This chapter describes the procedures used to identify and authenticate certificate requesters to a RA or CA before certificate issuance. It also describes how parties requesting re-keying or revocation are authenticated. This chapter also details naming practices.