<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="pending.xsl"?>

<certificates type="pending">

  <authority name="KISA" url="http://www.rootca.or.kr/" status="incomplete">
    <summary>Korea Information Security Agency (KISA) is the
      Electronic Signature Authorization Management Center for South
      Korea. The Korean Certification Authority Central (KCAC) of KISA
      issues certificates to intermediate CAs ("licensed CAs"
      or LCAs), which then issue end entity certificates to Korean
      citizens, businesses, and other organizations.</summary>
    <audit type="Government (WebTrust equivalent)">
      <auditor url="http://www.mopas.go.kr">Ministry of Public Administration and Security (MOPAS)</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=479645">Audit Statement</document>
    </audit>

    <certificate name="KISA RootCA 1" status="incomplete">
      <summary>Certificates are issued from this root only to KISA's 
        LCAs (Licensed CAs), not directly to end entities. 
        </summary>
      <data url="http://www.rootca.or.kr/certs/root-rsa-3280.der"
            version="3"
            sha1="02:72:68:29:3E:5F:5D:17:AA:A4:B3:C3:E6:36:1E:1F:92:57:5E:AA"
            modulus="2048"
            from="2005-08-24"
            to="2025-08-24"/>
      <crl url="http://www.rootca.or.kr/certs/root-rsa-3280.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://www.rootca.or.kr/kor/accredited/accredited02.jsp">Document Repository</document>
      <document url="http://www.rootca.or.kr/kor/down/cps15.pdf">CPS (Korean)</document>
      <document url="http://www.rootca.or.kr/kor/down/cps15(en).pdf">CPS (English)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=594638">Korea Electronic Signature Act (English)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=594640">Korea Electronic Signature Act Enforcement Regulations (English)</document>
      <document url="http://www.rootca.or.kr/kor/standard/standard02.jsp">Certificate Issuing Procedure Guidelines(Korean)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=594641">Certificate Issuing Procedure Guidelines(English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=335197</authorisation>
        <technical></technical>
      </inclusion>
    </certificate>
    <comments></comments>
  </authority>

  <authority name="S-TRUST" url="https://www.s-trust.de/" status="complete">
    <summary>Deutscher Sparkassen Verlag GmbH is the world's largest
      smartcard provider and the central certification service
      provider for all German savings banks. This CA exists to enable
      up to 40 million German customers (end-users) to use their
      banking card as a certificate based signature, encryption and
      authentication device.</summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.tuvit.de/">TÜV-IT</auditor>
      <document url="http://www.tuvit.de/certuvit/pdf/6701UE.pdf">
      ETSI TS 101.456 Certificate</document>
    </audit>
    <audit type="ETSI TS 102.042">
      <auditor url="http://www.tuvit.de/">TÜV-IT</auditor>
      <document url="http://www.tuvit.de/certuvit/pdf/6702UE.pdf">
      ETSI TS 102.042 Certificate</document>
    </audit>
    <certificate name="S-TRUST Qualified Root CA 2008-001:PN" status="complete">
      <summary>This root will provide all customers of the German
        Savings Bank Financial Group with client certificates for
        their signature-enabled debit cards (smartcards).</summary>
      <data url="http://www.s-trust.de/service_support/zertifikatsmanagement/verzeichnisdienste/download_wurzelzertifikate1/ordner_crt_dateien/S-TRUSTQualifiedRootCA2008-00l_v3_509.crt"
            version="3"
            sha1="C9:2F:E6:50:DB:32:59:E0:CE:65:55:F3:8C:76:E0:B8:A8:FE:A3:CA"
            modulus="2048"
            from="2007-12-31"
            to="2012-12-30"/>
      <crl url="http://onsitecrl.s-trust.de/DeutscherSparkassenVerlagGmbHSTRUSTQualifiedRootCA2008001PN/LatestCRL.crl">CRL</crl>
      <ocsp>http://ocsp-q.s-trust.de</ocsp>
      <type>IV</type>
      <document url="http://www.s-trust.de/stn-cps/stn_cps.pdf">Certification Practice Statement for the S-TRUST Network</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=370627</authorisation>
      </inclusion>
      <comments>Not approved for inclusion.</comments>
    </certificate>
    <certificate name="S-TRUST Qualified Root CA 2007-001:PN" status="complete">
      <summary>This root will provide all customers of the German
        Savings Bank Financial Group with client certificates for
        their signature-enabled debit cards (smartcards).</summary>
      <data url="http://www.s-trust.de/service_support/zertifikatsmanagement/verzeichnisdienste/download_wurzelzertifikate/ordner_crt_dateien/STRUSTQualifiedRootCA2007-001.crt"
            version="3"
            sha1="7A:3C:1B:60:2E:BD:A4:A1:E0:EB:AD:7A:BA:4F:D1:43:69:A9:39:FC"
            modulus="2048"
            from="2006-12-31"
            to="2011-12-30"/>
      <crl url="http://onsitecrl.s-trust.de/DeutscherSparkassenVerlagGmbHSTRUSTQualifiedRootCA2007001PN/LatestCRL.crl">CRL</crl>
      <ocsp>http://ocsp-q.s-trust.de</ocsp>
      <type>IV</type>
      <document url="http://www.s-trust.de/stn-cps/stn_cps.pdf">Certification Practice Statement for the S-TRUST Network</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=370627</authorisation>
        <technical></technical>
      </inclusion>
      <comments>Not approved for inclusion.</comments>
    </certificate>
    <certificate name="S-TRUST Qualified Root CA 2006-001:PN" status="complete">
      <summary>This root will provide all customers of the German
        Savings Bank Financial Group with client certificates for
        their signature-enabled debit cards (smartcards).</summary>
      <data url="http://www.s-trust.de/service_support/zertifikatsmanagement/verzeichnisdienste/download_wurzelzertifikate/ordner_crt_dateien/S-TRUST_Qualified_Root_CA_2006-001_PN.crt"
            version="3"
            sha1="7D:DC:76:1C:FD:AF:4C:E0:3A:B5:3A:DD:C9:FA:13:35:19:A3:DE:C9"
            modulus="2048"
            from="2005-12-31"
            to="2010-12-30"/>
      <crl url="http://onsitecrl.s-trust.de/DeutscherSparkassenVerlagGmbHSTRUSTQualifiedRootCA2006001PN/LatestCRL.crl">CRL</crl>
      <ocsp>http://ocsp-q.s-trust.de</ocsp>
      <type>IV</type>
      <document url="http://www.s-trust.de/stn-cps/stn_cps.pdf">Certification Practice Statement for the S-TRUST Network</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=370627</authorisation>
        <technical></technical>
      </inclusion>
      <comments>Not approved for inclusion.</comments>
    </certificate>
  </authority>

  <authority name="Austrian TCC" url="http://www.signatur.rtr.at/"      status="complete">
    <summary>The Telekom-Control Commission is the Austrian supervisory authority for electronic signatures. Its
responsibility includes supervision of all certification service providers
established in Austria. For every CA key used by an
Austrian certification service provider, the TKK issues a certificate to the
certification service provider. Based on these certificates, all certificates
issued by supervised Austrian certification service providers can be verified.
There are five subordinate CAs, each of which issues certificates for a different purpose.
</summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.a-sit.at/">Secure Information Technology Center - Austria</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=204776">Conformity Assessment Statement</document>
    </audit>

    <certificate name="Telekom-Control-Kommission Top 1" status="complete">
      <summary>The TKK issues certificates to certification service providers who are
supervised according to the Austrian Electronic Signatures Act.
The corresponding private keys of certification service
providers are used for issuing certificates to end entities (signatories).</summary>
      <data url="http://www.signatur.rtr.at/currenttop.cer"
            version="3"
            sha1="91:49:29:EE:C7:A0:21:B5:DA:49:1A:35:A5:98:4C:2C:F2:5B:C7:55"
            modulus="2048"
            from="2005-09-13"
            to="2010-09-13"/>
      <crl url="http://www.signatur.rtr.at/current.crl">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>OV</type>

      <document url="http://www.signatur.rtr.at/repository/tkk-cp-10-20020909-de.pdf">Certificate
      Policy</document>
      <document url="http://www.signatur.rtr.at/repository/tkk-cps-14-20060612-de.pdf">Certificate
      Practice Statement</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=373174</authorisation>
        <technical></technical>
      </inclusion>
      <comments>CRL doesn't work in Firefox - bug 133191.</comments>
    </certificate>
  </authority>

  <authority name="Symantec / VeriSign" url="http://www.symantec.com" status="approved">
    <summary>Symantec acquired the VeriSign Authentication Services and root certificates, 
    and is a major commercial CA with worldwide operations and customer base.</summary>
    <audit type="WebTrust CA and WebTrust EV">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document
      url="https://cert.webtrust.org/SealFile?seal=304&amp;file=pdf">
      Audit Reports and Management's Assertions</document>
    </audit>
    <certificate name="VeriSign Universal Root Certification Authority" status="approved">
      <summary>
        This request is to EV-enable this SHA256 root which is currently included in NSS.
        This root is currently used to sign the VeriSign Class 3 SSP Intermediate CA - G2, 
        which is used to issue Non-Federal SSP SHA256 CAs to customers, but those SubCAs are 
        operated internally by Symantec. 
        This root will be used in the future to sign certificates for SSL-enabled servers, 
        and may be used to sign certificates for digitally-signed executable code objects.

      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=368998"
            version="3"
            sha1="36:79:CA:35:66:87:72:30:4D:30:A5:FB:87:3B:0F:A7:7B:B7:0D:54"
            modulus="2048"
            from="2008-04-01"
            to="2037-12-01"/>
      <crl url="http://crl.ws.symantec.com/universal-root.crl">CRL</crl>
      <ocsp>http://ocsp.ws.symantec.com</ocsp>
      <type>OV, EV (Policy OID 2.16.840.1.113733.1.7.23.6)</type>
      <document url="http://www.verisign.com/repository/CPS/">VeriSign Certification Practice Statement</document>
      <document url="http://www.verisign.com/repository/vtnCp.html">VeriSign Trust Network Certificate Policies</document>
      <document url="http://www.verisign.com/repository/hierarchy/hierarchy.pdf">CA Hierarchy Diagram</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=536318</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=515470</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=872288</ev>
      </inclusion>
      <comments></comments>
    </certificate>
</authority>

<authority name="Symantec / GeoTrust" url="http://www.geotrust.com/" status="approved">
    <summary>GeoTrust is a subsidiary of Symantec. Symantec acquired the VeriSign Authentication Services 
    and root certificates, and is a major commercial CA with worldwide operations and customer base.
    </summary>
    <audit type="WebTrust CA and WebTrust EV">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document
      url="https://cert.webtrust.org/SealFile?seal=650&amp;file=pdf">Audit
      Report and Management's Assertions</document>
    </audit>
    <certificate name="GeoTrust Primary Certification Authority - G3" status="approved">
      <summary>
        This request is to EV-enable the SHA256 root which is currently included in NSS.
        This CA will be used to sign certificates for SSL-enabled servers, 
        and may in the future be used to sign certificates for 
        digitally-signed executable code objects. 
        </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=368997"
            version="3"
            sha1="03:9E:ED:B8:0B:E7:A0:3C:69:53:89:3B:20:D2:D9:32:3A:4C:2A:FD"
            modulus="2048"
            from="2008-04-01"
            to="2037-12-01"/>
      <crl url="http://crl.geotrust.com/GeoTrustPCA-G3.crl">CRL</crl>
      <ocsp>http://pca-g3-ocsp.geotrust.com</ocsp>
      <type>DV, OV, EV (OID 1.3.6.1.4.1.14370.1.6)</type>
      <document url="http://www.geotrust.com/resources/repository/legal/">Document Repository</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/GeoTrustCPS-Version1.1.12.pdf">GeoTrust Certification Practice Statement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/gt_ssl_SA_v.3.0.pdf">GeoTrust Subscriber Agreement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/gt_ssl_rpa_v.2.0.pdf">GeoTrust Relying Party Agreement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/reseller_agreement_6.1.pdf">GeoTrust Reseller Agreement</document>
      <document url="http://www.geotrust.com/resources/cps/pdfs/enterprisessl_agreement-3.0.pdf">GeoTrust EnterpriseSSL Agreement</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=539255</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=517234</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=872294</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

 <authority name="Symantec / thawte" url="http://www.thawte.com/" status="approved">
    <summary>Thawte is a subsidiary of Symantec. Symantec acquired the VeriSign Authentication 
    Services and root certificates, and is a major commercial CA with worldwide operations and customer base.
    </summary>
    <audit type="WebTrust/WebTrust EV">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document
      url="https://cert.webtrust.org/SealFile?seal=527&amp;file=pdf">Audit
      Report and Management's Assertions</document>
    </audit>
    <certificate name="thawte Primary Root CA - G3" status="approved">
      <summary>
        This request is to EV-enabled this SHA256 root which is currently included in NSS.
        This CA will be used to sign certificates for SSL-enabled servers, 
        and may in the future be used to sign certificates for 
        digitally-signed executable code objects. thawte is not yet 
        actively issuing certificates from this root, so they have not 
        yet published a CRL. All subordinated CAs for this root will 
        be internally operated.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=369000"
            version="3"
            sha1="F1:8B:53:8D:1B:E9:03:B6:A6:F0:56:43:5B:17:15:89:CA:F3:6B:F2"
            modulus="2048"
            from="2008-04-01"
            to="2037-12-01"/>
      <crl url="http://crl.thawte.com/ThawtePCA-G3.crl">CRL</crl>
      <ocsp>http://ocsp.thawte.com</ocsp>
      <type>DV,OV, EV (Policy OID 2.16.840.1.113733.1.7.48.1) </type>
      <document url="http://www.thawte.com/repository">Thawte Document Repository (English)</document>
      <document url="http://www.thawte.com/cps/index.html">Thawte CPS (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=539257</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=521869</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=872304</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  

<!--
  <authority name="" url="" status="incomplete">
    <summary></summary>
    <audit type="">
      <auditor url=""></auditor>
      <document url=""></document>
    </audit>

    <certificate name="" status="incomplete">
      <summary></summary>
      <data url=""
            version=""
            sha1=""
            modulus=""
            from=""
            to=""/>
      <crl url="">CRL</crl>
      <ocsp></ocsp>
      <type></type>
      <document url=""></document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation></authorisation>
        <technical></technical>
      </inclusion>
    </certificate>
  </authority>
-->

<!--
  <authority name="Visa" url="http://www.visaca.com/"                   status="incomplete">
    <summary>Certificates used with this root will be used with various Visa
websites associated with Visa products and services. Our main website is
visa.com.</summary>
    <audit type="">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url=""></document>
    </audit>

    <certificate name="" status="incomplete">
      <summary></summary>
      <data url="http://enroll.visaca.com/VisaInfoDeliveryRootCA.pem"
            version="3"
            sha1=""
            modulus="2048"
            from="2005-06-27"
            to="2025-06-29"/>
      <crl url="http://enroll.visaca.com/VisaInfoDeliveryRootCA.crl">CRL</crl>
      <ocsp><!- - none - -></ocsp>
      <type>DV, IV</type>

      <document url=""></document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=380067</authorisation>
        <technical></technical>
      </inclusion>
    </certificate>
    <comments>Certificate is served with the wrong content-type</comments>
  </authority>

  <authority name="ANCERT" url="http://www.ancert.com/"                 status="incomplete">
    <summary>ANCERT is the Notary Agency of Certification in Spain. It issues
    electronic recognized certificates to persons, companies, public corporations
    and others according to the requirements of the current Spanish regulations.</summary>
    <audit type="">
      <auditor url=""></auditor>
      <document url=""></document>
    </audit>

    <certificate name="Ancert Notarial" status="incomplete">
      <summary></summary>
      <data url="http://www.ancert.com/?do=productos.getDocuments&amp;group=certificados_notariales&amp;option=personal&amp;id=163"
            version="3"
            sha1="C0:9A:B0:C8:AD:71:14:71:4E:D5:E2:1A:5A:27:6A:DC:D5:E7:EF:CB"
            modulus="2048"
            from="2004-02-11"
            to="2024-02-11"/>
      <crl url="http://www.ancert.com/crl/ANCERTNOT.crl">CRL</crl>
      <ocsp></ocsp>
      <type></type>
      <document url="http://www.ancert.com/?do=productos&amp;group=certificados_notariales&amp;option=declaracion&amp;id=cps">CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=381558</authorisation>
        <technical></technical>
      </inclusion>
    </certificate>

    <certificate name="Ancert General Council of Notaries" status="incomplete">
      <summary></summary>
      <data url="http://www.notariado.org/n_tecno/feren/archivos/ANCERTCGN.crt"
            version="3"
            sha1="11:C5:B5:F7:55:52:B0:11:66:9C:2E:97:17:DE:6D:9B:FF:5F:A8:10"
            modulus="2048"
            from="2004-02-11"
            to="2024-02-11"/>
      <crl url="http://www.ancert.com/crl/ANCERTCGN.crl">CRL</crl>
      <ocsp></ocsp>
      <type></type>
      <document url="http://www.ancert.com/?do=productos&amp;group=certificados_notariales&amp;option=declaracion&amp;id=cps">CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=381558</authorisation>
        <technical></technical>
      </inclusion>
    </certificate>
    <comments>Cert 1 is a BIN file</comments>
  </authority>

-->

  <authority name="Comodo" url="http://www.comodo.com/" status="incomplete">
    <summary>Comodo CA Ltd is a commercial CA based in the UK and
      serving customers worldwide. 
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/es">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=1221&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.ey.com/es">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=1222&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    
    <certificate name="COMODO RSA Certification Authority" status="incomplete">
      <summary> </summary>
      <data url="http://crt.comodoca.com/COMODORSACertificationAuthority.crt"
            version="3"
            sha1="AF:E5:D2:44:A8:D1:19:42:30:FF:47:9F:E2:F8:97:BB:CD:7A:8C:B4"
            modulus="4096"
            from="2010-01-19"
            to="2038-01-18"/>
      <crl url="http://crl.comodoca.com/COMODORSACertificationAuthority.crl">CRL</crl>
      <ocsp>http://ocsp.comodoca.com</ocsp>
      <type>DV, OV, EV (policy OID 1.3.6.1.4.1.6449.1.2.1.5.1)</type>
      <document url="http://www.comodo.com/about/comodo-agreements.php">Document Repository</document>
      <document url="http://www.comodo.com/repository/Comodo_CA_CPS_4.0.pdf">CPS</document>
      <document url="http://www.comodo.com/repository/EV_CPS_4_JUN_07.pdf">EV CPS</document>
      <document url="http://www.comodo.com/repository/EV_CPS_Amendment-June_2009.pdf">EV Addendum to CPS</document>
      <document url="http://www.comodo.com/repository/ECC_addendum_to_the_EV_Certification_Practice_Statement.pdf">ECC CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=606947</authorisation>
      </inclusion>
      <comments> </comments>
    </certificate>
    <certificate name="USERTrust RSA Certification Authority" status="incomplete">
      <summary> </summary>
      <data url="http://crt.usertrust.com/USERTrustRSACertificationAuthority.crt"
            version="3"
            sha1="2B:8F:1B:57:33:0D:BB:A2:D0:7A:6C:51:F7:0E:E9:0D:DA:B9:AD:8E"
            modulus="4096"
            from="2010-02-01"
            to="2038-01-18"/>
      <crl url="http://crl.usertrust.com/USERTrustRSACertificationAuthority.crl">CRL</crl>
      <ocsp>http://ocsp.usertrust.com</ocsp>
      <type>DV, OV, EV (policy OID 1.3.6.1.4.1.6449.1.2.1.5.1)</type>
      <document url="http://www.comodo.com/about/comodo-agreements.php">Document Repository</document>
      <document url="http://www.comodo.com/repository/09_22_2006_Certification_Practice_Statement_v.3.0.pdf">CPS</document>
      <document url="http://www.comodo.com/repository/EV_CPS_4_JUN_07.pdf">EV CPS</document>
      <document url="http://www.comodo.com/repository/EV_CPS_Amendment-June_2009.pdf">EV Addendum to CPS</document>
      <document url="http://www.comodo.com/repository/ECC_addendum_to_the_EV_Certification_Practice_Statement.pdf">ECC CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=606947</authorisation>
      </inclusion>
      <comments> </comments>
    </certificate>
    
    <certificate name="USERTrust ECC Certification Authority" status="incomplete">
      <summary> </summary>
      <data url="http://crt.usertrust.com/USERTrustECCCertificationAuthority.crt"
            version="3"
            sha1="D1:CB:CA:5D:B2:D5:2A:7F:69:3B:67:4D:E5:F0:5A:1D:0C:95:7D:F0"
            modulus="SECG elliptic curve secp384r1 (aka NIST P-384)"
            from="2010-02-01"
            to="2038-01-18"/>
      <crl url="http://crl.usertrust.com/USERTrustECCCertificationAuthority.crl">CRL</crl>
      <ocsp>http://ocsp.usertrust.com</ocsp>
      <type>DV, OV, EV (policy OID 1.3.6.1.4.1.6449.1.2.1.5.1)</type>
      <document url="http://www.comodo.com/about/comodo-agreements.php">Document Repository</document>
      <document url="http://www.comodo.com/repository/09_22_2006_Certification_Practice_Statement_v.3.0.pdf">CPS</document>
      <document url="http://www.comodo.com/repository/EV_CPS_4_JUN_07.pdf">EV CPS</document>
      <document url="http://www.comodo.com/repository/EV_CPS_Amendment-June_2009.pdf">EV Addendum to CPS</document>
      <document url="http://www.comodo.com/repository/ECC_addendum_to_the_EV_Certification_Practice_Statement.pdf">ECC CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=606947</authorisation>
      </inclusion>
      <comments> </comments>
    </certificate>
  </authority>

  <authority name="Cisco" url="http://www.cisco.com/" status="incomplete">
    <summary>Cisco is a leading provider of networking equipment to
      consumers and businesses worldwide.
    </summary>

    <audit type="WebTrust">
      <auditor url="http://www.pwc.com/">PricewaterhouseCoopers</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=728">Audit Report and Management Assertions</document>
    </audit>

    <certificate name="Cisco Root CA 2048" status="incomplete">

      <summary>This is an off-line root CA that issues CA certificates
        to one or more Cisco-controlled subordinate CAs (including the
        Cisco Manufacturing Sub-CA). The subordinate CAs in turn issue
        end entity certificates, e.g., for use in Cisco network
        equipment with embedded web servers and web-based
        administrative interfaces.
      </summary>
      <data url="http://www.cisco.com/security/pki/certs/crca2048.cer"
            version="3"
            sha1="DE:99:0C:ED:99:E0:43:1F:60:ED:C3:93:7E:7C:D5:BF:0E:D9:E5:FA"
            modulus="2048"
            from="2004-05-14"
            to="2029-05-14"/>
      <crl url="">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>IV/OV</type>
      <document url="http://www.cisco.com/security/pki/policies/Certification_Practice_Statement_-_Cisco_Root_CA_2048_v1.1.doc">Cisco Root CA 2048
Certification Practice Statement, Version 1.1</document>
      <document url="http://www.cisco.com/security/pki/policies/Certificate_Policy_-_Cisco_Root_CA_2048_v1.0.doc">Cisco Root CA 2048 Certificate Policy, Version 1.0</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=416842</authorisation>
        <technical></technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Verizon / Cybertrust" url="http://www.verizonbusiness.com/us/products/security/identity/" status="incomplete">
    <summary>
      Verizon Business Security Solutions Powered by Cybertrust
      operates a commercial certificate authority service for
      businesses and governments internationally.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/be">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1457">
      Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.ey.com/be">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1458">
      Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="Baltimore CyberTrust Root" status="incomplete">
      <summary>
        The request is to enable EV and add the Code Signing trust bit
        for the Baltimore CyberTrust Root certificate, which is already included 
        in NSS. This root will supersede Cybertrust's current
        mainstream root, GTE CyberTrust Global Root. When that
        happens, this root will have subordinate CAs that are operated
        both internally and by third-parties. The sub-CAs are required
        to follow the CPS and to have regular audits.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=323781"
            version="3"
            sha1="d4:de:20:d0:5e:66:fc:53:fe:1a:50:88:2c:78:db:28:52:ca:e4:74"
            modulus="2048"
            from="2000-05-12"
            to="2025-05-12">
      </data>
      <crl url="http://www.public-trust.com/cgi-bin/CRL/202501/cdp.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV, EV (policy OID 1.3.6.1.4.1.6334.1.100.1)</type>
      <document url="http://cybertrust.omniroot.com/repository/Cybertrust_CP_v_2_3_cl.pdf"> Cybertrust CA Certificate Policy
      </document>
      <document url="http://cybertrust.omniroot.com/repository/Cybertrust_CPS_v_5_4.pdf"> Certification Practice Statement
      </document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=430698</authorisation>
        <technical></technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="SSC" url="http://www.ssc.lt"  status="incomplete">
    <summary>
      SSC, Skaitmeninio Sertifkavimo Centras, is the Lithuanian Government accredited commercial CA issuing certificates to Government institutions, public services, businesses and citizens.
    </summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.ivpk.lt/main_en.php?cat=10&amp;gr=4">Information Society Development Committee Under The Government Of The Republic Of Lithuania
      </auditor>
      <document url= "http://www.ssc.lt/files/SSC%20CA%20Application%20to%20Trusted%20Root%20CA%20program.pdf">Statement of Compliance with ETSI TS 101.456</document>
      <document url= "http://epp.ivpk.lt/en/providers/">Lithuanian Government Qualified Certificate Service Provider</document>
    </audit>
    <certificate name="SSC Root CA A" status="incomplete">
      <summary>
        Root CA with four internally operated subordinate CAs: Class 1, Class 2, Qualified Class 3, and Qualified Class 3 VS.
      </summary>
      <data url="http://www.ssc.lt/cacert/ssc_root_a.crt"
            version="3"
            sha1="5a:5a:4d:af:78:61:26:7c:4b:1f:1e:67:58:6b:ae:6e:d4:fe:b9:3f"
            modulus="4096"
            from="2006-12-27"
            to="2026-12-28">
      </data>
      <crl url="http://crl.ssc.lt/root-a/cacrl.crl">CRL</crl>
      <ocsp>http://ocsp.ssc.lt:2560</ocsp>
      <type>DV, OV</type>
      <document url="http://repository.ssc.lt/files/viesa-info/pki_disclosure_v1-0-0%5BLT%5D.pdf">
      PKI Disclosure Statement
      </document>
      <document url="http://repository.ssc.lt/files/cp/ssc_trusted_root_cp_v1-0-0%5BLT%5D.pdf">
      Certificate Practices
      </document>
      <document url="http://repository.ssc.lt/files/cps/ssc_trusted_root_cps_v1-0-0%5BLT%5D.pdf">
      Certificate Practices Statement
      </document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=379152</authorisation>
        <technical></technical>
      </inclusion>
    </certificate>
    <certificate name="SSC Root CA B" status="incomplete">
      <summary>
        This Root CA is a special purpose CA that has no subordinate CAs. 
        Root B is used for single-root certificates (SSL, Code Signing, 
        OCSP, time stamping). 
      </summary>
      <data url="http://www.ssc.lt/cacert/ssc_root_b.crt"
            version="3"
            sha1="3e:84:d3:bc:c5:44:c0:f6:fa:19:43:5c:85:1f:3f:2f:cb:a8:e8:14"
            modulus="4096"
            from="2006-12-27"
            to="2026-12-25">
      </data>
      <crl url="http://crl.ssc.lt/root-b/cacrl.crl">CRL</crl>
      <ocsp>http://ocsp.ssc.lt:2560</ocsp>
      <type>DV, OV</type>
      <document url="http://repository.ssc.lt/files/viesa-info/pki_disclosure_v1-0-0%5BLT%5D.pdf">
      PKI Disclosure Statement
      </document>
      <document url="http://repository.ssc.lt/files/cp/ssc_trusted_root_cp_v1-0-0%5BLT%5D.pdf">
      Certificate Practices
      </document>
      <document url="http://repository.ssc.lt/files/cps/ssc_trusted_root_cps_v1-0-0%5BLT%5D.pdf">
      Certificate Practices Statement
      </document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=379152</authorisation>
        <technical></technical>
      </inclusion>
    </certificate>
    <certificate name="SSC Root CA C" status="incomplete">
      <summary>
        Root C serves as a backup CA for Roots A and B. Just in case either 
        of those two roots become unusable and become revoked. According to 
        the government project that SSC is involved in, Root C will have to 
        be tested in a specific project where they must demonstrate availability 
        of its CRL and OCSP services. The project will accept Root C only if it 
        is a FireFox built-in object. If Root A does get revoked and Root C gets 
        put into service, then Root C will have four internally operated subordinate 
        CAs: Class 1, Class 2, Qualified Class 3, and Qualified Class 3 VS.
      </summary>
      <data url="http://www.ssc.lt/cacert/ssc_root_c.crt"
            version="3"
            sha1="23:e8:33:23:3e:7d:0c:c9:2b:7c:42:79:ac:19:c2:f4:74:d6:04:ca"
            modulus="4096"
            from="2006-12-27"
            to="2026-12-22">
      </data>
      <crl url="http://crl.ssc.lt/root-c/cacrl.crl">CRL</crl>
      <ocsp>http://ocsp.ssc.lt:2560</ocsp>
      <type>DV, OV</type>
      <document url="http://repository.ssc.lt/files/viesa-info/pki_disclosure_v1-0-0%5BLT%5D.pdf">
      PKI Disclosure Statement
      </document>
      <document url="http://repository.ssc.lt/files/cp/ssc_trusted_root_cp_v1-0-0%5BLT%5D.pdf">
      Certificate Practices
      </document>
      <document url="http://repository.ssc.lt/files/cps/ssc_trusted_root_cps_v1-0-0%5BLT%5D.pdf">
      Certificate Practices Statement
      </document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=379152</authorisation>
        <technical></technical>
      </inclusion>
    </certificate>
  </authority>

  <authority name="Certicamara S.A." url="http://www.certicamara.com"  status="complete">
    <summary>
      Sociedad Cameral de Certificación Digital - Certicámara S.A. is a 
      commercial CA primarily serving Colombia and Andean Region
    </summary>
    <audit type="WebTrust">
      <auditor url="http://www.deloitte.com">Deloitte and Touche
      </auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=750&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="Certificado Empresarial Clase-A" status="incomplete">
      <summary>
        This is the orginal root which expires in 2011. Certicámara 
        requests that this root also be added to the NSS database 
        because they have a significant number of customers that use it, 
        and their certificates expire in 2010. End entity certificates 
        have been issued directly from this root, rather than using an 
        offline root and issuing certs through a subordinate CA. 
      </summary>
      <data url="http://www.certicamara.com/certicamara.crt"
            version="3"
            sha1="8b:1a:11:06:b8:e2:6b:23:29:80:fd:65:2e:61:81:37:64:41:fd:11"
            modulus="2048"
            from="2001-05-23"
            to="2011-05-23">
      </data>
      <crl url="http://www.certicamara.com/certicamara.crl">CRL</crl>
      <type>OV</type>
      <document url="http://www.certicamara.com/certificate_hierarchy_diagram.jpg">Certificate Hierarchy
      </document> 
      <document url="http://www.certicamara.com/templates/cc/images/dpc/DPC_Julio_de_2008.pdf">Certificate Policy
      </document>
      <document url="http://www.certicamara.com/index.php?option=com_content&amp;task=category&amp;sectionid=22">Declaration of Practices
      </document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>http://bugzilla.mozilla.org/show_bug.cgi?id=401262</authorisation>
        <technical></technical>
      </inclusion>
      <comments>This root will not be approved for inclusion.</comments>
    </certificate>
  </authority>

  <authority name="ICP-Brasil" url="http://www.icpbrasil.gov.br/" status="incomplete">
    <summary>
       ICP Brasil (Infra-Estrutura de Chaves Públicas Brasileira) 
       is Brazil's National PKI created by the law Medida 
       Provisória nº 2.200-2 / 2001.
       ICP Certificates are used in all secure Brazilian government 
       sites, other Brazilian sites and by financial institutions. 
       ICP-Brazil has the only (V0 and V1) chain operated by the ITI.
    </summary>
    <audit type="Internal">
      <auditor url="http://www.iti.gov.br/twiki/bin/view/Main/ComiteGestor">Auditor Website</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=342298">Audit Hierarchy</document>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/DocIcp/DOC-ICP-08_-_v_2.0.pdf">Criteria and Procedures for Audit of ICP-Brasil</document>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/DocIcp/DOC-ICP-09_-_v_2.0.pdf ">Criteria and Procedures for Audit of ICP-Brasil sub-CAs</document>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/Resolucoes/RESOLU__O_29_DE_29_01_2004.PDF">Audit Committee</document>
    </audit>
    <certificate name="Autoridade Certificadora Raiz Brasileira" status="incomplete">
      <summary>
        Root cert used to secure Brazilian government and financial sites.
        This root has 8 subordinate CAs that are externally operated. 
      </summary>
      <data url="http://acraiz.icpbrasil.gov.br/CertificadoACRaiz.crt"
            version="3"
            sha1="8E:FD:CA:BC:93:E6:1E:92:5D:4D:1D:ED:18:1A:43:20:A4:67:A1:39"
            modulus="2048"
            from="2001-11-30"
            to="2011-11-30"/>
      <crl url="http://acraiz.icpbrasil.gov.br/LCRacraiz.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/EstruturaIcp/Estrutura_completa.pdf">Complete CA Hierarchy</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=342297">Subordinate CA Hierarchy</document>
      <document url="http://www.iti.gov.br/twiki/bin/view/Certificacao/EstruturaIcp">Companies operating the subordinate CAs</document>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/DocIcp/DOC-ICP-04_-_v._3.0.pdf"> CP (Portuguese)</document>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/DocIcp/DOC-ICP-01_-_versao_4.0_retificada_em_15-01-09.pdf">CPS of CA-root (Portuguese)</document>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/DocIcp/DOC-ICP-05_-_versao_3.1_(REQUISITOS_MIN._PARA_AS_DPCs_DAS_ACs).pdf">CPS requirements for sub-CA (Portuguese)</document>
      <document url="http://www.iti.gov.br/twiki/bin/view/Certificacao/DocIcp">ICP-Brasil Documents</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=438825</authorisation>
     </inclusion>
      <comments></comments>
    </certificate>

    <certificate name="Autoridade Certificadora Raiz Brasileira v1" status="incomplete">
      <summary>
        This is the next version of the Autoridade Certificadora 
        Raiz Brasileira root, which is used to secure Brazilian 
        government and financial sites.
      </summary>
      <data url="http://acraiz.icpbrasil.gov.br/ICP-Brasil.crt"
            version="3"
            sha1="70:5D:2B:45:65:C7:04:7A:54:06:94:A7:9A:F7:AB:B8:42:BD:C1:61"
            modulus="2048"
            from="2008-07-29"
            to="2021-07-29"/>
      <crl url="http://acraiz.icpbrasil.gov.br/LCRacraizv1.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/EstruturaIcp/Estrutura_completa.pdf">Complete CA Hierarchy</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=342297">Subordinate CA Hierarchy</document>
      <document url="http://www.iti.gov.br/twiki/bin/view/Certificacao/EstruturaIcp">Companies operating the subordinate CAs</document>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/DocIcp/DOC-ICP-04_-_v._3.0.pdf"> CP (Portuguese)</document>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/DocIcp/DOC-ICP-01_-_versao_4.0_retificada_em_15-01-09.pdf">CPS of CA-root (Portuguese)</document>
      <document url="http://www.iti.gov.br/twiki/pub/Certificacao/DocIcp/DOC-ICP-05_-_versao_3.1_(REQUISITOS_MIN._PARA_AS_DPCs_DAS_ACs).pdf">CPS requirements for sub-CA (Portuguese)</document>
      <document url="http://www.iti.gov.br/twiki/bin/view/Certificacao/DocIcp">ICP-Brasil Documents</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=438825</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="E-ME" url="http://www.e-me.lv/" status="pending">
    <summary>
    E-ME is the brand name for the certification services that are operated by the 
    Latvian State Radio and Television Centre (LVRTC). LVRTC is a joint-stock company, 
    in which the Republic of Latvia being represented by the Ministry of Transportation 
    owns all shares of the company. LVRTC provides transmission of radio and television 
    signals covering all of Latvia. LVRTC also provides electronic document law enforcement in Latvia. 
    </summary>
    <audit type="ETSI TS 101 456">
      <auditor url="http://www.kpmg.lv/">KPMG Baltics</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=628079">Audit Statement</document>
    </audit>
    <certificate name="E-ME SSI (RCA)" status="pending">
      <summary>
      This Root CA issues Certificates for the Policy CA and the Trusted OCSP Responder. 
      There is one Policy CA which issues CA Certificates to the Issuing CAs and the Time Stamping Authority. The Issuing 
      CAs will be used to issue the Qualified Signature Certificates, Non-Qualified Authentication 
      Certificates, Non_Qualified Infrastructure Certificates to the End Users, as well as Non-Qualified 
      and Non-Public Certificates to the infrastructure systems of E-ME CSP IS. There is currently one Issuing CA, 
      which is operated by E-ME.  All future Issuing CAs will also be operated by E-ME.
      </summary>
      <data url="http://www.eme.lv/aia/E-ME%20SSI%20(RCA).crt"
            version="3"
            sha1="c9:32:1d:e6:b5:a8:26:66:cf:69:71:a1:8a:56:f2:d3:a8:67:56:02"
            modulus="4096"
            from="2009-05-19"
            to="2027-05-19"/>
      <crl url="http://info.e-me.lv/?page_id=60">CRL</crl>
      <ocsp>http://ocsp.eme.lv/responder.eme</ocsp>
      <type>OV</type>
      <document url="http://info.e-me.lv/?page_id=230">E-ME Policies and Regulations</document>
      <document url="http://info.e-me.lv/wp-content/uploads/2010/01/E-ME_CP_SP_v2-3_LAT_ENG.pdf">CP (English)</document>
      <document url="http://info.e-me.lv/wp-content/uploads/2011/08/E-ME-SN-v1_9-LatEng.pdf">Root Certificate CPS (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=518098</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="FNMT" url="http://www.cert.fnmt.es" status="complete">
    <summary>
     Fábrica Nacional de Moneda y Timbre (FNMT) is a government agency that 
     provides services to Spain as a national CA.
    </summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://asimelec.es/">ASIMELEC (Asociación Multisectorial de Empresas de Tecnologías de la Información, Comunicaciones y Electrónica)</auditor>
      <document url="http://www.asimelec.es/Items/ItemDetail.aspx?ID=3216">ASIMELEC seal of approval</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=477940">Audit Statement</document>
    </audit>
    <certificate name="AC RAIZ FNMT-RCM" status="complete">
      <summary>
      This root cert signs internally-operated sub-CAs 
      which sign end-entity certs. 
      </summary>
      <data url="http://www.cert.fnmt.es/certs/ACRAIZFNMTRCM.crt"
            version="3"
            sha1="B8:65:13:0B:ED:CA:38:D2:7F:69:92:94:20:77:0B:ED:86:EF:BC:10"
            modulus="4096"
            from="2008-10-29"
            to="2029-12-31"/>
      <crl url="ldap://ldapape.cert.fnmt.es">CRL</crl>
      <ocsp>http://ocspap.cert.fnmt.es/ocspap/OcspResponder</ocsp>
      <type>OV</type>
      <document url="http://www.cert.fnmt.es/dpcs/"> FNMT Document Repository </document>
      <document url="http://www.cert.fnmt.es/dpc/dpcc2.pdf"> CPS particular to Component Certificates (Spanish)</document>
      <document url="http://www.cert.fnmt.es/dpc/dpc.pdf">CPS of FNMT Clase 2 CA (current Spanish users CA)</document>
      <document url="http://www.cert.fnmt.es/dpc/dgpc.pdf">General CPS applicable to all FNMT's CAs (Spanish)</document>
      <document url="http://www.cert.fnmt.es/dpc/ape/dpc.pdf"> CPS of a FNMT's subordinated CAs ACE APE and AC Administración Pública</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=435736</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="TURKTRUST" url="http://www.turktrust.com.tr/" status="approved">
    <summary>
    TURKTRUST Information Security Services Inc. is a public corporation and 
    is an IT company based in Turkey. 
    TURKTRUST is an authorized qualified electronic certificate service provider 
    according to the Turkish Electronic Signature Law. TURKTRUST issues qualified 
    certificates, time-stamping services, SSL certificates, and object signing certificates.
    </summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.btk.gov.tr/bilgi_teknolojileri/elektronik_imza/eshs.php">Turkish Information and Communication Technologies Authority (ICTA)</auditor>
      <document url="http://www.btk.gov.tr/bilgi_teknolojileri/elektronik_imza/TURKTRUST_LETTER_2011.pdf">Audit statement</document>
    </audit>
    <audit type="ETSI TS 102 042 - SSL NCP and EV-CP">
      <auditor url="http://www.bsigroup.com/en/Assessment-and-certification-services/Client-directory/CertificateClient-Directory-Search/">BSI Group The Netherlands B.V.</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=585759">ETSI Certificate</document>
    </audit>    
    <certificate name="TÜRKTRUST Elektronik Sertifika Hizmet Sağlayıcısı" status="approved">
      <summary>
      This is an offline root with separate internally-operated subordinate CAs for issuing qualified certificates,
      SSL certificates, and EV SSL certificates.
      TURKTRUST has other root certificates currently included in NSS. This root stands in a horizontal 
      hierarchy with others. 
      </summary>
      <data url="http://www.turktrust.com.tr/sertifikalar/TURKTRUST_Elektronik_Sertifika_Hizmet_Saglayicisi_s3.crt"
            version="3"
            sha1="F1:7F:6F:B6:31:DC:99:E3:A3:C8:7F:FE:1C:F1:81:10:88:D9:60:33"
            modulus="2048"
            from="2007-12-25"
            to="2017-12-22"/> 
      <crl url="http://www.turktrust.com.tr/sil/TURKTRUST_Kok_SIL_s3.crl">CRL</crl>
      <ocsp>http://ocsp.turktrust.com.tr</ocsp>
      <type>OV, EV (Policy OID 2.16.792.3.0.3.1.1.5) </type>
      <document url="http://www.turktrust.com.tr/en/bilgideposu.html">Document Repository</document>
      <document url="http://www.turktrust.com.tr/en/files/bilgidepo/TURKTRUST_CP_V-05_%5BEN%5D_(01.11.2011).pdf">CP</document>
      <document url="http://www.turktrust.com.tr/en/files/bilgidepo/TURKTRUST_CPS_V-05_%5BEN%5D_(01.11.2011).pdf">CPS</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=433845</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=768547</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=788321</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Swiss BIT" url="http://www.bit.admin.ch/index.html?lang=en" status="incomplete">
    <summary>
    Swiss Bundesamt für Informatik und Telekommunikation (BIT) is also known as the Swiss Federal 
    Office of Information Technology, Systems and Telecommunication (FOITT) which operates servers 
    and software applications for the Confederation (one of the biggest employers in Switzerland) 
    and third parties. The FOITT also operates a carrier network for the Federal administration 
    and organisations close to the administration. Various, partly encrypted, virtual private 
    networks (VPN) are operated on this carrier network. Overall the FOITT serves 1200 locations 
    in Switzerland and 200 locations worldwide. The FOITT is also responsible for networking the 
    Swiss cantons and the Principality of Liechtenstein.
    </summary>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.kpmg.ch/">KPMG SA Switzerland</auditor>
      <document url="https://bug435026.bugzilla.mozilla.org/attachment.cgi?id=385981">
      Audit Report and Management's Assertions</document>
    </audit>
    <audit type="ETSI TS 101.456">
      <auditor url="http://www.seco.admin.ch/org/00686/index.html?lang=en">State Secretariat for Economic Affairs (SECO)</auditor>
      <document url="http://www.seco.admin.ch/sas/00229/00251/index.html?lang=en">Directory of Swiss Certified CAs for Administering Qualified Certificates</document>
    </audit>
    <certificate name="Swiss Government Root CA II" status="incomplete">
      <summary>
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=549069"
            version="3"
            sha1="C7:F7:CB:E2:02:36:66:F9:86:02:5D:4A:3E:31:3F:29:EB:0C:5B:38"
            modulus="4096"
            from="2011-02-16"
            to="2035-02-16"/> 
      <crl url="">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>DV, OV</type>
      <document url="http://www.pki.admin.ch">Admin PKI Repository</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=549071">Swiss Government Root CA II CP/CPS (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=435026</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="Finnish Population Register" 
              url="http://www.vrk.fi" status="incomplete">
    <summary>
     The Population Register Centre operates under the Finland Ministry of Finance 
     to develop and maintain the national Population Information System, the guardianship 
     register and the Public Sector Directory Service. The Population Register Centre serves 
     as the Certification Authority for the State of Finland, and thus develops and maintains 
     the national certificate services to Finnish Citizens, state workers and organizations. 
     All certificates issued to natural persons by the Population Register Centre are qualified 
     certificates, i.e. European-wide certificates based on an EU Directive and Finnish legislation.
    </summary>
    <audit type="ETSI TS 101.456 equivalent for Qualified Certificates">
      <auditor url="http://www.ficora.fi">Finnish Communications Regulatory Authority (FICORA)</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=720616">Audit Statement</document>
      <document url="http://www.ficora.fi/index/palvelut/palvelutaiheittain/sahkoinenallekirjoitus/varmentajarekisteri.html">QC Certificate on FICORA website</document>
    </audit>
    <audit type="ETSI TS 102.042 equivalent for Server Certificates">
      <auditor url="http://www.inspecta.com">Inspecta Finland</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=720615">Auditor Statement</document>
    </audit>
    <certificate name="VRK Gov. Root CA" status="incomplete">
      <summary>
        This root issues internally-operated intermediate CAs.
      </summary>
        <data url="http://vrk.fineid.fi/certs/vrkrootc.crt"
        version="3"
        sha1="fa:a7:d9:fb:31:b7:46:f2:00:a8:5e:65:79:76:13:d8:16:e0:63:b5"
        modulus="2048" 
        from="2002-12-18"
        to="2023-12-18"/>
      <crl url="http://proxy.fineid.fi/crl/vrkspc.crl">CRL</crl>
      <type>IV/OV</type>
      <document url="http://www.fineid.fi/">Policy Documentation (Finnish)</document>
      <document url="http://www.fineid.fi/default.aspx?id=596">Intermediate Certificates</document>
      <document url="http://www.fineid.fi/default.aspx?id=520">FINeID Policies for Server Certificates (English)</document>
      <document url="http://www.fineid.fi/default.aspx?docid=4164">CP for Server Certs (English)</document>
      <document url="http://www.fineid.fi/default.aspx?docid=4162">CPS for Server Certs (English)</document>
      <document url="http://www.fineid.fi/default.aspx?docid=4163">PKI Disclosure Statement (English)</document>
      <document url="http://www.fineid.fi/default.aspx?docid=3633">FINEID specification S2 – VRK (PRC) CA-model and certificate contents, v2.1</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=463989</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="D-TRUST" 
              url="http://ssl.d-trust.net" status="approved">
    <summary>
     D-TRUST GmbH is a wholly owned subsidiary of Bundesdruckerei 
     (100% Governmental), and is the only German trust center authorised 
     to perform sovereign tasks. The primary market is the German speaking 
     area (Austria, Germany, Switzerland) and B2B focused. 
    </summary>
    <audit type="ETSI TS 102 042">
      <auditor url="https://www.tuvit.de">TUVIT</auditor>
      <document url="https://www.tuvit.de/data/content_data/tuevit_en/6719UE_s.pdf">ETSI Certificate</document>
    </audit>
    <audit type="ETSI TS 102 042 EV">
      <auditor url="https://www.tuvit.de">TUVIT</auditor>
      <document url="https://www.tuvit.de/data/content_data/tuevit_en/6720UE_s.pdf">ETSI Certificate</document>
    </audit>

    <certificate name="D-TRUST Root Class 3 CA 2 2009" status="approved">
      <summary>
        This root currently has one internally-operated subordinate CA, 
        “D-TRUST SSL Class 3 CA 1 2009”, which signs end-entity certificates.
      </summary>
        <data url="https://www.d-trust.net/cgi-bin/D-TRUST_Root_Class_3_CA_2_2009.crt"
        version="3"
        sha1="58:E8:AB:B0:36:15:33:FB:80:F7:9B:1B:6D:29:D3:FF:8D:5F:00:F0"
        modulus="2048" 
        from="2009-11-05"
        to="2029-11-05"/>
      <crl url="http://www.d-trust.net/crl/d-trust_root_class_3_ca_2_2009.crl">CRL</crl>
      <ocsp>http://ssl-c3-ca1-2009.ocsp.d-trust.net</ocsp>
      <type>OV</type>
      <document url="http://ssl.d-trust.net/support/repository.php">D-Trust Document Repository</document>
      <document url="http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CPS.pdf">CPS (German)</document>
      <document url="http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CPS-EN.pdf">CPS (English)</document>
      <document url="http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CP.pdf">CP (German)</document>
      <document url="http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CP-EN.pdf">CP (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=467891</authorisation>
		<technical>https://bugzilla.mozilla.org/show_bug.cgi?id=845132</technical>
      </inclusion>
      <comments></comments>
    </certificate>
    
    <certificate name="D-TRUST Root Class 3 CA 2 EV 2009" status="approved">
      <summary>
        This root currently has one internally-operated subordinate CA, 
        “D-TRUST SSL Class 3 CA 1 EV 2009”, which signs end-entity certificates.
      </summary>
        <data url="https://www.d-trust.net/cgi-bin/D-TRUST_Root_Class_3_CA_2_EV_2009.crt"
        version="3"
        sha1="96:C9:1B:0B:95:B4:10:98:42:FA:D0:D8:22:79:FE:60:FA:B9:16:83"
        modulus="2048" 
        from="2009-11-05"
        to="2029-11-05"/>
      <crl url="http://www.d-trust.net/crl/d-trust_root_class_3_ca_2_ev_2009.crl">CRL</crl>
      <ocsp>http://ssl-c3-ca1-ev-2009.ocsp.d-trust.net</ocsp>
      <type>OV, EV(Policy OID 1.3.6.1.4.1.4788.2.202.1)</type>
      <document url="http://ssl.d-trust.net/support/repository.php">D-Trust Document Repository</document>
      <document url="http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CPS.pdf">CPS (German)</document>
      <document url="http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CPS-EN.pdf">CPS (English)</document>
      <document url="http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CP.pdf">CP (German)</document>
      <document url="http://www.d-trust.net/internet/files/D-TRUST_Root_PKI_CP-EN.pdf">CP (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=467891</authorisation>
		<technical>https://bugzilla.mozilla.org/show_bug.cgi?id=845132</technical>
		<ev>https://bugzilla.mozilla.org/show_bug.cgi?id=845149</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

  <authority name="SUSCERTE" 
              url="http://www.suscerte.gob.ve/" status="incomplete">
    <summary>
     SUSCERTE stands for Superintendencia de Servicios de Certificación Electrónica, 
     which is part of the Ministry of People's Power for Telecommunications and 
     Informatics in the Bolivarian Republic of Venezuela. SUSCERTE is a national 
     government CA that provides electronic certification services to the Bolivarian 
     Republic of the Government of Venezuela. 
    </summary>
    <audit type="ETSI TS 101.456, ETSI 102.042">
      <auditor url="">Mariclen Villegas</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=381829">Audit Statement in Spanish</document>
    </audit>
    <certificate name="Autoridad de Certificacion Raiz del Estado Venezolano" status="incomplete">
      <summary>
      This root CA is the Root Certification Authority of Venezuela’s National 
      Infrastructure of Electronic Certification. The main function of this root 
      is to issue the intermediate CAs to the Certification Service Suppliers (CSS) 
      of the public and private sector, according to the Law on Data Messages and 
      Electronic Signature (LSMDFE). Once a CSS has been accredited by SUSCERTE according 
      to the LSMDFE, the CSS must issue the certificates in accordance with the purpose of 
      the electronic certificates specified in their own Declaration of Practices of 
      Certification and Policy of Certificates.
      </summary>
        <data url="https://bugzilla.mozilla.org/attachment.cgi?id=375214"
        version="3"
        sha1="DD:83:C5:19:D4:34:81:FA:D4:C2:2C:03:D7:02:FE:9F:3B:22:F5:17"
        modulus="4096" 
        from="2007-02-16"
        to="2027-02-11"/>
      <crl url="http://www.suscerte.gob.ve/lcr">CRL</crl>
      <ocsp>http://ocsp.suscerte.gob.ve</ocsp>
      <type>OV</type>
      <document url="http://acraiz.suscerte.gob.ve/dpc/DPC_AC_RAIZ_V1.0.pdf">Declaration of Practices of Certification (DPC) of root in Spanish</document>
      <document url="http://acraiz.suscerte.gob.ve/dpc/DPC_AC_RAIZ_V1.0_en.pdf">DPC of root in English</document>
      <document url="http://www.suscerte.gob.ve/images/norma-22-2008.pdf">Model of DPC for Certification Service Suppliers (CSS) in Spanish</document>
      <document url="http://www.suscerte.gob.ve/images/norma-027.pdf">Guide for Accreditation of CSS in Spanish</document>
      <document url="http://www.suscerte.gob.ve/images/SUSCERTENorma040_E21.pdf">Guide Technology Standards and Guidelines for Accreditation of CSS in Spanish</document>
      <document url="http://www.suscerte.gob.ve/images/norma-032.pdf">National Infrastructure of Electronic Certificate: Structure, Certificate, and CRL in Spanish</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
          </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=489240</authorisation>
      </inclusion>
      <comments>SUSCERTE has decided to have each of its sub-CAs apply separately for inclusion in NSS as separate trust anchors.</comments>
    </certificate>
  </authority>
  
  <authority name="NIC" url="http://nicca.nic.in" status="incomplete">
    <summary>National Informatics Centre (NIC), is part of the Department of 
    Information Technology of the Government of India.
</summary>
    <audit type="Government, WebTrust CA equivalent">
      <auditor url="http://www.cyberqindia.com">CyberQ Consulting Pvt. Ltd.</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=499264">Auditor Statement</document>
    </audit>
    <certificate name="NIC Certifying Authority" status="incomplete">
      <summary>
      NIC CA issues three classes of Digital Signatures to subscribers, based on the 
      level of verification that is performed in regards to the identity of the 
      certificate subscriber. The NIC CA directly signs Class 1, Class 2 and Class3 
      end-entity certificates which can be used for SSL, email, and document signing.  
      The NIC CA also signs the E-passport Sub-CA which signs Class 1, Class 2 and 
      Class3 end-entity certificates which can be used for SSL, email, and document signing.   
      These Digital Signatures are issued based on verification procedures as stated in the 
      Information Technology (IT) Act 2000, an Act which was passed by the Indian Parliament 
      in June 2000.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=397595"
            version="3"
            sha1="48:22:82:4e:ce:7e:d1:45:0c:03:9a:a0:77:dc:1f:8a:e3:48:9b:bf"
            modulus="2048"
            from="2007-07-01"
            to="2015-07-03"/>
      <crl url="https://nicca.nic.in/crl_2783.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>DV, OV</type>
      <document url="https://bug511380.bugzilla.mozilla.org/attachment.cgi?id=398631">CA Hierarchy</document>
      <document url="http://nicca.nic.in/pdf/niccacps.pdf">Certificate Practice Statement of NIC CA (English)</document>
	  <document url="https://nicca.nic.in/pdf/CPSAddendumForMozilla2.doc">CPS Addendum for enrolling Root Certificate under Mozilla</document>
      <document url="http://nicca.nic.in/index.jsp">Overview of Information Technology Act 2000 (English)</document>
      <document url="http://nicca.nic.in/pdf/itact2000.pdf">Details of Information Technology Act 2000 (English)</document>
      <document url="http://nicca.nic.in/pdf/DSC-Request-Form.pdf">Digital Signature Certificate Request Form (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=511380</authorisation>
      </inclusion>
    </certificate>
  </authority>

  <authority name="US FPKI" url="http://www.idmanagement.gov/fpkima" status="pending">
    <summary>
    The U.S. Federal Public Key Infrastructure (US FPKI) Management Authority is a 
    National Government CA that operates the Federal Common Policy Framework 
    Certification Authority (FCPCA) on behalf of the Federal PKI Policy Authority.  
    The FCPCA is the Trust Anchor for the Federal Government.  CAs under the FCPCA 
    issue PKI credentials to Federal employees and contractors.  The FCPCA is also 
    cross certified with the Federal Bridge Certification Authority which provides 
    a trusted path to cross certified Federal Agencies, commercial venders, states 
    governments and other bridges.
    </summary>
    <audit type="ISO 21188:2006">
      <auditor url="http://slandala.com">Slandala</auditor>
      <document url="http://www.idmanagement.gov/fpkipa/documents/FPKI_Compliance_Audit_Requirements.doc">Compliance Audit Requirements</document>
    </audit>
    <audit type="Audit of Audit">
      <auditor url="http://www.gsa.gov">U. S. General Services Administration Office of General Counsel</auditor>
      <document url="http://www.idmanagement.gov/fpkima/documents/FPKI-audit-rev2-2012-jec-signed.pdf">Audit of Audit</document>
    </audit>
    <certificate name="Federal Common Policy CA" status="pending">
      <summary>
      This is the root certificate for the U.S. Federal Common Policy Framework Certificate 
      Authority (FCPCA). The FCPCA only issues certificates to subordinate CAs.  
      The sub-CAs are operated by the Shared Service Providers (SSPs). 
      End-entity certificates may be issued to Federal employees, contractors, affiliated 
      personnel, and devices operated by or on behalf of Federal agencies. 
      </summary>
      <data url="http://http.fpki.gov/fcpca/fcpca.crt"
            version="3"
            sha1="90:5F:94:2F:D9:F2:8F:67:9B:37:81:80:FD:4F:84:63:47:F6:45:C1"
            modulus="2048"
            from="2010-12-01"
            to="2030-12-01"/>
      <crl url="http://http.fpki.gov/fcpca/fcpca.crl">CRL</crl>
      <ocsp>http://ocsp.managed.entrust.com/OCSP/EMSSSPCAResponder</ocsp>
      <type>OV</type>
      <document url="http://www.idmanagement.gov/fpkipa/documents/CommonPolicy.pdf">CP</document>
      <document url="http://www.idmanagement.gov/fpkipa/documents/FPKI_CPS_v4_1_Redacted_final_20120515.pdf">CPS</document>
      <document url="http://www.idmanagement.gov/pages.cfm/page/Federal-PKI">Information about Federal PKI</document>
      <document url="http://www.idmanagement.gov/pages.cfm/page/Federal-PKI-Policy-Authority-Shared-Service-Provider-Working-Group-Certified-PKI-Shared-Service-Prov">Certified PKI Shared Service Providers (SSP)</document>
      <document url="http://www.idmanagement.gov/pages.cfm/page/Federal-PKI-Management-Authority-entities-crosscertified-with-the-FBCA">Entities cross-certified with FBCA</document>
      <document url="http://fpkiapps.icam.pgs-lab.com/fbcaApps">Output of Crawl of public repositories starting from FCPCA</document>
      <document url="http://www.idmanagement.gov/fpkipa/documents/SSProadmap.pdf">Shared Service Provider Roadmap through Acceptance Process</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=478418</authorisation>
      </inclusion>
    </certificate>
  </authority>

  <authority name="Scientific Trust" url="http://www.scientific-trust.de/index_en.php" status="incomplete">
    <summary>
      Scientific Trust is a division of the University of Hagen and has its own Root Certificate. 
      Scientific Trust offers Intermediate Certificates to other universities and companies. 
      The primary market is the German speaking area (Austria, Germany, Switzerland).
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.kpmg.de">KPMG</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=974">Audit Report and Management’s Assertions</document>
    </audit>
    <certificate name="Scientific Trust operated by FernUniversitaet in Hagen – G1" status="incomplete">
      <summary>
       This root has one internally-operated subordinate CA issuing client and server certificates. 
       In the future there will be externally-operated subordinate CAs, issuing client and server certificates.
      </summary>
      <data url="http://www.scientific-trust.de/scientific-trust.crt"
            version="3"
            sha1="8A:A3:F5:A6:44:D1:B4:23:97:CF:82:67:5D:1F:D8:35:D0:BA:31:46"
            modulus="4096"
            from="2009-08-24"
            to="2037-12-25"/>
      <crl url="http://cdp1.scientific-trust.de/g1/crl/root.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://www.scientific-trust.de/download/cps_st.pdf">CPS Scientific Trust URL (English)</document>
      <document url="http://www.scientific-trust.de/download/cp.pdf">Certificate Policy URL (English)</document>
      <document url="http://www.scientific-trust.de/download/cps_feu.pdf">CPS FernUniversitaet in Hagen URL (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=531237</authorisation>
      </inclusion>
    </certificate>
  </authority>

  <authority name="TeliaSonera" url="http://www.teliasonera.com/" status="pending">
    <summary>
     TeliaSonera provides telecommunication services in the Nordic and Baltic countries, 
     the emerging markets of Eurasia, including Russia and Turkey, and in Spain. CA operations 
     currently only in Nordic countries. 
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/GL/EN/Home">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1369">Audit Report and Management’s Assertions</document>
    </audit>
        <certificate name="TeliaSonera Root CA v1" status="pending">
      <summary> 
       This root has internally-operated subordinate CAs for server, client, and TeliaSonera internal certificates.
      </summary>
      <data url="http://repository.trust.teliasonera.com/teliasonerarootcav1.cer"
            version="3"
            sha1="43:13:BB:96:F1:D5:86:9B:C1:4E:6A:92:F6:CF:F6:34:69:87:82:37"
            modulus="4096"
            from="2007-10-18"
            to="2032-10-18"/>
      <crl url="http://crl-2.trust.teliasonera.com/teliasonerarootcav1.crl">CRL</crl>
	  <ocsp>http://ocsp.trust.teliasonera.com</ocsp>
      <type>OV</type>
      <document url="https://repository.trust.teliasonera.com">Document and Certificate Repository</document>
      <document url="http://support.partnergate.sonera.com/cavarmennepalvelu_en.html">Customer Support Site</document>
      <document url="https://repository.trust.teliasonera.com/CPS/">CPS Documents (English)</document>
      <document url="http://repository.trust.teliasonera.com/mobile-id">Internal Mobile ID cert CPS (Finnish)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=539924</authorisation>
      </inclusion>
    </certificate>
  </authority>

  <authority name="SITHS" url="http://www.inera.se/Infrastrukturtjanster/SITHS/" status="incomplete">
    <summary>
    SITHS is an abbreviation for Secure IT within Health care.
    The name of the company has been changed from Sjukvårdsrådgivningen (translates to Health Care Guidance) 
    to Inera AB. The organization working with SITHS remains the same. The name SITHS was originally owned 
    by Carelink AB. Carelink was sponsored in a similar way as Sjukvårdsrådgivningen. The two companies 
    were merged two and a half years ago.
    SITHS certificates and e-ID’s are issued to organizations/employees working within or having a 
    business connection to the healthcare sector. The business connection should be delivering 
    healthcare service. SITHS certificates are not issued to the receiver of 
    healthcare services (patients).
    The potential number of users that access health care servers/services is the whole Swedish population, 
    which exceeds 9 million people.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1383">Audit Report and Management’s Assertions</document>
    </audit>
    <certificate name="SITHS Root CA v1" status="incomplete">
      <summary> 
      This root signs certificates for subordinate issuing CAs. 
      Subordinate issuing CAs issue certificates for persons and functions (e.g. applications, servers etc.)
      </summary>
      <data url="http://aia.siths.se/sithsrootcav1.cer"
            version="3"
            sha1="58:5F:78:75:BE:E7:43:3E:B0:79:EA:AB:7D:05:BB:0F:7A:F2:BC:CC"
            modulus="4096"
            from="2012-03-29"
            to="2032-03-29"/>
      <crl url="http://crl1.siths.se/sithsrootcav1.crl">CRL</crl>
      <type>DV</type>
      <document url="http://www.inera.se/SITHSDokument">Document Repository</document> 
	  <document url="http://www.inera.se/Documents/TJANSTER_PROJEKT/Identifieringstjanst_SITHS/Anslutningsdokument_Inera/SITHS-certifikat/siths_certicate_policy.pdf">CP (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=792337</authorisation>
      </inclusion>
    </certificate>
  </authority>
  
  <authority name="ANF" url="http://www.anf.es" status="incomplete">
    <summary>
    ANF Autoridad de Certificación is currently approved by the public administration to issue 
    qualified certificates in the European Union and it is in the process of being approved in 
    other countries (Ecuador and Panama), so Mozilla users in these areas will improve their user 
    experience when relating with government or with other citizens using Mozilla applications. 
    </summary>
    <audit type="TBD">
      <auditor url="">TBD</auditor>
      <document url="">TBD</document>
   </audit>
    <certificate name="ANF Server CA" status="incomplete">
      <summary>
      </summary>
        <data url="http://www.anf.es/anf/ssl/cer/ANF_Server_CA.cer"
        version="3"
        sha1="CE:A9:89:0D:85:D8:07:53:A6:26:28:6C:DA:D7:8C:B5:66:D7:0C:F2"
        modulus="2048" 
        from="2009-11-30" 
        to="2021-11-30"/>
      <crl url="https://crl.anf.es/AC/ANFServerCA.crl">CRL</crl>
      <ocsp>http://www.anf.es/AC/RC/ocsp</ocsp>
      <type>OV</type>
      <document url="http://www1.anf.es/anf/certificacion/certificados-electonicos/anf-ac/200.1.6.html">ANF Certificate Practice Statements</document>
      <document url="http://www.anf.es/anf/ssl/pdf/DPC_ANF_Server_CA_1.3.6.1.4.1.18332.1.9_v_1.0.pdf">Declaration of Practices (DPC) for this root (ANF Server CA)</document>
      <document url="http://www1.anf.es/anf/ssl/pdf/CPSSL.pdf">Certificate Policies for SSL Certificates</document>
      <document url="http://www1.anf.es/anf/ssl/pdf/CPEncryption.pdf">Certificate Policies for Encryption Certificates</document>
      <document url="http://www1.anf.es/anf/ssl/pdf/CPANFAR.pdf">Certificate Policies for Registration Authority Certificates</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=555156</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="CCA" url="http://www.cca.gov.in" status="incomplete">
    <summary>
    The Government of India established the Controller of Certifying Authorities (CCA), 
    under section 17 of the Information Technology (IT) Act 2000, an Act, which was passed 
    by the Indian Parliament in June 2000. The Act defines the legal and administrative framework for 
    establishment of a Public Key Infrastructure (PKI) in the country for creating trust in the electronic 
    environment. The CCA is the apex regulatory body to issue license to Certifying Authorities, in 
    accordance with the provisions of the IT Act 2000. 
    CCA has set up the The Root Certifying Authority of India (RCAI), which is at the root of trust 
    in the hierarchical PKI established in the country. The Certifying Authorities, which meet the 
    requisite criteria specified in the IT Act 2000, are issued licenses to operate by CCA and come 
    under the RCAI.  As on date, there are seven intermediate CA that are operating under RCAI in India.
    </summary>
    <audit type="WebTrust CA Equivalent">
      <auditor url="http://cca.gov.in/rw/pages/auditors.en.do">CCA List of Approved Auditors</auditor>
      <document url="">TBD</document>
   </audit>
    <certificate name="CCA India 2007" status="incomplete">
      <summary>
      Given the size of the hierarchy under this root, we are proceeding with this request as follows: 
      1) Create a separate bug for each of the 7 intermediate CAs to be separately evaluated for 
      inclusion as a trust anchor in NSS. 2) After all 7 of the intermediate CAs have been approved/included, 
      then proceed with evaluating the CCA root certificate for inclusion in NSS. 3) If the CCA root certificate 
      is approved for inclusion in NSS, then the 7 intermediate CAs will be removed from NSS at the same time 
      that the CCA root is included.
      </summary>
        <data url="http://cca.gov.in/rw/resource/cca india 2007.cer"
        version="3"
        sha1="97:22:6A:AE:4A:7A:64:A5:9B:D1:67:87:F2:7F:84:1C:0A:00:1F:D0"
        modulus="2048" 
        from="2007-06-13" 
        to="2015-07-04"/>
      <crl url="http://cca.gov.in/rw/pages/download_certificate.en.do?id=Certificate Revocation Details&amp;type=CRL&amp;year=2007">CRL</crl>
      <type>OV</type>
      <document url="http://cca.gov.in/rw/pages/rcai_cps.en.do">Root CA CPS</document>
      <document url="http://cca.gov.in/rw/pages/becoming_ca_suppdoc.en.do">Steps to become CA</document>
      <document url="http://cca.gov.in/rw/pages/faqs.en.do">FAQ</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=557167</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="SafeScrypt" url="http://www.safescrypt.com/" status="pending">
    <summary>
    SafeScrypt (Sify) Communications Data Security Solutions primary focus is on providing Digital 
    Trust Services and high-end solutions that help businesses migrate to an environment that is 
    secure and enables compliance with Legal and Regulatory requirements for true, end-to-end electronic 
    transactions and overall E-Business. 
    Sify Communications is also India's first intermediate CA under the IT Act 2000 and a VeriSign Affiliate 
    for the Indian Subcontinent offering Managed PKI services to enterprises and Digital Certificates to end-users as well.
    Sify primarily serves Government, Semi-Government, and Private orgranizations in India.
    </summary>
    <audit type="WebTrust CA Equivalent">
      <auditor url="http://www.qadit.com">Qadit Systems</auditor>
      <document url="http://www.qadit.com/sify_safescrypt_certificate_2010.pdf">Audit Equivalency Statement</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=546129">2011 Audit Statement</document>
   </audit>
    <certificate name="Safescrypt India-RCAI Class 2 CA-G2" status="pending">
      <summary>
      This is a sub-CA of the CCA India root certificate. 
      This Class 2 CA has signed 10 subCAs which sign end-entity certs. 
      Certificates signed by this CA are issued to individuals, including members of the general public.
      </summary>
        <data url="http://cca.gov.in/rw/pages/download_certificate.en.do?id=Safescrypt%20India-RCAI%20Class%202%20CA-G2&amp;year=2007"
        version="3"
        sha1="5D:04:0E:E7:FB:6D:C0:BC:01:58:B6:F2:9E:4B:C0:45:D4:18:A6:87"
        modulus="2048" 
        from="2007-07-09" 
        to="2015-07-03"/>
      <crl url="http://crl.safescrypt.com/RCAIClass2.crl">CRL</crl>
      <ocsp>http://ocsp.safescrypt.com</ocsp>
      <type>IV</type>
      <document url="http://www.safescrypt.com/pdf/cps.pdf">CPS (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=562763</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
    
    <certificate name="Safescrypt India-RCAI Class 3 CA-G2" status="pending">
      <summary>
      This is a sub-CA of the CCA India root certificate. 
      This Class 3 CA and has signed one subCA which signs end-entity certs.
      Certificates signed by this CA are issued to individuals, including members of the general public, and organizations.
      </summary>
        <data url="http://cca.gov.in/rw/pages/download_certificate.en.do?id=Safescrypt%20India-RCAI%20Class%203%20CA-G2&amp;year=2007"
        version="3"
        sha1="D3:79:BB:52:95:6D:6E:51:38:D2:25:4D:92:5E:48:2A:1C:4B:8E:CF"
        modulus="2048" 
        from="2007-07-09" 
        to="2015-07-03"/>
      <crl url="http://crl.safescrypt.com/RCAIClass3.crl">CRL</crl>
      <ocsp>http://ocsp.safescrypt.com</ocsp>
      <type>IV</type>
      <document url="http://www.safescrypt.com/pdf/cps.pdf">CPS (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=562763</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="SHECA" url="http://www.sheca.com" status="pending">
    <summary>
    Shanghai Electronic Certification Authority Co., Ltd. (SHECA) is a Shanghai-based commercial 
    company and is one of the biggest Certification Authorities in China.  SHECA is a national recognized 
    CA and operates under China’s Electronic Signature Law. SHECA’s customers include individuals and 
    companies from mainland China, Taiwan and Hong Kong. 
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.pwc.com">PricewaterhouseCoopers</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=755">Audit Report and Management's Assertions</document>
   </audit>
   
    <certificate name="UCA Global Root" status="pending">
      <summary>
      This root has one internally-operated subordinate CA, which signs web server certificates. 
      UCA is the acronym of UniTrust Certification Authority. UniTrust is a registered trademark owned by SHECA.
      </summary>
        <data url="http://ldap2.sheca.com/root/ucaglobalroot.der"
        version="3"
        sha1="0B:97:2C:9E:A6:E7:CC:58:D9:3B:20:BF:71:EC:41:2E:72:09:FA:BF"
        modulus="4096" 
        from="2008-01-01" 
        to="2037-12-31"/>
      <crl url="http://ldap2.sheca.com/root/ucaglobalsub.crl">CRL</crl>
      <ocsp>http://ocsp3.sheca.com/Global/global.ocsp</ocsp>
      <type>OV</type>
      <document url="http://www.sheca.com/policy/">Certificate Policy Documents</document>
      <document url="http://www.sheca.com/service/driver//UniTrustCPV1.1.1.pdf">CP (Chinese)</document>
      <document url="http://www.sheca.com/service/driver/SHECACPSV3.4.1.pdf">CPS (Chinese)</document>
         <document url="https://bugzilla.mozilla.org/attachment.cgi?id=447948">CP (Copy-enabled)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=447947">CPS (Copy-enabled)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=566310</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
    
    <certificate name="UCA Root" status="complete">
      <summary>
      This root has one internally-operated subordinate CA, which signs web server certificates, 
      E-mail certificates, personal identity certificates and others. 
      UCA is the acronym of UniTrust Certification Authority. UniTrust is a registered trademark owned by SHECA.
      </summary>
        <data url="http://ldap2.sheca.com/root/ucaroot.der"
        version="3"
        sha1="82:50:BE:D5:A2:14:43:3A:66:37:7C:BC:10:EF:83:F6:69:DA:3A:67"
        modulus="2048" 
        from="2004-01-01" 
        to="2029-12-31"/>
      <crl url="http://ldap2.sheca.com/root/ucasub.crl">CRL</crl>
      <ocsp>http://ocsp3.sheca.com/Sheca/sheca.ocsp</ocsp>
      <type>OV</type>
      <document url="http://www.sheca.com/policy/">Certificate Policy Documents</document>
      <document url="http://www.sheca.com/service/driver//UniTrustCPV1.1.1.pdf">CP (Chinese)</document>
      <document url="http://www.sheca.com/service/driver/SHECACPSV3.4.1.pdf">CPS (Chinese)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=566310</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="IDRBT" url="http://idrbtca.org.in" status="incomplete">
    <summary>
    IDRBT CA functions under the Services Wing of IDRBT, an autonomouos organization established 
    by the Reserve Bank of India for the research and development in Banking Technology and registered 
    as a Society under Andhra Pradesh (Telengana areas) Public Societies Registration Act. 
    IDRBT offers Certification Services primarily for the members of the 
    INFINET, banks and Financial institutions in India.
    </summary>
    <audit type="WebTrust CA Equivalent">
      <auditor url="http://www.digitalage.co.in/home/default.aspx">Digital Age Strategies</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=472254">Audit Statement</document>
   </audit>
    <certificate name="IDRBT CA 2011" status="incomplete">
      <summary>
      This is a sub-CA of the CCA India root certificate. 
      This CA does not currently have any subordinate CAs. It is used to establish a trust chain from 
      CCA to end entities in digital certificates 
      issued by IDRBT CA to be used in PKI-enabled applications. IDRBT CA offers 3 distinct 
      classes of certification services. Each class of certificate provides specific functionality 
      and security features. The classes are Class 1, Class 2, and Class 3.
      </summary>
        <data url="http://idrbtca.org.in/Download/CA_Certificate_SHA2.cer"
        version="3"
        sha1="C4:76:9E:35:76:51:78:D4:DE:54:34:E6:B4:E2:58:15:E9:0D:0C:FE"
        modulus="2048" 
        from="2011-03-11" 
        to="2016-03-11"/>
      <crl url="http://idrbtca.org.in/crl_2794.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://idrbtca.org.in/repository.htm">IDRBT Document Repository</document>
      <document url="http://idrbtca.org.in/CPS.html">CPS (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=562764</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  
  <authority name="PROCERT" url="https://www.procert.net.ve/eng/index.asp" status="approved">
    <summary>
     PROCERT’s primary market are public and private users in Venzuela.
     PROCERT is a private entity within the Venezuelan Bolivarian Republic, 
     which is accredited by the Venezuelan State as a Provider of Certification Services (PCS), 
     according regulating principles content in the Law related to Data Messages and Electronic 
     Signatures and its regulations as well as in the norms set forth by the Superintendence of 
     Electronic Certification Services (SUCERTE, by its acronym in Spanish), ruling entity regarding 
     electronic certification issues which is part of Popular Power Ministry for Telecommunications 
     and Informatics of the Bolivarian Republic of Venezuela.
     </summary>
    <audit type="ETSI 102 042">
      <auditor url="http://www.suscerte.gob.ve/index.php/es/certificacion/registro-de-auditores">Mariclen Villegas (SUSCERTE Registered Auditor)</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=672757"> Auditor Statement</document>
    </audit>
    <certificate name="PSCProcert" status="approved">
      <summary>
      This is a sub-CA of the “Autoridad de Certificacion Raiz del Estado Venezolano” root certificate 
      owned by SUSCERTE (Superintendencia de Servicios de Certificación Electrónica), which is part of 
      the Ministry of People's Power for Telecommunications and Informatics in the Bolivarian Republic 
      of Venezuela. SUSCERTE is a national government CA that provides electronic certification services 
      to the Bolivarian Republic of the Government of Venezuela. In Bug #489240 it was determined that 
      SUSCERTE’s sub-CAs would apply for inclusion themselves as separate trust anchors.
      This “PSC Procert” cert shows up under “Sistema Nacional de Certificacion Electronica”, which is 
      the O of the Issuer, the “Autoridad de Certificacion Raiz del Estado Venezolano” root certificate.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=512251"
            version="3" 
            sha1="70:C1:8D:74:B4:28:81:0A:E4:FD:A5:75:D7:01:9F:99:B0:3D:50:74" 
            modulus="4096" 
            from="2010-12-28" 
            to="2020-12-25"/>
      <crl url="http://ura.procert.net.ve/lcr/procertca.crl">CRL</crl>
      <ocsp>http://ura.procert.net.ve</ocsp>
      <type>OV</type>
      <document url="https://www.procert.net.ve/eng/procertca.asp">PROCERT CA Information</document>
      <document url="https://www.procert.net.ve/eng/declaration.asp">PROCERT CA Documentation (English)</document>
      <document url="https://www.procert.net.ve/declaracion.asp">PROCERT CA Documentation (Spanish)</document>
      <document url="https://www.procert.net.ve/eng/documentos/dpc.pdf">CPS (English)</document>
      <document url="https://www.procert.net.ve/documentos/dpc.pdf">CPS (Spanish)</document>
      <document url="https://www.procert.net.ve/eng/documentos/pc7.pdf">CP for certs for SSL (Spanish)</document>
      <document url="https://www.procert.net.ve/eng/documentos/pc10.pdf">CP for certs for email (Spanish)</document>
      <document url="https://www.procert.net.ve/eng/documentos/pc9.pdf">CP for certs for Software Signing (Spanish)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>  
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=593805</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=810010</technical>
      </inclusion>
    </certificate>
  </authority>

<authority name="CNNIC" 
              url="http://www.cnnic.cn" status="approved">
    <summary>
     China Internet Network Information Center (CNNIC), the state network information 
     center of China, is a non-profit organization. CNNIC takes orders from the 
     Ministry of Information Industry (MII) to conduct daily business, while it is 
     administratively operated by the Chinese Academy of Sciences (CAS). The CNNIC 
     Steering Committee, a working group composed of well-known experts and commercial 
     representatives in domestic Internet community, supervises and evaluates the structure, 
     operation and administration of CNNIC. The objective customers of the CNNIC root are 
     domain owners from general public, including enterprise, government, organization, 
     league, individual, etc.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1332">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.ey.com">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1347">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="China Internet Network Information Center EV Certificates Root" status="approved">
      <summary>
      This root will only be used for EV certificates. 
      It currently has one internally-operated subCA for issuing EV SSL certs. 
      In the future another subCA may be added for issuing code signing certs.
      </summary>
        <data url="https://bugzilla.mozilla.org/attachment.cgi?id=486481"
        version="3"
        sha1="4F:99:AA:93:FB:2B:D1:37:26:A1:99:4A:CE:7F:F0:05:F2:93:5D:1E"
        modulus="2048" 
        from="2010-08-31"
        to="2030-08-31"/>
      <crl url="http://www.cnnic.cn/download/evcrl/crl1.crl ">CRL</crl>
      <ocsp>http://ocspev.cnnic.cn</ocsp>
      <type>EV (Policy OID 1.3.6.1.4.1.29836.1.10) </type>
      <document url="http://www.cnnic.cn/cps/">Document Repository</document>
      <document url="http://www.cnnic.cn/jczyfw/fwqzs/CNNICfwqzsywgz/201206/W020120502361027520300.pdf">CPS (English)</document>
      <document url="http://www.cnnic.cn/jczyfw/fwqzs/CNNICfwqzsywgz/201206/W020120514557879926993.pdf">EV CPS (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=607208</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=799692</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=799697</ev>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Netrust" url="http://www.netrust.net" status="incomplete">
    <summary>
    Netrust is a private corporation in Singapore, which provides individuals, 
    business and government organizations with a 
    complete online identification and security infrastructure to enable secure 
    lectronic transactions. Besides certificate provisioning, Netrust delivers high 
    quality professional services including security consulting, PKI deployment 
    and custom application development. Netrust was awarded by the International 
    Civil Aviation Organization (ICAO) to setup and operate the global Public Key 
    Directory (PKD).
    </summary>
    <audit type="ETSI TS 101 456 Equivalent">
      <auditor url="http://www.e-cop.net/">e-Cop Pte Ltd</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=532148">Audit Report</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=532143">Comparative Analysis if iDA Security Guidelines with WebTrust and ETSI TS 101 455</document>
    </audit>
    <certificate name="Netrust CA1" status="incomplete">
      <summary>
      The “Netrust CA1” root signs end-entity certificates directly. It does not have any subordinate CAs.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=512868"
            version="3"
            sha1="55:C8:6F:74:14:AC:8B:DD:68:14:F4:D8:6A:F1:5F:37:10:E1:04:D0"
            modulus="2048"
            from="2001-03-29"
            to="2021-03-29"/>
      <crl url="http://netrustconnector.netrust.net/netrust.crl">CRL</crl>
      <ocsp></ocsp>
      <type>OV</type>
      <document url="https://www.netrust.net/ourpractices.php">Document Repository</document>
      <document url="https://www.netrust.net/docs/ourpractices/cps.pdf">Certificate Practice Statement (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=632292</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="PostSignum" url="http://www.postsignum.cz" status="incomplete">
    <summary>
    The PostSignum certification authority is a governmental certification authority (national government) 
    operated by Ceska posta s.p. (Czech Post).
    PostSignum is an accredited provider of certification services in the Czech Republic 
    (accreditation by the Ministry of the Interior of the Czech Republic).
    Qualified certification authorities from the PostSignum PKI hierarchy operate 
    under Czech government regulations and must fulfil mandatory audit requirements 
    stipulated in EU and Czech law.
    </summary>
    <audit type="ETSI TS 101 456 Equivalent">
      <auditor url="http://www.deloitte.com/view/en_CZ/cz/index.htm">Deloitte Advisory s.r.o.</auditor>
    </audit>
    <certificate name="PostSignum Root QCA 2" status="incomplete">
      <summary>
      PostSignum Root QCA 2 has two internally-operated subCAs 
      hich sign qualified (PostSignum Qualified CA 2) or non-qualified 
      (PostSignum Public CA 2) end-entity certs.
      </summary>
      <data url="http://www.postsignum.cz/crt/psrootqca2.crt"
            version="3"
            sha1="A0:F8:DB:3F:0B:F4:17:69:3B:28:2E:B7:4A:6A:D8:6D:F9:D4:48:A3"
            modulus="2048"
            from="2010-01-19"
            to="2025-01-19"/>
      <crl url="http://www.postsignum.cz/crl/psrootqca2.crl">CRL</crl>
      <ocsp></ocsp>
      <type>OV</type>
      <document url="http://www.postsignum.cz/files/politiky/QCA_cp_QCARoot_v_2_0.pdf">CP for Root QCA 2 (Czech)</document>
      <document url="http://www.postsignum.cz/files/politiky/QCA_osobni_crt_v2-0.pdf">CP for Qualified CA 2 Personal Certificates (Czech)</document>
      <document url="http://www.postsignum.cz/files/politiky/QCA_systemove_crt_v2-0.pdf">CP for Qualified CA 2 Systems Certificates (Czech)</document>
      <document url="http://www.postsignum.cz/files/politiky/VCA_osobni_crt_v2-0.pdf">CP for Public CA 2 Personal Certificates (Czech)</document>
      <document url="http://www.postsignum.cz/files/politiky/VCA_serverove_crt_v2-0.pdf">CP for Public CA 2 Server Certificates, SSL/TLS certs (Czech)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=643398</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="PSC-FII" url="https://ar.fii.gob.ve" status="incomplete">
    <summary>
    PSC-FII is a public entity belonging to the Government of the Bolivarian Republic of 
    Venezuela accredited as a Provider of Electronic Certification Services (PSC) by the 
    Superintendence of Electronic Certification Services (Spanish acronym, SUSCERTE) under 
    the Law on Data Messages and Signatures Electronic. PSC-FII’s primary market are public 
    and private users in Venezuela.
    </summary>
    <audit type="ETSI TS 101 456">
      <auditor url="http://www.suscerte.gob.ve/index.php/es/certificacion/registro-deauditores">Milthon J. Chavez</auditor>
      <document url="http://www.suscerte.gob.ve/index.php/es/certificacion/proveedores-acreditados">Accredited Elctronic Certification Services Provider</document>
    </audit>
    <certificate name="PSC Público del MCT para el Estado Venezolano" status="incomplete">
      <summary>
      This is a sub-CA of the “Autoridad de Certificacion Raiz del Estado Venezolano” root 
      certificate owned by SUSCERTE (Superintendencia de Servicios de Certificación Electrónica), 
      which is part of the Ministry of People's Power for Telecommunications and Informatics in 
      the Bolivarian Republic of Venezuela. SUSCERTE is a national government CA that provides 
      electronic certification services to the Bolivarian Republic of the Government of Venezuela. 
      In Bug #489240 it was determined that SUSCERTE’s sub-CAs would apply for inclusion themselves 
      as separate trust anchors. This “PSC Público del MCT para el Estado Venezolano” cert shows up 
      under “Sistema Nacional de Certificacion Electronica”, which is the O of the Issuer, the 
      “Autoridad de Certificacion Raiz del Estado Venezolano” root certificate.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=542275"
            version="3"
            sha1="B2:60:C7:09:D5:B7:D0:BD:97:42:DE:DA:AF:EF:87:6B:33:6C:A7:39"
            modulus="4096"
            from="2008-07-11"
            to="2018-07-09"/>
      <crl url="https://publicador-psc.fii.gob.ve/crl/cacrl.crl">CRL</crl>
      <ocsp></ocsp>
      <type>OV</type>
      <document url="https://ar.fii.gob.ve/pub/docs/DPC2009.pdf">CPS (Spanish)</document>
      <document url="https://ar.fii.gob.ve/pub/docs/DPC1.pdf">CPS (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="email" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=667466</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>

<authority name="T-Systems" url="http://www.t-systems.com" status="approved">
    <summary>
    T-Systems is a wholly-owned subsidiary of Deutsche Telekom AG.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.de.ey.com/">Ernst and Young</auditor>
      <document url="http://cert.webtrust.org/SealFile?seal=1385&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust for sub-CAs">
      <auditor url="http://www.de.ey.com/">Ernst and Young</auditor>
      <document url="http://cert.webtrust.org/SealFile?seal=1371&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.de.ey.com/">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=1372&amp;file=pdf">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="T-TeleSec GlobalRoot Class 3" status="approved">
      <summary>
      T-Systems plans to offer certificates with a high security level (e.g. EV) chaining up to 
      this “T-TeleSec GlobalRoot Class 3” root. High security level services for email and 
      code signing will also be created, and the corresponding Sub-CAs will be operated under 
      this Class 3 root. This Class 3 root will only have internally-operated subordinate CAs. 
      T-Systems currently offers certificates with a standard security level (e.g. OV) chaining up 
      to the currently included “Deutsche Telekom Root CA 2” root. All of those standard security 
      services will eventually chain up to a “T-TeleSec GlobalRoot Class 2” root. 
      Inclusion of the “T-TeleSec GlobalRoot Class 2” root is not currently part of this request. 
      </summary>
      <data url="http://www.telesec.de/downloads/GlobalRoot_Class_3.cer"
            version="3"
            sha1="55:A6:72:3E:CB:F2:EC:CD:C3:23:74:70:19:9D:2A:BE:11:E3:81:D1"
            modulus="2048"
            from="2008-10-01"
            to="2033-10-01"/>
      <crl url="http://pki.telesec.de/rl/GlobalRoot_Class_3.crl">CRL</crl>
      <ocsp>http://ocsp.telesec.de/ocspr</ocsp>
      <type>EV (Policy OID 1.3.6.1.4.1.7879.13.24.1)</type>
      <document url="http://www.telesec.de/pki/roots.html">Repository</document>
      <document url="http://www.telesec.de/serverpass/cps.html">ServerPass CP/CPS (German)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=555341">ServerPass CP/CPS  v1.1 (English)</document>
      <document url="http://www.telesec.de/pki/service/GlobalRoot_Class_3/cp_en.pdf">CP (English)</document>
      <document url="http://www.telesec.de/pki/service/GlobalRoot_Class_3/cp.pdf">CP (German)</document>
      <document url="http://www.telesec.de/pki/service/GlobalRoot_Class_3/cps_en.pdf">CPS (English)</document>
      <document url="http://www.telesec.de/pki/service/GlobalRoot_Class_3/cps.pdf">CPS (German)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=669849</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=760297</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=760313</ev>
      </inclusion>
      <comments>Included in NSS 3.14, Firefox 18. Pending EV enablement.</comments>
    </certificate>
  </authority>
  
  <authority name="SG Trust Services" url="http://www.sgtrustservices.com/en/index.htm" status="approved">
    <summary>
    SG Trust Services is a subsidiary of Groupe SG, which is the high level entity of all subsidiaries 
    of Société Générale.  Société Générale is one of the oldest and largest banks in France, and is a major 
    international financial services company.
    </summary>
    <audit type="ETSI 102 042">
      <auditor url="http://www.lsti-certification.fr">LSTI</auditor>
      <document url="http://www.lsti-certification.fr/images/liste_entreprise/master%20en%20excel%20etsi_12_12_v1.pdf">LSTI Qualified CA</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=702297">ETSI Certificate</document>
    </audit>
    <certificate name="SG TRUST SERVICES RACINE" status="approved">
      <summary>
      SG TRUST SERVICES RACINE has two internally-operated intermediate certificates, 
      one for authentication certificates and another for signing certificates.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=608632"
            version="3"
            sha1="0C:62:8F:5C:55:70:B1:C9:57:FA:FD:38:3F:B0:3D:7B:7D:D7:B9:C6"
            modulus="4096"
            from="2010-09-06"
            to="2030-09-05"/>
      <crl url="http://crl.sgtrustservices.com/racine-GroupeSG/LatestCRL">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV/IV</type>
      <document url="http://www.sgtrustservices.com/home/web/guest/politiquecertifrgs2">Document Repository</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=702296">CP for 2-Star Certs (English translation of some sections)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=662259</authorisation>
		<technical>https://bugzilla.mozilla.org/show_bug.cgi?id=860929</technical>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="ComSign" url="http://www.comsign.co.il/eng/default.asp" status="complete">
    <summary>
    ComSign is a private company owned by Comda, Ltd., a company specializing in information 
    protection products and solutions. In 2003, ComSign was appointed by the Justice Ministry 
    as a certificate authority in Israel in accordance with the Electronic Signature Law 5761-2001, 
    and is currently the only entity issuing legal authorized electronic signatures according to 
    the Israel law. ComSign has issued electronic signatures to thousands of business people in Israel.
    </summary>
    <audit type="Israel Electronic Signature Law">
      <auditor url="http://www.justice.gov.il/MOJEng/Certification+Authorities+Registrar">The State of Israel – Ministry of Justice</auditor>
      <document url="http://www.justice.gov.il/MOJEng/Certification+Authorities+Registrar/Registered+CAs/">Registered CA</document>
    </audit>
    <audit type="ETSI TS 101 456">
      <auditor url="https://bugzilla.mozilla.org/attachment.cgi?id=348789">Sharony-Shefler</auditor>
      <document url="https://bug675060.bugzilla.mozilla.org/attachment.cgi?id=615121">Audit Statement</document>
    </audit>
    <certificate name="ComSign Global Root CA" status="complete">
      <summary>
      This root will eventually replace the “ComSign CA” root certificate that is currently 
      included in NSS, and was approved in bug #420705. It will have three internally-operated 
      subordinate CAs: ComSign ISA Global CA, ComSign Corporations CA, and ComSign Professionals CA.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=549246"
            version="3"
            sha1="AE:3B:31:BF:8F:D8:91:07:9C:F1:DF:34:CB:CE:6E:70:D3:7F:B5:B0"
            modulus="4096"
            from="2011-07-18"
            to="2036-07-16"/>
      <crl url="http://crl1.comsign.co.il/crl/comsignglobalrootca.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>IV</type>
      <document url="http://www.comsign.co.il/main.asp?id=114">ComSign CPS Web Page</document>
      <document url="http://www.comsign.co.il/cps/CPS-English3-1.pdf">CPS (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=675060</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Visa" url="http://www.visa.com" status="incomplete">
    <summary>
    Visa is a global financial services corporation. Certificates issued by this CA 
    will be used to support payment and information delivery applications (business to 
    business payments, business to consumer payments, non-payment applications) as well as 
    some Visa internal applications.  All of these applications are tied to Visa products, 
    services or platforms that are governed by Visa's global operating regulations that bind 
    all of the parties to specified terms, conditions, responsibilities, recourse, etc.  
    Visa has a large international participation base -- 21,000+ banks, billions of customers, 
    millions of acceptors and a global nature.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.kpmg.com/">KPMG</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=662185">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="Visa Information Delivery Root CA" status="incomplete">
      <summary>
      The Visa Information Delivery Root CA has several internally-operated subordinate 
      online CAs that issue end entity certificates for SSL, digital signature, and
      VPN/IP Sec.
      </summary>
      <data url="http://enroll.visaca.com/VisaInfoDeliveryRootCA.crt"
            version="3"
            sha1="5A:4D:0E:8B:5F:DC:FD:F6:4E:72:99:A3:6C:06:0D:B2:22:CA:78:E4"
            modulus="2048"
            from="2005-06-27"
            to="2026-06-27"/>
      <crl url="http://enroll.visaca.com/VisaInfoDeliveryRootCA.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://www.visa.com/pki">Visa PKI Disclosure Statement</document>
      <document url="https://partnernetwork.visa.com/vpn/global/retrieve_document.do?documentRetrievalId=100176">CP (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=636557</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="ANSSI (Government of France)" url="http://www.ssi.gouv.fr/" status="pending">
    <summary>
    ANSSI (Agence nationale de la sécurité des systèmes d'information)is the French Network and 
    Information Security Agency, a part of the French Government. It issues certificates for 
    French Government websites, which are used by the general public. Each department has a sub CA; 
    there are at least 20 at the moment, and potentially up to 60. 
    </summary>
    <audit type="ETSI TS 102 042">
      <auditor url="http://www.ssi.gouv.fr/site_rubrique31.html">French Secretariat GÈnÈral de la DÈfense Nationale</auditor>
      <document url="https://bug666771.bugzilla.mozilla.org/attachment.cgi?id=661038">Surveillance Audit Statement</document>
      <document url="http://www.ssi.gouv.fr/fr/anssi/services-securises/igc-a/attestation-audits.html">Statement about Audits relating to IGC/A</document>
    </audit>
    <certificate name="IGC/A AC racine Etat francais" status="pending">
      <summary>
       This is the RSA4096-SHA256 root certificate of the French Government CA. 
       The RSA2048-SHA1 IGC/A root certificate is currently included in NSS, as per bug #368970. 
       The IGC/A root issues subordinate CAs for government or administrative organizations only. 
       Each of these subordinate CAs may issue end-entity certificates or additional subordinate 
       CAs to be used for divisions within that organization. Each organization is required to 
       follow the CP and the Government RGS, and be audited. 
      </summary>
      <data url="http://www.ssi.gouv.fr/IMG/crt/igcaRSA4096-072011.crt"
            version="3"
            sha1="1A:C9:2F:09:EA:89:E2:8B:12:6D:FA:C5:1E:3A:F7:EA:90:95:A3:EE"
            modulus="4096"
            from="2011-07-08"
            to="2028-04-15"/>
      <crl url="http://www.ssi.gouv.fr/fr/sigelec/igca/revocation/igca4096.crl">CRL</crl>
      <type>OV</type>
      <document url="http://www.ssi.gouv.fr/IMG/pdf/IGCA_PC_v2-1.pdf">IGCA-PC (French)</document>
      <document url="http://www.ssi.gouv.fr/IMG/pdf/RGS_PC-Type_Authentification_Serveur_V2-3.pdf">CP for SSL/TLS authentication certs</document>
      <document url="http://www.ssi.gouv.fr/IMG/pdf/RGS_PC-Type_Cachet_V2_3.pdf">CP for e-sign certs for servers</document>
      <document url="http://crl.diplomatie.gouv.fr/AC_Utilisateurs/AC_UTILISATEURS_PC_Signature_Agent_V1.5.pdf">CP for email certs for people working for the Foreign Affairs Ministry</document>
      <document url="http://crl.diplomatie.gouv.fr/AC_Utilisateurs/AC_UTILISATEURS_PC_Signature_Externe_V1.3.pdf">CP for email certs for people working for another Administration working with the Foreign Affairs Ministry</document>
      <document url="http://www.ssi.gouv.fr/IMG/pdf/RGS_Variables_de_temps_V2-3.pdf">Variables de Temps</document>
      <document url="http://www.ssi.gouv.fr/fr/menu/pied-de-page/aide-et-accessibilite/foire-aux-questions/faq-igc-a.html">IGC/A FAQ</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=693450</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Entrust" url="http://www.entrust.net/" status="complete">
    <summary>Entrust is a commercial CA serving the global market for
      SSL web certificates. Entrust also issues certificates to
      subordinate CAs for enterprise and commercial use.</summary>
    <audit type="WebTrust CA and WebTrust EV">
      <auditor url="http://www.deloitte.ca/">Deloitte and Touche LLP</auditor>
      <document url="https://entrust.webtrust.org/SealFile?seal=328&amp;file=pdf">Audit Report and Management's Assertions</document>
      </audit>
    <certificate name="Entrust.net Certification Authority (2048)" status="approved">
      <summary>
      This root is already included in NSS. It has been updated to extend the validity period 
      and to correct the Basic Constraints extension. This root is Entrust's primary trust anchor 
      for commercially issuing SSL, S/MIME, and Code Signing certificates.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=567058"
            version="3"
            sha1="50:30:06:09:1D:97:D4:F5:AE:39:F7:CB:E7:92:7D:7D:65:2D:34:31"
            modulus="2048"
            from="1999-12-24"
            to="2029-07-24"/>
      <crl url="http://crl.entrust.net/2048ca.crl">CRL</crl>
      <ocsp>http://ocsp.entrust.net</ocsp>
      <type>OV, EV (policy OID 2.16.840.1.114028.10.1.2)</type>
      <document url="http://www.entrust.net/CPS">Document Repository</document>
      <document url="http://www.entrust.net/CPS/pdf/ssl-cps-250612-v2-8.pdf">CPS (English)</document>
      <document url="http://www.entrust.net/CPS/pdf/evssl_cps_english250612.pdf">EV CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=694536</authorisation>
		<technical>https://bugzilla.mozilla.org/show_bug.cgi?id=856678</technical>
      </inclusion>
      <comments></comments>
    </certificate>
    
    <certificate name="Entrust Root Certification Authority - G2" status="complete">
      <summary>
      This is a new root which has been signed with the SHA-256 algorithm. This root is 
      intended to eventually replace Entrust's SHA-1 signed roots. This root is intended 
      to be used for commercially issuing SSL, S/MIME, and Code Signing certs.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=567059"
            version="3"
            sha1="8C:F4:27:FD:79:0C:3A:D1:66:06:8D:E8:1E:57:EF:BB:93:22:72:D4"
            modulus="2048"
            from="2009-07-07"
            to="2030-12-07"/>
      <crl url="http://crl.entrust.net/g2ca.crl">CRL</crl>
      <ocsp>http://ocsp.entrust.net</ocsp>
      <type>OV, EV (policy OID 2.16.840.1.114028.10.1.2)</type>
      <document url="http://www.entrust.net/CPS">Document Repository</document>
      <document url="http://www.entrust.net/CPS/pdf/ssl-cps-250612-v2-8.pdf">CPS (English)</document>
      <document url="http://www.entrust.net/CPS/pdf/evssl_cps_english250612.pdf">EV CPS</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=849950</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Atos" url="https://pki.atos.net/TrustedRoot/" status="pending">
    <summary>
    Atos Trustcenter acts in Europe, but also has international customers. The PKI-Services 
    are offered to the Public, with no restrictions to user groups.
    </summary>
    <audit type="ETSI TS 102 042">
      <auditor url="https://de.dqs-ul.com">DQS Holding GmbH</auditor>
      <document url="https://de.dqs-ul.com/kunden/kundendatenbank.html?aoemydqs%5Bcompany_no%5D=334220&amp;aoemydqs%5Baction%5D=singleView&amp;cHash=c086db2a2cd03a17407d1f2712ab2dd4">
      ETSI Certificate</document>
    </audit>
    <audit type="ETSI TS 102 042">
      <auditor url="https://de.dqs-ul.com">DQS Holding GmbH</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=635650">Annual Serveillance Audit Statement</document>
    </audit>
    <certificate name="Atos TrustedRoot 2011" status="pending">
      <summary>
       This root has signed three types of internally-operated intermediate CAs 
       for issuing SSL server, client, and code signing certificates.
      </summary>
      <data url="https://pki.atos.net/certs/Atos_TrustedRoot_2011.cer"
            version="3"
            sha1="2B:B1:F5:3E:55:0C:1D:C5:F1:D4:E6:B7:6A:46:4B:55:06:02:AC:21"
            modulus="2048"
            from="2011-07-07"
            to="2030-12-31"/>
      <crl url="https://pki.atos.net/crl/Atos_TrustedRoot_CA_2011.crl">CRL</crl>
      <ocsp>http://pki-ocsp.atos.net</ocsp>
      <type>DV, OV</type>
      <document url="https://pki.atos.net/EJPKI-WebFrontend/Public/TrustedRoot/Download?File=AtosTrustedCA_CPS_v1.5.pdf">CPS (English)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=582228">Subscriber Agreement</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=711366</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="Digidentity" url="http://www.digidentity.eu/" status="incomplete">
    <summary>
    Digidentity is a private company often working for the Dutch Government, whose 
    customers are (mostly Dutch) companies, governmental entities and consumers.
    Digidentity is a Certificate Service Provider through a 'Besloten Vennootschap', 
    the Dutch equivalent to a Private Limited company.
    </summary>
    <audit type="ETSI TS 101 456">
      <auditor url="http://www.bsigroup.com">British Standards Institution (BSI)</auditor>
      <document url="http://www.bsigroup.com/en/Assessment-and-certification-services/Client-directory/CertificateClient-Directory-Search-Results/?pg=1&amp;licencenumber=ETS+015&amp;searchkey=companyXeqXDigidentity">
      ETSI Certificate</document>
    </audit>
    <certificate name="Digidentity L3 Root CA - G2" status="incomplete">
      <summary>
       The root is offline, and signs internally-operated subordinate CAs.
      </summary>
      <data url="https://www.digidentity.eu/static/nl/downloads/level%203/der/Digidentity%20L3%20Root%20CA%20-%20G2.der"
            version="3"
            sha1="F1:38:A3:30:A4:EA:98:6B:EB:52:0B:B1:10:35:87:6E:FB:9D:7F:1C"
            modulus="4096"
            from="2011-04-29"
            to="2031-11-10"/>
      <crl url="http://pki.digidentity.eu/L3/root/latestCRL.crl">CRL</crl>
      <ocsp><!-- None --></ocsp>
      <type>OV</type>
      <document url="http://pki.digidentity.eu/validatie">Document Repository</document>
      <document url="https://www.digidentity.eu/downloads/Certification%20Practice%20Statement%20L3.pdf">CPS (Dutch)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=623056">CPS (English)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=693273</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="CATCert" url="http://www.catcert.net" status="incomplete">
    <summary>
     CATCert is the Catalan Agency of Certification (Agència Catalana de Certificació).
     CATCert’s aim is to provide digital certification services and promote the usage 
     of digital signature in order to make safer the communications within the Catalan 
     government and the communications (within and for) the Catalan government.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/es">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=1063&amp;file=pdf">Audit Report and Management Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.ey.com/es">Ernst and Young</auditor>
      <document url="https://cert.webtrust.org/SealFile?seal=1189&amp;file=pdf">Audit Report and Management Assertions</document>
    </audit>
    <certificate name="EC-ACC" status="incomplete">
      <summary>
      This is the SHA-256 version of the EC-ACC root certificate that was included in NSS per bug #295474.
      </summary>
        <data url="http://www.catcert.cat/descarrega/acc_sha2.crt"
        version="3"
        sha1="A1:DA:3F:18:BF:40:AF:2A:A7:48:07:9C:1F:0F:14:DC:39:D4:3C:7A"
        modulus="2048" 
        from="2012-04-17"
        to="2031-01-07"/>
      <crl url="http://epscd.catcert.net/crl/ec-acc.crl">CRL</crl>
      <ocsp>http://ocsp.catcert.net</ocsp>
      <type>OV</type>
      <document url="http://www.catcert.cat/registre">Document Repository (Catalan)</document>
      <document url="http://www.catcert.cat/web/cat/5_1_politica_general.jsp">Certification Policy (Catalan)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=479370">Certification Policy Section 3 (English)</document>
      <document url="http://www.catcert.cat/web/cat/5_2_declaracio.jsp">Declaración de Prácticas de Certificación (DPC) for each sub-CA (Catalan)</document>
      <document url="http://www.catcert.cat/descarrega/ER_T_CAT/Procediments.zip">Operative Procedure (Catalan)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=720326</authorisation>
      </inclusion>
      <comments></comments>
    </certificate>
  </authority>
  
  <authority name="TWCA" url="http://www.twca.com.tw/" status="approved">
    <summary>
     Taiwan CA. Inc. (TWCA) is a commercial CA that provides a consolidated on-line 
     financial security certificate service and a sound financial security environment, 
     to ensure the security of on-line finance and electronic commercial trade in Taiwan.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.dfk.com/">SunRise CPAs’ Firm, a member firm of DFK</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1322">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.dfk.com/">SunRise CPAs’ Firm, a member firm of DFK</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1323">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="TWCA Root Certification Authority" status="approved">
      <summary>
      This request is to turn on the Code Signing trust bit and enable EV for the 
      “TWCA Root Certification Authority” root certificate that was included in 
      NSS per bug #518503.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=402647"
            version="3"
            sha1="CF:9E:87:6D:D3:EB:FC:42:26:97:A3:B5:A3:7A:A0:76:A9:06:23:48"
            modulus="2048"
            from="2008-08-28"
            to="2030-12-31"/>
      <crl url="http://RootCA.twca.com.tw/TWCARCA/revoke_2048.crl">CRL</crl>
      <ocsp>http://evsslocsp.twca.com.tw/</ocsp>
      <type>OV, EV (policy OID 1.3.6.1.4.1.40869.1.1.22.3)</type>
      <document url="http://www.twca.com.tw/Portal/english/coporate_profile/Repository.html">Document Repository (English)</document>
      <document url="http://www.twca.com.tw/Portal/save/save.html">Document Repository (Chinese)</document>
      <document url="http://www.twca.com.tw/Portal/english/coporate_profile/mission.html">Corporate Profile (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=745671</authorisation>
		<technical>https://bugzilla.mozilla.org/show_bug.cgi?id=823766</technical>
        <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=823770</ev>
      </inclusion>
    </certificate>
    <certificate name="TWCA Global Root CA" status="incomplete">
      <summary>
      This SHA-256 root will eventually replace the SHA-1 “TWCA Root Certification Authority” 
      root certificate that was included in NSS per bug #518503.
      </summary>
      <data url="https://bugzilla.mozilla.org/attachment.cgi?id=679898"
            version="3"
            sha1="9C:BB:48:53:F6:A4:F6:D3:52:A4:E8:32:52:55:60:13:F5:AD:AF:65"
            modulus="4096"
            from="2012-06-27"
            to="2030-12-31"/>
      <crl url="http://RootCA.twca.com.tw/TWCARCA/global_revoke_4096.crl">CRL</crl>
      <ocsp>http://RootOcsp.twca.com.tw/</ocsp>
      <type>OV, EV (policy OID 1.3.6.1.4.1.40869.1.1.22.3)</type>
      <document url="http://www.twca.com.tw/Portal/english/coporate_profile/Repository.html">Document Repository (English)</document>
      <document url="http://www.twca.com.tw/Portal/save/save.html">Document Repository (Chinese)</document>
      <document url="http://www.twca.com.tw/Portal/english/coporate_profile/mission.html">Corporate Profile (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=810133</authorisation>
      </inclusion>
    </certificate>
  </authority>
  
  <authority name="Swisscom" url="http://www.swissdigicert.ch" status="approved">
    <summary>
     Swisscom AG is a commercial CSP that provides certification services for individual and 
     corporate customers. Swisscom operates a certificate authority and registration authority. 
     Customers may choose to use the registration services of Swisscom and purchase single 
     certificates. Customers may also choose to operate their own registration authority (managed PKI).
    </summary>
    <audit type="ETSI TS 101 456">
      <auditor url="http://www.kpmg.ch">KPMG</auditor>
      <document url="http://www.seco.admin.ch/sas/00229/00251/index.html?lang=en">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.kpmg.ch">KPMG</auditor>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=667939">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="Swisscom Root CA 2" status="approved">
      <summary>
      This “Swisscom Root CA 2” root cert will eventually replace the “Swisscom Root CA 1” 
      root cert that was included in NSS as per bug #342470.
      </summary>
      <data url="http://aia.swissdigicert.ch/sdcs-root2.crt"
            version="3"
            sha1="77:47:4F:C6:30:E4:0F:4C:47:64:3F:84:BA:B8:C6:95:4A:8A:41:EC"
            modulus="4096"
            from="2011-06-24"
            to="2031-06-25"/>
      <crl url="http://crl.swissdigicert.ch/sdcs-root2.crl">CRL</crl>
      <ocsp>http://ocsp.swissdigicert.ch/sdcs-diamant2</ocsp>
      <type>DV, OV</type>
      <document url="http://www.swissdigicert.ch/sdcs/portal/page?node=download_docs">Document Repository</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=deutsch%2F002_CPS_SDCS_2_16_756_83_2_1_v2_2_de.pdf">CPS (German)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=english%2F002_CPS_Swisscom_Digital_Certificate_Services_2_16_756_83_2_1_V2_2_en.pdf">CPS (English)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=deutsch%2F007_CP_Smaragd_SDCS_2_16_756_1_83_3_V2_2b_de.pdf">Emerald CP (German)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=deutsch%2F006_CP_Saphir_SDCS_2_16_756_1_83_3_V2_0_de.pdf">Sapphire CP (German)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/open_pdf?file=deutsch%2F009_CP_Rubin_SDCS_2_16_756_1_83_4_V2_0_de.pdf">Ruby CP (German)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=759732</authorisation>
		<technical>https://bugzilla.mozilla.org/show_bug.cgi?id=856695</technical>
      </inclusion>
    </certificate>
    <certificate name="Swisscom Root EV CA 2" status="approved">
      <summary>
      This is a new EV root cert with one internally-operated subCA. 
      </summary>
      <data url="http://www.swissdigicert.ch/download/sdcs-root2-ev.crt"
            version="3"
            sha1="E7:A1:90:29:D3:D5:52:DC:0D:0F:C6:92:D3:EA:88:0D:15:2E:1A:6B"
            modulus="4096"
            from="2011-06-24"
            to="2031-06-25"/>
      <crl url="http://www.swissdigicert.ch/download/sdcs-root2-ev.crl">CRL</crl>
      <ocsp>http://ocsp.swissdigicert.ch/root2-ev</ocsp>
      <type>EV (policy OID 2.16.756.1.83.21.0)</type>
      <document url="http://www.swissdigicert.ch/sdcs/portal/page?node=download_docs">Document Repository</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=deutsch%2F002_CPS_SDCS_2_16_756_83_2_1_v2_2_de.pdf">CPS (German)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=english%2F002_CPS_Swisscom_Digital_Certificate_Services_2_16_756_83_2_1_V2_2_en.pdf">CPS (English)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=deutsch%2F007_CP_Smaragd_SDCS_2_16_756_1_83_3_V2_2b_de.pdf">Emerald CP (German)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=deutsch%2F102_CPS_SDCS_EV_2_16_756_1_83_2_2_V2_1_de.pdf">EV CPS (German)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=deutsch%2F008_CP_Quartz_EV_SDCS_2_16_756_1_83_4_V2_3_de_en.pdf">EV CP (German, English Translations of certain sections provided in Appendix)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/download_file?file=deutsch%2F006_CP_Saphir_SDCS_2_16_756_1_83_3_V2_0_de.pdf">Sapphire CP (German)</document>
      <document url="http://www.swissdigicert.ch/sdcs/portal/open_pdf?file=deutsch%2F009_CP_Rubin_SDCS_2_16_756_1_83_4_V2_0_de.pdf">Ruby CP (German)</document>
      <trust>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
	    <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=759732</authorisation>
	    <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=856695</technical>
	    <ev>https://bugzilla.mozilla.org/show_bug.cgi?id=856710</ev>
      </inclusion>
    </certificate>
  </authority>
  
  <authority name="Disig" url="http://www.disig.eu" status="approved">
    <summary>
     Disig is a public Certification Service Provider, located in Slovakia.  
     Disig focus its certification service mainly for Slovakian market for the 
     customer from general public, private companies, governmental organization.
    </summary>
    <audit type="ETSI 102042">
      <auditor url="http://www.qscert.sk/">QSCert</auditor>
      <document url="http://www.disig.eu/_pdf/audit2012_report.pdf">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="CA Disig Root R1" status="approved">
      <summary>
      This cert will eventually replace the current CA Disig root certificate 
      included in Mozilla products (Bugzilla #455878). This root will sign internally-operated 
      intermediate certificates that will sign entity certificates for SSL, digital signature, 
      sending/receiving e-mail, and code signing.
      </summary>
      <data url="http://www.disig.sk/rootcar1/cert/rootcar1.der"
            version="3"
            sha1="8E:1C:74:F8:A6:20:B9:E5:8A:F4:61:FA:EC:2B:47:56:51:1A:52:C6"
            modulus="4096"
            from="2012-07-19"
            to="2042-07-19"/>
      <crl url="http://www.disig.sk/rootcar1/crl/rootcar1.crl">CRL</crl>
      <ocsp>http://rootcar1-ocsp.disig.sk/ocsp/rootcar1</ocsp>
      <type>OV</type>
      <document url="http://www.disig.sk/_pdf/cp-disig.pdf">CP (Slovak)</document>
      <document url="http://www.disig.eu/_pdf/cp-cadisig-eng.pdf">CP (English)</document>
      <document url="http://www.disig.sk/_pdf/cps_ra_cadisig.pdf">CPS (Slovak)</document>
      <document url="http://www.disig.eu/_pdf/cps_ra_cadisig_eng.pdf">CPS (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=792377</authorisation>
		<technical>https://bugzilla.mozilla.org/show_bug.cgi?id=823753</technical>
      </inclusion>
    </certificate>
    <certificate name="CA Disig Root R2" status="approved">
      <summary>
      Root certificate for SHA2 CA chain hierarchy.
      This root will sign internally-operated intermediate certificates that will 
      sign entity certificates for SSL, digital signature, sending/receiving e-mail, 
      and code signing.
      </summary>
      <data url="http://www.disig.sk/rootcar2/cert/rootcar2.der"
            version="3"
            sha1="B5:61:EB:EA:A4:DE:E4:25:4B:69:1A:98:A5:57:47:C2:34:C7:D9:71"
            modulus="4096"
            from="2012-07-19"
            to="2042-07-19"/>
      <crl url="http://www.disig.sk/rootcar2/crl/rootcar2.crl">CRL</crl>
      <ocsp>http://rootcar2-ocsp.disig.sk/ocsp/rootcar2</ocsp>
      <type>OV</type>
      <document url="http://www.disig.sk/_pdf/cp-disig.pdf">CP (Slovak)</document>
      <document url="http://www.disig.eu/_pdf/cp-cadisig-eng.pdf">CP (English)</document>
      <document url="http://www.disig.sk/_pdf/cps_ra_cadisig.pdf">CPS (Slovak)</document>
      <document url="http://www.disig.eu/_pdf/cps_ra_cadisig_eng.pdf">CPS (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=792377</authorisation>
		<technical>https://bugzilla.mozilla.org/show_bug.cgi?id=823753</technical>
      </inclusion>
    </certificate>
  </authority>
  
  <authority name="Firmaprofesional" url="http://www.firmaprofesional.com" status="incomplete">
    <summary>
     Firmaprofesional is a commercial CA in Spain that issues certificates to professional 
     corporations, companies and other institutions.  Their main activity is the generation, 
     transmission and distribution of digital certificates through professional corporations, 
     companies or other institutions, which act as Registration Authorities and Certification 
     Authorities in the hierarchy of certification Firmaprofesional. Firmaprofesional has a 
     network of more than 70 Registration Authorities located throughout Spain.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=946">Audit Report and Management's Assertions</document>
    </audit>
    <audit type="WebTrust EV">
      <auditor url="http://www.ey.com/">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1363">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="Autoridad de Certificacion Firmaprofesional CIF A62634068" status="incomplete">
      <summary>
      This request is to enable EV for this root certificate that is 
      currently included in NSS as per Bugzilla #521439.
      </summary>
      <data url="http://crl.firmaprofesional.com/caroot.crt"
            version="3"
            sha1="AE:C5:FB:3F:C8:E1:BF:C4:E5:4F:03:07:5A:9A:E8:00:B7:F7:B6:FA"
            modulus="4096"
            from="2009-05-20"
            to="2030-12-31"/>
      <crl url="http://crl.firmaprofesional.com/fproot.crl">CRL</crl>
      <ocsp>http://servicios.firmaprofesional.com/ocsp</ocsp>
      <type>OV, EV (policy OID 1.3.6.1.4.1.13177.10.1.3.10)</type>
      <document url="http://www.firmaprofesional.com/cps">Document Repository</document>
      <document url="http://www.firmaprofesional.com/cps/FP_CPS_5.pdf">CPS (Spanish)</document>
      <document url="https://bugzilla.mozilla.org/attachment.cgi?id=664446">SSL CP (English)</document>
      <document url="http://www.firmaprofesional.com/cps/FP_CP_Gen_Servidor_Web_SSL_6.1.pdf">SSL CP (Spanish)</document>
      <document url="http://www.firmaprofesional.com/cps/FP_CP_Gen_Firma_Codigo_5.pdf">Code Signing CP (Spanish)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=794036</authorisation>
      </inclusion>
    </certificate>
  </authority>
  
    <authority name="ACCV" url="http://www.accv.es" status="approved">
    <summary>
     The ACCV CA is operated by the government of the Valencia region of Spain. 
	 ACCV issues certificates for persons (with email), web sites and for signing code, 
	 in different policies, but with the same root. ACCV is a public certificate service 
	 provider and the intended use for this root certificate is to improve the electronic 
	 administration between citizens and the administration.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.dnbcons.com/">DNB</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1352">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="ACCVRAIZ1" status="approved">
      <summary>
      This root will eventually replace the “Root CA Generalitat Valenciana” root that was included via bug #274100.
	  This root cert has signed two internally-operated subordinate CA certificates, ACCVCA-110 and ACCVCA-120.
      </summary>
      <data url="http://www.accv.es/fileadmin/Archivos/certificados/ACCVRAIZ1.crt"
            version="3"
            sha1="93:05:7A:88:15:C6:4F:CE:88:2F:FA:91:16:52:28:78:BC:53:64:17"
            modulus="4096"
            from="2011-05-05"
            to="2030-12-31"/>
      <crl url="http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl">CRL</crl>
      <ocsp>http://ocsp.accv.es</ocsp>
      <type>DV, OV</type>
      <document url="http://www.accv.es/quienes-somos/practicas-y-politicas-de-certificacion/">Document Repository</document>
      <document url="http://www.accv.es/quienes-somos/practicas-y-politicas-de-certificacion/politicas-de-certificacion/">All CP Documents listed by certificate usage</document>
	  <document url="http://www.accv.es/fileadmin/Archivos/Politicas_pdf/ACCV-CP-03V3.0-c.pdf">SSL CP (Spanish)</document>
	  <document url="http://www.accv.es/fileadmin/Archivos/Politicas_pdf/ACCV-CP-04V3.0-c.pdf">Code Signing CP (Spanish)</document>
	  <document url="http://www.accv.es/fileadmin/Archivos/Politicas_pdf/ACCV-CP-13V4.0-c.pdf">Qualified Certs CP for Public Employees (Spanish)</document>
	  <document url="http://www.accv.es/fileadmin/Archivos/Politicas_pdf/ACCV-CP-07V5.0-c.pdf">Qualified Certs CP for Citizens (Spanish)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=811352</authorisation>
        <technical>https://bugzilla.mozilla.org/show_bug.cgi?id=872279</technical>
      </inclusion>
    </certificate>
  </authority>

    <authority name="KIR" url="http://www.kir.com.pl" status="incomplete">
    <summary>
     KIR S.A. is a private corporation, and is the one of the biggest Polish CAs which currently mainly 
	 issues qualified certificates for general public. Our certification is for non-qualified certificates o
	 nly but our clients of qualified certificates are very interested in trusted non-qualified certificates. 
	 Since KIR S.A.’s is automated clearing house in Poland and its core business is clearings, KIR S.A. has 
	 built numerous contacts /business relationships within banking sector. Due to that fact, KIR S.A is aiming 
	 to expand its sales in services like: SSL or VPN certificates. KIR S.A’s another line of products called 
	 PayByNet, has created a vast network of relationships within online stores and KIR S.A can leverage them 
	 to create customer base for trusted non-qualified certificates.
    </summary>
    <audit type="WebTrust CA">
      <auditor url="http://www.ey.com/">Ernst &amp; Young</auditor>
      <document url="https://cert.webtrust.org/ViewSeal?id=1365">Audit Report and Management's Assertions</document>
    </audit>
    <certificate name="SZAFIR ROOT CA" status="incomplete">
      <summary>
      This root currently has one internally-operated intermediate certificate, which issues 
	  certificates for SSL, S/MIME, and code signing.
      </summary>
      <data url="http://www.elektronicznypodpis.pl/certyfikaty/root_ca.crt"
            version="3"
            sha1="D3:EE:FB:CB:BC:F4:98:67:83:86:26:E2:3B:B5:9C:A0:1E:30:5D:B7"
            modulus="2048"
            from="2011-12-06"
            to="2031-12-06"/>
      <crl url="">CRL</crl>
      <ocsp><!-- none --></ocsp>
      <type>OV</type>
	  <document url="http://elektronicznypodpis.pl/files/doc/cps_szafir_trusted_nq_11_20120316_en.pdf">CPS (English)</document>
	  <document url="http://elektronicznypodpis.pl/files/doc/certification_policy_trusted_nq_20111216_en.pdf">CP (English)</document>
      <trust>
        <flag type="email" startdate="" enddate=""/>
        <flag type="web" startdate="" enddate=""/>
        <flag type="code" startdate="" enddate=""/>
      </trust>
      <inclusion date="">
        <authorisation>https://bugzilla.mozilla.org/show_bug.cgi?id=817994</authorisation>
      </inclusion>
    </certificate>
  </authority>

</certificates>