associated private keys on behalf of the certified entity. Requirements: When the listed service is a "root" certificate generation service issuing certificates to one or more subordinates certificate generation services and from which a certification path can be established down to a certificate generation service issuing end-entity qualified certificates, this service type shall be further identified by using the "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/RootCA-QC" identifier (described in clause D.4) which is included in the additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9). When applicable, this service type shall be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) by using the appropriate identifiers indicating the nature of the qualified certificates for which the qualified status has been granted, i.e. qualified certificates for electronic signatures, qualified certificates for electronic seals, and/or qualified certificates for website authentication (as specified in clause 5.5.9.4). When, in accordance with Annex II of Regulation (EU) No 910/2014 [i.10], the above described service includes the management of the electronic signature creation data on behalf of the signatory for qualified electronic signatures as part of the provision of qualified electronic signature creation device, and/or includes the management of the electronic seal creation data on behalf of the seal creator for qualified electronic seals as part of the provision of qualified electronic signature creation device, then the qualified certificates for which the private key resides in such a device shall be further identified and specified through the use of a Qualifications extension (clause 5.5.9.2) within a Service information extension (clause 5.5.9) by using the appropriate criteria and qualifiers (clause 5.5.9.2.3). When the certificate validity status information (e.g. CRLs, OCSP responses) related to the qualified certificates issued by the listed "CA/QC" identified service are not signed by the private key corresponding to the listed public key and when no certificate chain/path exists from the related certificate validity status information services (either CRL issuing entities or OCSP responders) to the listed "CA/QC" identified service public key, those certificate validity status information services shall be listed separately. This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). NOTE: In the context of Regulation (EU) 910/2014 [i.10] the qualified status of each qualified trust service has to be provided in the relevant EU MS TL. This does not preclude technical means to collectively indicate the grant/withdrawal of a qualified status to a set of trust services in particular when they are components of a logical set of trust services to which the status is collectively provided. Standard practices lead to CA/QC services for which the private key corresponding to the listed Sdi public key is used not only to sign qualified certificates but also to sign certificates issued to certificate validity status information services (either CRL issuing entities or OCSP responders) when those information (e.g. CRLs, OCSP responses) are not directly signed by that private key. This is in line with the practices under Directive 1999/93/EC [i.3] and CD 2009/767/EC [i.2] for listing CA/QC (or even CA/QC being RootCA-QC) and for which it is not required to separately list the corresponding CRL issuing services or OCSP responders unless, when best and standard practise are not used by the corresponding TSPs, those entities are not signed by the listed CA/QC service or no certificate chain/path exists from those entities to the listed service. In those latter cases, listing those certificate validity status information services as separate entries in the TL is mandatory. Those are the rules that have been used so far since end 2009. There is nevertheless the ability for EU MS and TSPs to have their certificate validity status information services to be listed individually when this would be required. For a TSP situation where a single root CA is root-signing e.g. 40 issuing CAs each of them using one CRL issuer and one OCSP responder, requiring to list separately all such 3 component services would lead to have 120 entries in the TL instead of a single one, for the same effect when anyway the status is granted collectively to the whole hierarchy. In practice this would mean increasing the size and complexity of TL by at least a factor 3. Qualified time stamp services are not listed by inheritance of the CA/QC type. A separate entry with a distinct Sti needs to be used for this. Even when the same private key corresponding to the listed Sdi public key is used. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 32 (b) URI: http://uri.etsi.org/TrstSvc/Svctype/Certstatus/OCSP/QC Description: A certificate validity status information service issuing Online Certificate Status Protocol (OCSP) signed responses and operating an OCSP-server as part of a service from a (qualified) trust service provider issuing qualified certificates, in accordance with the applicable national legislation in the territory identified by the TL Scheme territory (see clause 5.3.10) or with Regulation (EU) No 910/2014 [i.10] whichever is in force at the time of provision. Requirement: This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (c) URI: http://uri.etsi.org/TrstSvc/Svctype/Certstatus/CRL/QC Description: A certificate validity status information services issuing and signing Certificate Revocation Lists (CRLs) and being part of a service from a (qualified) trust service provider issuing qualified certificates, in accordance with the applicable national legislation in the territory identified by the TL Scheme territory (see clause 5.3.10) or with Regulation (EU) No 910/2014 [i.10] whichever is in force at the time of provision. Requirement: This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (d) URI: http://uri.etsi.org/TrstSvc/Svctype/TSA/QTST Description: A qualified electronic time stamp generation service creating and signing qualified electronic time stamps in accordance with the applicable national legislation in the territory identified by the TL Scheme territory (see clause 5.3.10) or with Regulation (EU) No 910/2014 [i.10] whichever is in force at the time of provision. Requirement: This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (e) URI: http://uri.etsi.org/TrstSvc/Svctype/EDS/Q Description: A qualified electronic registered delivery service providing qualified electronic registered deliveries in accordance with the applicable national legislation in the territory identified by the TL Scheme territory (see clause 5.3.10) or with Regulation (EU) No 910/2014 [i.10] whichever is in force at the time of provision. Requirement: This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (f) URI: http://uri.etsi.org/TrstSvc/Svctype/EDS/REM/Q Description: A qualified electronic registered mail delivery service providing qualified electronic registered mail deliveries in accordance with the applicable national legislation in the territory identified by the TL Scheme territory (see clause 5.3.10) or with Regulation (EU) No 910/2014 [i.10] whichever is in force at the time of provision. Requirement: This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (g) URI: http://uri.etsi.org/TrstSvc/Svctype/PSES/Q Description: A qualified preservation service for qualified electronic signatures and/or qualified electronic seals in accordance with the applicable national legislation in the territory identified by the TL Scheme territory (see clause 5.3.10) or with Regulation (EU) No 910/2014 [i.10] whichever is in force at the time of provision. Requirements: When applicable, this service type shall be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) by using the appropriate identifiers indicating whether it is provided for electronic signatures and/or for electronic seals (as specified in clause 5.5.9.4). This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). ETSI ETSI TS 119 612 V2.4.1 (2025-08) 33 (h) URI: http://uri.etsi.org/TrstSvc/Svctype/QESValidation/Q Description: A qualified validation service for qualified electronic signatures and/or qualified electronic seals in accordance with the applicable national legislation in the territory identified by the TL Scheme territory (see clause 5.3.10) or with Regulation (EU) No 910/2014 [i.10] whichever is in force at the time of provision. Requirements: When applicable, this service type shall be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) by using the appropriate identifiers indicating whether it is provided for electronic signatures and/or for electronic seals (as specified in clause 5.5.9.4). This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (i) URI: http://uri.etsi.org/TrstSvc/Svctype/RemoteQSigCDManagement/Q Description: The management of remote qualified electronic signature creation devices as a qualified trust service carried out by a qualified trust service provider, in accordance with Regulation (EU) No 910/2014 [i.10]. Requirement: This service may fall under the category of services not using PKI public-key technology (see clause 5.5.3). (j) URI: http://uri.etsi.org/TrstSvc/Svctype/RemoteQSealCDManagement/Q Description: The management of remote qualified electronic seal creation devices as a qualified trust service carried out by a qualified trust service provider, in accordance with Regulation (EU) No 910/2014 [i.10]. Requirement: This service may fall under the category of services not using PKI public-key technology (see clause 5.5.3). (k) URI: http://uri.etsi.org/TrstSvc/Svctype/EAA/Q Description: The issuance of qualified electronic attestations of attributes by a qualified trust service provider in accordance with Regulation (EU) No 910/2014 [i.10]. Requirement: This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (l) URI: http://uri.etsi.org/TrstSvc/Svctype/ElectronicArchiving/Q Description: A qualified electronic archiving service provided by a qualified trust service provider in accordance with Regulation (EU) No 910/2014 [i.10]. Requirement: This service shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (m) URI: http://uri.etsi.org/TrstSvc/Svctype/Ledgers/Q Description: A qualified trust service for the recording of electronic data in qualified electronic ledgers by a qualified trust service provider in accordance with Regulation (EU) No 910/2014 [i.10] Requirement: This service may fall under the category of services not using PKI public-key technology (see clause 5.5.3). TLSOs from non-EU countries or international organizations may use the above URI's to identify the type of listed trust services that are meeting equivalent requirements to those laid down in the European legislation and in this case should use the appropriate service information extension (see clause 5.5.9) to further identify those sets of certificates meeting such requirements, in particular the Qualification extension when applicable (see clause 5.5.9.2). ETSI ETSI TS 119 612 V2.4.1 (2025-08) 34
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.1.2 Regulation (EU) No 910/2014 non qualified trust service types
|
Unless explicitly stated, those services shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (a) URI: http://uri.etsi.org/TrstSvc/Svctype/CA/PKC Description: A certificate generation service, not qualified, creating and signing non-qualified public key certificates based on the identity and other attributes verified by the relevant registration services. Requirements: When applicable, this service type shall be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) by using the appropriate identifiers indicating the nature of the public key certificates for which the status has been granted, i.e. certificates for electronic signatures, certificates for electronic seals, and/or certificates for website authentication (as specified in clause 5.5.9.4). When the certificate validity status information (e.g. CRLs, OCSP responses) related to the certificates issued by the listed "CA/PKC" identified service are not signed by the private key corresponding to the listed public key and when no certificate chain/path exists from the related certificate validity status information services (either CRL issuing entities or OCSP responders) to the listed "CA/PKC" identified service public key, those certificate validity status information services shall be listed separately. (b) URI: http://uri.etsi.org/TrstSvc/Svctype/Certstatus/OCSP Description: A certificate validity status service, not qualified, issuing Online Certificate Status Protocol (OCSP) signed responses. (c) URI: http://uri.etsi.org/TrstSvc/Svctype/Certstatus/CRL Description: A certificate validity status service, not qualified, issuing CRLs. (d) URI: http://uri.etsi.org/TrstSvc/Svctype/TSA Description: A time-stamping generation service, not qualified, creating and signing time-stamps tokens. (e) URI: http://uri.etsi.org/TrstSvc/Svctype/TSA/TSS-QC Description: A time-stamping service, not qualified, as part of a service from a trust service provider issuing qualified certificates that issues time-stamp tokens that can be used in the validation process of qualified signatures/seals or advanced signatures/seals supported by qualified certificates to ascertain and extend the signature/seal validity when the qualified certificate is (will be) revoked or expired (will expire). (f) URI: http://uri.etsi.org/TrstSvc/Svctype/TSA/TSS-AdESQCandQES Description: A time-stamping service, not qualified, as part of a service from a trust service provider that issues time-stamp tokens (TST) that can be used in the validation process of qualified signatures/seals or advanced signatures/seals supported by qualified certificates to ascertain and extend the signature/seal validity when the qualified certificate is (will be) revoked or expired (will expire). (g) URI: http://uri.etsi.org/TrstSvc/Svctype/EDS Description: An electronic delivery service, not qualified. (h) URI: http://uri.etsi.org/TrstSvc/Svctype/EDS/REM Description: A Registered Electronic Mail delivery service, not qualified. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 35 (i) URI: http://uri.etsi.org/TrstSvc/Svctype/PSES Description: A not qualified preservation service for electronic signatures and/or for electronic seals. Requirements: When applicable, this service type shall be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) by using the appropriate identifiers indicating whether it is provided for electronic signatures and/or for electronic seals (as specified in clause 5.5.9.4). (j) URI: http://uri.etsi.org/TrstSvc/Svctype/AdESValidation Description: A not qualified validation service for advanced electronic signatures and/or advanced electronic seals. Requirements: When applicable, this service type shall be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) by using the appropriate identifiers indicating whether it is provided for electronic signatures and/or for electronic seals (as specified in clause 5.5.9.4). (k) URI: http://uri.etsi.org/TrstSvc/Svctype/AdESGeneration Description: A not qualified generation service for advanced electronic signatures and/or advanced electronic seals. Requirements: When applicable, this service type shall be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) by using the appropriate identifiers indicating whether it is provided for electronic signatures and/or for electronic seals (as specified in clause 5.5.9.4). This service may fall under the category of services not using PKI public-key technology (see clause 5.5.3). (l) URI: http://uri.etsi.org/TrstSvc/Svctype/RemoteSigCDManagement Description: A not qualified trust service for the management of remote electronic signature creation devices, provided by a trust service provider that generates or manages electronic signature creation data on behalf of the signatory. Requirement: This service may fall under the category of services not using PKI public-key technology (see clause 5.5.3). (m) URI: http://uri.etsi.org/TrstSvc/Svctype/RemoteSealCDManagement Description: A not qualified trust service for the management of remote electronic seal creation devices, provided by a trust service provider that generates or manages electronic seal creation data on behalf of the seal creator. Requirement: This service may fall under the category of services not using PKI public-key technology (see clause 5.5.3). (n) URI: http://uri.etsi.org/TrstSvc/Svctype/EAA Description: The issuance of not qualified electronic attestations of attributes by a trust service provider in accordance with Regulation (EU) No 910/2014 [i.10]. (o) URI: http://uri.etsi.org/TrstSvc/Svctype/ElectronicArchiving Description: A not qualified electronic archiving service provided by a trust service provider in accordance with Regulation (EU) No 910/2014 [i.10]. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 36 (p) URI: http://uri.etsi.org/TrstSvc/Svctype/Ledgers Description: A not qualified trust service for the recording of electronic data in not qualified electronic ledgers by a trust service provider in accordance with Regulation (EU) No 910/2014 [i.10]. Requirement: This service may fall under the category of services not using PKI public-key technology (see clause 5.5.3). (q) URI: http://uri.etsi.org/TrstSvc/Svctype/PKCValidation Description: A not qualified trust service for the validation of certificates for electronic signatures, certificates for electronic seals, or certificates for website authentication. Requirements: Where applicable, this service type shall be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) by using the appropriate identifiers indicating whether it is provided for certificates for electronic signatures, certificates for electronic seals, and/or certificates for website authentication (as specified in clause 5.5.9.4). (r) URI: http://uri.etsi.org/TrstSvc/Svctype/PKCPreservation Description: A not qualified trust service for the preservation of certificates for electronic signatures or certificates for electronic seals. Requirements: Where applicable, this service type shall be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) by using the appropriate identifiers indicating whether it is provided for certificates for electronic signatures and/or for certificates for electronic seals (as specified in clause 5.5.9.4). (s) URI: http://uri.etsi.org/TrstSvc/Svctype/EAAValidation Description: A not qualified trust service for the validation of electronic attestation of attributes. (t) URI: http://uri.etsi.org/TrstSvc/Svctype/TSTValidation Description: A not qualified trust service for the validation of electronic timestamps. (u) URI: http://uri.etsi.org/TrstSvc/Svctype/EDSValidation Description: A not qualified trust service for the validation of data transmitted through electronic registered delivery services and the validation of related evidences. (v) URI: http://uri.etsi.org/TrstSvc/Svctype/EAA/Pub-EAA Description: The issuance of not qualified electronic attestation of attributes as defined in Article 3(46) of Regulation (EU) No 910/2014 [i.10], issued by or on behalf of a public sector body responsible for an authentic source, acting as a trust service provider and in accordance with that Regulation. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 37 (w) URI: http://uri.etsi.org/TrstSvc/Svctype/CA/PKC/CertsforOtherTypesOfTS Description: A certificate generation service, not qualified, creating and signing non-qualified public key certificates based on the identity and other attributes verified by the relevant registration services. The nature of those public key certificates for which the status has been granted are neither certificates for electronic signatures, nor certificates for electronic seals, nor certificates for website authentication. They are certificates for the provision of other trust services as referred to in Article 3(16) of Regulation (EU) 910/2014 [i.10]. Requirements: This service type shall not be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) using URIs referred to in subpoints (i), (ii) or (iii) of point (a) of clause 5.5.9.4. When the certificate validity status information (e.g. CRLs, OCSP responses) related to the certificates issued by the listed "CA/PKC/CertsforOtherTypesOfTS" identified service are not signed by the private key corresponding to the listed public key and when no certificate chain/path exists from the related certificate validity status information services (either CRL issuing entities or OCSP responders) to the listed "CA/PKC" identified service public key, those certificate validity status information services shall be listed separately. (x) URI: http://uri.etsi.org/TrstSvc/Svctype/PKCValidation/CertsforOtherTypesOfTS Description: A not qualified trust service for the validation of certificates for the provision of other trust services as referred to in Article 3(16) of Regulation (EU) 910/2014 [i.10]. Requirements: This service type shall not be further specified through the use of an additionalServiceInformation extension (clause 5.5.9.4) within a Service information extension (clause 5.5.9) using URIs referred to in subpoints (i), (ii) or (iii) of point (a) of clause 5.5.9.4. 5.5.1.3 Trust service types not defined in Regulation (EU) No 910/2014 but nationally defined Unless explicitly stated, those services shall not fall under the category of services not using PKI public-key technology (see clause 5.5.3). (a) URI: http://uri.etsi.org/TrstSvc/Svctype/RA Description: A registration service that verifies the identity and, if applicable, any specific attributes of a subject for which a certificate is applied for, and whose results are passed to the relevant certificate generation service. (b) URI: http://uri.etsi.org/TrstSvc/Svctype/RA/nothavingPKIid Description: A registration service • that verifies the identity and, if applicable, any specific attributes of a subject for which a certificate is applied for, and whose results are passed to the relevant certificate generation service, and • that cannot be identified by a specific PKI-based public key. This service falls under the category of services not using PKI public-key technology (see clause 5.5.3). (c) URI: http://uri.etsi.org/TrstSvc/Svctype/ACA Description: An attribute certificate generation service creating and signing attribute certificates based on the identity and other attributes verified by the relevant registration services. (d) URI: http://uri.etsi.org/TrstSvc/Svctype/SignaturePolicyAuthority Description: A service responsible for issuing, publishing or maintenance of signature policies. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 38 (e) URI: http://uri.etsi.org/TrstSvc/Svctype/Archiv Description: An Archival service. (f) URI: http://uri.etsi.org/TrstSvc/Svctype/Archiv/nothavingPKIid Description: An Archival service that cannot be identified by a specific PKI-based public key. This service falls under the category of services not using PKI public-key technology (see clause 5.5.3). (g) URI: http://uri.etsi.org/TrstSvc/Svctype/IdV Description: An Identity verification service. (h) URI: http://uri.etsi.org/TrstSvc/Svctype/IdV/nothavingPKIid Description: An Identity verification service that cannot be identified by a specific PKI-based public key. This service falls under the category of services not using PKI public-key technology (see clause 5.5.3). (i) URI: http://uri.etsi.org/TrstSvc/Svctype/KEscrow Description: A Key escrow service. (j) URI: http://uri.etsi.org/TrstSvc/Svctype/KEscrow/nothavingPKIid Description: A Key escrow service that cannot be identified by a specific PKI-based public key. This service falls under the category of services not using PKI public-key technology (see clause 5.5.3). (k) URI: http://uri.etsi.org/TrstSvc/Svctype/PPwd Description: Issuer of PIN- or password-based identity credentials. (l) URI: http://uri.etsi.org/TrstSvc/Svctype/PPwd/nothavingPKIid Description: Issuer of PIN- or password-based identity credentials that cannot be identified by a specific PKI-based public key. This service falls under the category of services not using PKI public-key technology (see clause 5.5.3). (m) URI: http://uri.etsi.org/TrstSvc/Svctype/TLIssuer Description: A service issuing trusted lists. (n) URI: http://uri.etsi.org/TrstSvc/Svctype/NationalRootCA-QC Description: A national root signing CA issuing root-signing or qualified certificates to trust service providers and related certification or trust services that are accredited against a national voluntary accreditation scheme or supervised under national law in accordance with the applicable European legislation. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 39 (o) URI: http://uri.etsi.org/TrstSvc/Svctype/unspecified Description: A trust service of an unspecified type. Requirements: When the "unspecified" Service type identifier is used, information about the nature and type of the listed service shall be provided in other ways such as through a service level extension (see clauses 5.5.6 or 5.5.9). This service may fall under the category of services not using PKI public-key technology (see clause 5.5.3).
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.2 Service name
|
Presence: This field shall be present. Description: It specifies the name under which the TSP identified in 'TSP name' (clause 5.4.1) provides the service whose type is identified in 'Service type identifier' (clause 5.5.1). Format: A sequence of multilingual character strings (see clause 5.1.4). Value: The name under which the TSP provides the service.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.3 Service digital identity
|
Presence: This field shall be present. Description: It specifies one and only one service digital identifier uniquely and unambiguously identifying the service with the type it is associated to (as identified in 'Service type identifier', clause 5.5.1). Format: When not using PKI public-key technology (e.g. for a service with a service type identifier of structure http://uri.etsi.org/TrstSvc/Svctype/.../nothavingPKIid or, wherever applicable, for any other URI value registered and described accordingly), an indicator expressed as a URI. When using PKI public-key technology, a tuple giving: - one or more X509Certificate elements expressed in Base64 encoded format as specified in XML-Signature [4]; - optionally, one X509SubjectName element that contains a Distinguished Name encoded as established by XML-Signature [4], clause 4.4.4; - optionally, a public key value expressed as a ds:KeyValue element [4]; - optionally, a public key identifier expressed as an X.509 certificate Subject Key Identifier (X509SKI element) as specified in XML-Signature [4]. Value: When not using PKI public-key technology (e.g. for a service with a service type identifier ending with the suffix "/nothavingPKIid", or wherever applicable), the indicator expressed as a URI shall be defined by the TLSO in a scheme specific context in such a way that it identifies uniquely and unambiguously the listed service. When using PKI public-key technology, the service digital identifier uniquely and unambiguously identifying the service (with the type it is associated with, as identified in 'Service type identifier', clause 5.5.1) shall be a public key associated with the TSP service and used to verify the authenticity of the provided service. EXAMPLE 1: The public key used for verifying signature on certificates, or the public key used for verifying signature on time-stamp tokens, or the public key for verifying signature on CRLs, or for verifying signature on OCSP responses, or more generally the public key used to verify signature on trust service outputs. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 40 NOTE 1: This can be the public key of a CA issuing end-entity certificates (e.g. non qualified end-entity certificates in the case of a service of type "CA/PKC", or qualified certificates in case of a service of type "CA/QC") or the public key of a root CA belonging to the TSP and from which a path can be found down to end-entity qualified certificates issued under the responsibility of this TSP. Depending on whether or not this information and the information to be found in every end-entity certificate issued under this CA can be used to unambiguously determine the appropriate characteristics of any qualified certificate, this information (Service digital identity) may need to be completed by 'Service information extensions' data (see clause 5.5.9). The service digital identifier shall be specified by at least one representation of this digital identifier. To represent this public key, implementations: - shall use at least one X509Certificate element [4] representing the same public key. It should be represented by exactly one certificate. The TLSO may list more than one certificate to represent the public key, but only when all those certificates relate to the same public key and have identical subject names identifying the TSP identified in clause 5.4.1 as holder of the key. When candidate certificates for representing the same public key do not have subject names identical to subject names of certificates already representing the same key, the TLSO shall not use these certificates as representation of this service digital identifier; - should additionally use the following representation of the same public key: the X509SubjectName element [4] to which the public key relates under the form of a Distinguished Name. this representation of the public key should not be used by applications in machine processable way; - may additionally use one or both of the following representations of the same public key: the public key value itself, i.e. a ds:KeyValue element [4]; the related public key identifier, i.e. the X.509 Certificate Subject Key Identifier (X509SKI element [4]). If public key representations are present more than once, all variants shall refer to the same public key. The same public key (and hence the same certificate representing this public key) shall not appear more than once in the trusted list for the same type of service. The same public key may appear more than once in the TL only when associated to trust services having different 'Service type identifier' ('Sti') values (e.g. public key used for verifying signatures on different types of Trust Services Tokens) for which different supervision/accreditation systems apply. EXAMPLE 2: When a TSP is using the same private key to sign on the one hand QCs under an appropriate supervision system for qualified trust services and on the other hand to sign non-qualified certificates falling under a different supervision/accreditation system, then in this case, two entries with different 'Sti' values (e.g. respectively CA/QC and CA/PKC in the given example) and with the same public key as service digital identity would be used. NOTE 2: Providing two or more certificates with the same public key is not regarded as two separate identifiers, but two representations of the same identifier provided they both have identical X.509 Subject Name values. NOTE 3: The re-keying of a trust service is resulting in using a new service entry in the trusted list (one service entry per new public key). When additional information needs to be provided with regard to the identified service entry, then, when appropriate, the TLSO shall consider the use of the 'additionalServiceInformation' extension (clause 5.5.9.4) of the 'Service information extension' field (clause 5.5.9) according to the purpose of providing such additional information. Additionally, the Scheme operator can optionally use the 'Scheme service definition URI' field (see clause 5.5.6). NOTE 4: The same public key, and hence private key, are not expected to be allocated to different subject names even if those names identify the same entity. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 41 With regards to X.509 Certificates that are candidates to represent a public key identifying a listed service, the TLSO shall disregard certificates for which the "O=" attribute does not strictly match the 'TSP Name' value (clause 5.4.1) except if no candidate certificate can be found to meet such a requirement. If the TSP cannot replace the candidate certificates for which the "O=" attribute fails to include the 'TSP Name' value (clause 5.4.1), the TLSO may include them in the TL. When doing so, the TLSO shall provide, for such listed certificates, a formal statement in the 'Scheme service definition URI' (clause 5.5.6) indicating that they are issued to and owned by the TSP identified by the 'TSP Name' value even if the 'TSP Name' value in the TL and the "O=" value in the certificate differ. Those "O=" values distinct from the 'TSP Name' value shall then be listed as 'TSP Trade Name' values (clause 5.4.2). The content of the X509SKI element shall be the same as the content of the SubjectKeyIdentifier extension of the listed certificate(s). TLSO and/or the body in charge to which it depends or by which it is mandated may decide to use the public key of a Root or Upper level CA from this TSP as the 'Sdi' of a single entry in the list of services from a listed TSP. The consequences (advantages and disadvantages) of such a decision shall be notified by the TLSO to the corresponding TSP. In addition, TLSOs shall provide in 'Scheme service definition URI' (clause 5.5.6) the necessary documentation to facilitate the certification path building and verification. EXAMPLE 3: An example of use of the public key of a Root or Upper level CA is a Certification Authority not directly issuing end-entity QCs, timestamps or other trust service outputs but certifying a hierarchy of CAs down to CAs issuing QCs to end-entities, or down to a TSU issuing timestamps, or down to units signing validation reports or other trust service outputs. NOTE 5: Using a RootCA public key as 'Sdi' value for a listed service will force the TLSO to consider the whole set of trust services under such a Root CA as a whole with regards to its 'service status' (clause 5.5.4). The revocation being required for one single CA under the listed root hierarchy, will force the whole hierarchy to take-on that status change. When "Service digital identifiers" are used as trust anchors in the context of validating electronic signatures for which signer's certificate is to be validated against TL information, only the public key and the associated subject name are needed as trust anchor information. When more than one certificate is representing the public key identifying the service, they are considered as trust anchor certificates conveying identical information with regards to the information strictly required as trust anchor information.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.4 Service current status
|
Presence: This field shall be present. Description: It specifies the identifier of the current status of the service. Format: An identifier expressed as an URI. Value: In the context of EU Member States, from the date Regulation (EU) No 910/2014 [i.10] applies: i) The identifier of the status of the services of a type specified in clause 5.5.1.1 shall be either "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/granted" or "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/withdrawn" as defined in clause D.5. ii) The identifier of the status of the services of a type specified in clause 5.5.1.2 or in clause 5.5.1.3 shall be either "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/recognisedatnationallevel" or "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/deprecatedatnationallevel" as defined in clause D.5. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 42 The TLSOs shall use respectively the following status flow for the allocation of those 'Service current status' values: Figure 2 The migration of the 'Service current status' value of services listed in EUMS trusted list as of the day before the date Regulation (EU) No 910/2014 [i.10] applies (i.e. 30 June 2016) shall be executed on the day the Regulation applies (i.e. 01 July 2016) as specified in annex J. As from the day Regulation (EU) No 910/2014 [i.10] applies (i.e. 01 July 2016), when a trust service is first approved for being listed in the trusted list, the initial status shall be respectively "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/granted" or "http://uri.etsi.org/TrstSvc/TrustedList/Svcstatus/recognisedatnationallevel". In the context of non-EU countries and international organizations the current status value shall be one of the values specified by the TLSO through the 'Scheme information URI' (see clause 5.3.7).
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.5 Current status starting date and time
|
Presence: This field shall be present. Description: It specifies the date and time on which the current approval status became effective. Format: Date-time value (see clause 5.1.3). Value: Coordinated Universal Time (UTC) at which the current approval status became effective. TLSO shall ensure the consistency of the (re)-issuance of a trusted list and the actual date when a service status has been updated (e.g. granted or withdrawn), i.e. the 'List issue date and time' (clause 5.3.14), the time of signing the trusted list and the time of change. The date and time associated to the new current status of a listed service shall not be set before the date of (re)issuance of the trusted list as retroactive status change can have undesired effects to previous validations of listed services and of their outputs. NOTE: The relying parties can apply this information by comparing it with other available information, e.g. the date and time on which a certificate or a time-stamp was issued. From the comparison, the user can determine whether the specific service of the TSP had the desired approval status under the scheme at the date and time when the service was provided.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.6 Scheme service definition URI
|
Presence: This field is optional. Description: It specifies the URI(s) where relying parties can obtain service-specific information provided by the TL scheme operator. Format: A sequence of multilingual pointers (see clause 5.1.4). Value: The referenced URI(s) shall provide a path to information describing the service as specified by the scheme. In particular this may include: a) URI indicating the identity of the fallback TSP in the event of the supervision of a service in cessation for which a fallback TSP is involved (see 'Service current status', clause 5.5.4); b) URI leading to documents providing additional information related to the use of some nationally defined specific qualification for an approved trust service token provisioning trust service in consistence with the use of 'Service information extension' field (clause 5.5.9) with an 'additionalServiceInformation' extension as defined in clause 5.5.9.4. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 43
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.7 Service supply points
|
Presence: This field is optional. Description: It specifies one or more URIs where relying parties can access the service, or component services or other types of services related with the service. Optionally, for each URI it specifies the type of service that can be accessed at this URI. Format: Non-empty sequence of URIs, each such URI being optionally further specified with a non-empty URI. Value: The referenced URI(s) shall specify where and how the service can be accessed. EXAMPLE: A 'Service supply points' field associated to a service (identified in 'Service digital identity', clause 5.5.3) of a type "http://uri.etsi.org/TrstSvc/Svctype/CA/QC" (as identified in 'Service type identifier', clause 5.5.1) could include: - a URI pointing towards a descriptive text where users could be given information on (local) registration authorities and procedures to follow for being issued qualified certificates; - a URI providing a CRL distribution point [12] giving certificate status information for qualified certificates issued by or under the service identified in 'Service digital identity', clause 5.5.3, and further specified by a type having value "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/CRL/QC". Such URI can for example provide access to a last and final CRL in case of service unexpected termination and/or impossibility to provide such a final CRL at the CRL distribution point available from issued certificate's extensions; and/or - a URI providing one access location of an OCSP [i.11] responder authorized to provide certificate status information for qualified certificates issued by or under the service identified in 'Service digital identity' (clause 5.5.3), and further specified by a type having value "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/OCSP/QC". NOTE: Both human processable and machine processable supply points can be provided.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.8 TSP service definition URI
|
Presence: When the service type is "http://uri.etsi.org/TrstSvc/Svctype/NationalRootCA-QC" (clause 5.5.1.3), this field shall be present. In other cases, this field is optional. Description: It specifies the URI(s) where relying parties can obtain service-specific information provided by the TSP. Format: A sequence of multilingual pointers (see clause 5.1.4). Value: The referenced URI(s) shall provide a path to information describing the service as specified by the TSP. When the service type is "http://uri.etsi.org/TrstSvc/Svctype/NationalRootCA-QC" (clause 5.5.1.3), this field shall specify the URI(s) where relying parties can obtain service-specific information provided by the TSP including details on the establishment and management rules of such services and relevant national legislation where rules for national root scheme exist in legislation.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9 Service information extensions
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9.0 General
|
Presence: This field is optional. Description: It specifies specific service-related information. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 44 Format: Sequence of service information extensions, each of which is formatted as specified in next clauses and each of which may be selected by the TLSO according to the meaning and information it wishes or needs to convey within its TL. Value: Pre-defined extensions are specified in next clauses with regards to: - indication of the time from which a listed trust service creating and signing CRLs or signed OCSP responses keeps revocation notices for revoked certificates also after they have expired (see clause 5.5.9.1); - information provided on characteristics of qualified certificates (i.e. qualified certificate nature, issuance to legal person, corresponding private key residing or not in an SSCD or in a QSCD) created and signed by a listed trust service when such information is not part of the certificates (see clause 5.5.9.2); - information on the taking over of a listed trust service by another trust service provider than the one identified by the TSP Name (clause 5.4.1), including the identification of the taking over trust service provider, the taking over process and its consequences on subscribers and relying parties (see clause 5.5.9.3); - additional service information (see clause 5.5.9.4).
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9.1 expiredCertsRevocationInfo Extension
|
Presence: This field is optional but may only be present when used with the following 'Service types' (clause 5.5.1): - "http://uri.etsi.org/TrstSvc/Svctype/CA/PKC"; - "http://uri.etsi.org/TrstSvc/Svctype/CA/QC"; - "http://uri.etsi.org/TrstSvc/Svctype/NationalRootCA-QC"; - "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/OCSP"; "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/OCSP/QC"; - "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/CRL"; "http://uri.etsi.org/TrstSvc/Svctype/Certstatus/CRL/QC"; - other applicable service types defined by the TLSO in accordance with clause D3. It shall not be used with other types. This extension shall not be set critical. Description: This extension supports the same function as in ISO/IEC 9594-8 [i.12], clause 8.5.2.12. It indicates: - that the scope of each CRL and OCSP response, issued by the service to which this extension applies, is extended to include the revocation status of certificates that expired at the exact time specified in the extension or after that time; - that the revocation status of a certificate will not be updated once the certificate has expired (this behaviour being openly allowed by ISO/IEC 9594-8 [i.12] and IETF RFC 5280 [12]); and - that if limitations in the CRL's scope are specified (by either reason codes or by distribution points), they apply to expired certificates as well. Format: Date-time value (see clause 5.1.3). ETSI ETSI TS 119 612 V2.4.1 (2025-08) 45 Value: If a CRL contains the extension expiredCertsOnCRL defined in [i.12], it shall prevail over the TL extension value but only for that specific CRL. If an OCSP response contains the extension ArchiveCutoff defined in section 4.4.4 of IETF RFC 6960 [i.11], it shall prevail over the TL extension value but only for that specific OCSP response.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9.2 Qualifications Extension
| |
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9.2.0 General
|
Presence: This field shall be present when the information present in the qualified certificates created and signed by or under a listed trust service of the type "CA/QC" does not allow machine-processable identification: - of the fact that it is a claimed qualified certificate or not; and/or - whether or not the private key corresponding to the certified public key resides in an SSCD or in a QSCD; and/or - whether the certificate has been issued to a legal person; and/or - whether the certificate has been issued for electronic signatures, for electronic seals or for web site authentication. If this extension is marked "critical" a certificate validation process shall discard the certificate under validation if it cannot parse and understand its entire semantic. Description: The qualifications extension is specified by a set of Qualification Elements, each one expressed as a list of assertions to be verified and a list of qualifiers that apply to the examined certificate when all the assertions are verified. The certificate is qualified with all the qualifiers obtained with the application of all the qualification elements. Format: A non-empty sequence of one or more Qualification Elements defined below in clause 5.5.9.2.1. For the formal definition see Qualifications element in the schema referenced by annex C.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9.2.1 QualificationElement
|
Presence: This field shall be present. Description: This field bundles a list of assertions (criteria) that specifies the attributes identifying the certificates (e.g. certain key-usage-bits set) to which a list of qualifiers apply that specify some certificate properties (e.g. it is a qualified certificate or not, the corresponding private key resides in an SSCD/QSCD or not, the subject of the certificate is a legal person). Format: A tuple consisting of a list of assertions (CriteriaList, see clause 5.5.9.2.2) and a list of qualifiers (Qualifiers, see clause 5.5.9.2.3). For the formal definition see QualificationElementType element in the schema referenced by annex C.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9.2.2 CriteriaList
|
5.5.9.2.2.0 General Presence: This field shall be present. Description: It provides a list of assertions related to certificate contents (e.g. key usage) and/or status (e.g. additional assessment) used to filter certificates. An assertion can be itself a CriteriaList allowing a recursive definition. An optional Description field allows the schema operator to specify the rationale of the defined criteria. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 46 Format: A non-empty sequence of assertions whose syntax is specified in clauses 5.5.9.2.2.1 to 5.5.9.2.2.3 followed by a matching criteria indicator that can have the following values: - "all" if all of the assertion shall be met; - "atLeastOne" if at least one of the assertion shall be met; or - "none" if all the assertions shall not be met; for the given set of qualifiers, related to the CriteriaList, to apply. For the formal definition see CriteriaListType element in the schema referenced by annex C. An optional Description field expressed as a character string. If present the description shall be expressed in UK English. 5.5.9.2.2.1 KeyUsage Presence: This field is optional. Description: It provides a list of key usage bit-values to match with the correspondent bits present in the keyUsage certificate Extension. The assertion is verified if the KeyUsage Extension is present in the certificate and all key usage bits provided are matched with the corresponding bit in the certificate KeyUsage Extension. Format: A non-empty sequence of tuples composed by a Key Usage Bit identifier and the asserted value. The key usage bits identifiers shall be those defined in Recommendation ITU-T X.509 [1] for the KeyUsage Extension. For the formal definition see KeyUsageType element in the schema referenced by annex C. 5.5.9.2.2.2 PolicySet Presence: This field is optional. Description: It provides list of Certificate Policy identifiers to match with the content of the CertificatePolicy certificate Extension. The assertion is verified if the CertificatePolicy Extension is present in the certificate and all the Certificate Policy identifiers provided are present in the certificate CertificatePolicy Extension. Format: A sequence of one of more Object Identifiers indicating a Certificate Policy. For the formal definition see PoliciesListType element in the schema referenced by annex C. 5.5.9.2.2.3 OtherCriteria Presence: This field is optional. Description: It allows the inclusion of new criteria that can be required by TL Scheme Operators for additional assertions on certificate content/status. Here follows some OtherCriteria definition, new criteria can be added in future. If not included in the following list it is the responsibility of the TLSO that defines a new criteria to publish the related definition in an effective way. 1) ExtendedKeyUsage: Presence: This field is optional. Description: It provides a non-empty list of key purposes values to match with the correspondent KeyPurposes present in the ExtendedKeyUsage certificate Extension. The assertion is verified if the ExtendedKeyUsage Extension is present in the certificate and all key purposes provided are present in the certificate ExtendedKeyUsage Extension. Format: A non-empty sequence of KeyPurposes, whose semantic shall be as defined in Recommendation ITU-T X.509 [1] for the ExtendedKeyUsage Extension. For the formal definition see ExtendedKeyUsage element in the schema referenced by annex C. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 47 2) CertSubjectDNAttribute: Presence: This field is optional. Description: It provides a non-empty set of OIDs. Each OID maps to a possible attribute in the Subject DN of the certificate. The criterion is matched if all OID refers to an attribute present in the DN. Format: A non-empty sequence of OIDs representing Directory attributes, whose meaning respect the description above. For the formal definition see CertSubjectDNAttribute element in the schema referenced by annex C.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9.2.3 Qualifier
|
Presence: This field shall be present. Description: It specifies the properties a certificate with the specified criteria possesses. Format: Sequence of indicators expressed as URIs. Value: The following qualifiers shall only be used when the type of the service to which it applies is "CA/QC". They are defined in clause D.5: - QCWithSSCD ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCWithSSCD"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, have their private key residing in an SSCD; - QCNoSSCD ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCNoSSCD"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, do not have their private key residing in an SSCD; - QCSSCDStatusAsInCert ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/ QCSSCDStatusAsInCert"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, do contain proper machine processable information about whether or not their private key residing in an SSCD; - QCWithQSCD ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCWithQSCD"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, have their private key residing in a QSCD; - QCNoQSCD ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCNoQSCD"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, do not have their private key residing in a QSCD; - QCQSCDStatusAsInCert ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCQSCDStatusAsInCert"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, do contain proper machine processable information about whether or not their private key residing in a QSCD; - QCQSCDManagedOnBehalf ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCQSCDManagedOnBehalf"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, have their private key residing in a QSCD for which the generation and management of that private key is done by the qualified TSP on behalf of the entity whose identity is certified in the certificate; - QCForLegalPerson ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForLegalPerson"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, are issued to legal persons; - QCForESig ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForESig"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, are issued for electronic signatures; ETSI ETSI TS 119 612 V2.4.1 (2025-08) 48 - QCForESeal ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForESeal"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, are issued for electronic seals; - QCForWSA ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCForWSA"): to indicate that all certificates identified by the applicable list of criteria, when they are claimed or stated as being qualified, are issued for web site authentication; - NotQualified ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/NotQualified"): to indicate that all certificates identified by the applicable list of criteria are not to be considered as qualified certificates; - QCStatement ("http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/QCStatement"): to indicate that all certificates identified by the applicable list of criteria are issued as qualified certificates. The QCStatement qualifier shall be used with extreme caution by MS Scheme Operators and Supervisory/Accreditation Bodies when and only when: strong evidence exists that certificates identified through the applied filters are indeed to be considered as qualified certificates; and no machine processable information is present in the certificates to indicate that it is used as a qualified certificate (i.e. no use of QcCompliance statement [i.9] or a QCP/QCP+ OID [i.5]).
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9.3 TakenOverBy Extension
|
Presence: This field shall be present when a service that was formerly under the legal responsibility of a TSP is taken over by another TSP. Description: It specifies the identity of the TSP having taken over the responsibility of the service to which this extension applies and is meant to state formally the nature of this legal responsibility and to enable the verification software to display to the user some legal detail. Format: This extension contains an URI, and a sequence of the following attributes: - The TSP name, as defined in clause 5.4.1. - The Scheme operator name as specified in clause 5.3.4. - The Scheme territory as specified in clause 5.3.10. - An optional additional information field for further qualification of the taking over TSP, to be defined in future versions of the present document or by schema operators as schema specific. Value: When a listed service is taken over by another TSP than the one under which the service is listed, the related service entry in the TL shall not be copied by the TLSO or moved inside the taking over TSP list of services and it is under the responsibility of the TLSO to maintain up to date the correct service trust state. If the taking over TSP issues a new digital identity related to the taken over service (e.g. a new self-signed certificate for a CA) then a new service entry shall be created under the taking over TSP. If the previous service is still in operation, even for a limited scope (e.g. CRL issuing as for the example above) its status shall be maintained by the TLSO, according to the established rules, until the service terminates its operations. This extension contains an URI, pointing towards a descriptive text that shall provide detailed information to the user about who is the entity currently responsible for the service and detailed information about the taken over process and its consequences on subscribers and relying parties. In addition this extension contains a set of attributes, uniquely identifying the taking over TSP allowing the application to locate this TSP in the TL, if present, and to display its details. The content of this extension is not meant to enforce any specific action on the signature validation. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 49 If this extension is marked "critical" a certificate validation process shall discard the certificate under validation if it cannot parse and understand its entire semantic. This extension shall be implemented with the TakenOverBy element defined in the schema referenced by annex C.
|
c2bb6e991a732a7c4e762f03ed205a28
|
119 612
|
5.5.9.4 additionalServiceInformation Extension
|
Presence: This field is optional. Description: It specifies additional information on a service. Format: A sequence of one or more tuples, each tuple providing the information detailed below. A TL may have more than one additionalServiceInformation extension in the same service entry, each extension giving: a) an URI identifying the additional information. Possible values, not limited to the following: i) "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/ForeSignatures": in order to further specify the "Service type identifier" identified service as being provided for electronic signatures; ii) "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/ForeSeals": in order to further specify the "Service type identifier" identified service as being provided for electronic seals; iii) "http://uri.etsi.org/TrstSvc/TrustedList/SvcInfoExt/ForWebSiteAuthentication": in order to further specify the "Service type identifier" identified service as being provided for web site authentication; iv) a registered URI to further qualify a "Service type identifier" (clause 5.5.1), in order to further specify the "Service type identifier" identified service as being a component service of a trust service provider issuing QC (e.g. "RootCA-QC" service type qualification extension of a "CA/QC" service type as specified in clause D.4); v) an URI indicating some nationally defined specific qualification for a supervised/accredited Trust Service Token provisioning service. EXAMPLES: • a specific security/quality granularity level with regard to national supervision/accreditation system for TSPs not issuing QCs (e.g. RGS */**/*** in France, specific "supervision" status set by national legislation for specific TSPs issuing QCs in Germany); or • a specific legal status for a supervised/accredited Trust Service Token provisioning (e.g. nationally defined "qualified TST" as in Germany, Hungary or Italy); or • meaning of a specific Policy identifier present in a X.509v3 certificate provided in "Sdi" field. b) an optional string containing the serviceInformation classification, with a meaning as specified in the scheme (e.g. in France services are classified with specifically registered URI in line with the possible RGS classification values); c) any optional additional information provided in a scheme-specific format. Value: This extension may be used to provide, for a given service, additional information that may help to verify the applicability of the given service for a certain purpose. Dereferencing the URI should lead to human readable information (as a minimum in UK English language and potentially in one or more national languages) which is deemed appropriate and sufficient for a relying party to understand the extension, and in particular explaining the meaning of the given URIs, specifying the possible values for serviceInformation and the meaning for each value. ETSI ETSI TS 119 612 V2.4.1 (2025-08) 50
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.