diff --git a/certificate-profile-server-authentication.md b/certificate-profile-server-authentication.md
index 170faa6f..401667b0 100644
--- a/certificate-profile-server-authentication.md
+++ b/certificate-profile-server-authentication.md
@@ -32,7 +32,7 @@ Below is the full server authentication certificate profile with _all_ fields an
| Key Usage | Mandatory | True | **Required Key Usage:**
digitalSignature
**Optional Key Usage:**
keyEncipherment for RSA Keys
keyAgreement for Elliptic Curve
**Prohibited Key Usage:**
keyCertSign and cRLSign |
| Extended Key Usage | Mandatory | False | **Required Extended Key Usage:**
Server Authentication id-kp-serverAuth {1.3.6.1.5.5.7.3.1}
**Optional Extended Key Usage:**
Client Authentication id-kp-clientAuth {1.3.6.1.5.5.7.3.2}
**Prohibited Extended Key Usage:**
anyEKU EKU {2.5.29.37.0}
all others |
| Certificate Policies | Mandatory | False | **Required Certificate Policy Fields:**
See Section 7.1.6.4. One US Government certificate policy OID listed in Section 7.1.6.1 asserting compliance with this CP, and one CAB Forum certificate policy OID listed in Section 7.1.6.1 asserting compliance with the CAB Forum Baseline Requirements.
**Optional Certificate Policy Fields:**
certificatePolicies:policyQualifiers
policyQualifierId id-qt 1
qualifier:cPSuri |
-| Subject Alternative Name | Mandatory | False | This extension shall contain at least one entry. Each entry shall be a dNSName containing the Fully-Qualified Domain Name of a server. This extension shall not include any Internal Name values.
All entries shall be validated in accordance with Section 3.2.2.4. |
+| Subject Alternative Name | Mandatory | False | This extension shall contain at least one entry. Each entry shall be a dNSName containing the Fully-Qualified Domain Name of a server. This extension shall not include any Internal Name values.
All entries shall be validated in accordance with Section 3.2.2.4.
Underscore characters (“_”) MUST NOT be present in dNSName entries. |
| Authority Information Access | Mandatory | False | **Required AIA Fields:**
**OCSP**
Publicly accessible URI of Issuing CA's OCSP responder accessMethod = {1.3.6.1.5.5.7.48.1}
**Id-ad-caIssuers**
Publicly accessible URI of Issuing CA’s certificate accessMethod = {1.3.6.1.5.5.7.48.2}
All instances of this access method shall include the HTTP URI name form to specify an HTTP accessible location containing either a single DER encoded certificate, or a BER or DER encoded “certs-only” CMS message as specified in [RFC5272]. |
| CRL Distribution Points | Mandatory | False | At least one HTTP URI to the location of a publicly accessible, full and complete CRL. The reasons and cRLIssuer fields must be omitted. |
| Private Extensions | Optional | False | Only extensions that have context for use on the public Internet are allowed. Private extensions must not cause interoperability issues. CA must be aware of and defend reason for including in the certificate, and use of Private Extensions shall be approved by the FPKI Policy Authority. |