Define a first-class certificate profile engine for X.509 issuance #4
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Introduce a profile layer above the current PKI/X.509 foundation so that issuance behavior can be driven by reusable certificate profiles rather than by ad hoc attribute wiring. This profile engine should become the basis for concrete templates such as MikroTik IPsec, Windows IPsec, OpenSwan IPsec, nginx/TLS server certificates, user certificates, infrastructure certificates, and later ACME-driven issuance.
Why this matters
The current PKI/X.509 base is a good substrate for issuance and status handling, but regulated deployments need controlled, reviewable, profile-driven issuance rather than raw framework attributes and one-off issuance rules.
Acceptance criteria