[Ace] Last Call: <draft-ietf-ace-usecases-09.txt> (ACE use cases) to Informational RFC

The IESG <iesg-secretary@ietf.org> Thu, 08 October 2015 17:02 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B308E1ACE61; Thu, 8 Oct 2015 10:02:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level:
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rKME7-rLmozR; Thu, 8 Oct 2015 10:01:59 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A0E11ABD35; Thu, 8 Oct 2015 10:01:59 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.4.1
Auto-Submitted: auto-generated
Precedence: bulk
Sender: iesg-secretary@ietf.org
Message-ID: <20151008170159.15204.85259.idtracker@ietfa.amsl.com>
Date: Thu, 08 Oct 2015 10:01:59 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/ace/D9gAq9T7Z5RP72wCc8Mro7H-B1A>
Cc: ace@ietf.org
Subject: [Ace] Last Call: <draft-ietf-ace-usecases-09.txt> (ACE use cases) to Informational RFC
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: ietf@ietf.org
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Oct 2015 17:02:00 -0000

The IESG has received a request from the Authentication and Authorization
for Constrained Environments WG (ace) to consider the following document:
- 'ACE use cases'
  <draft-ietf-ace-usecases-09.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2015-10-22. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   Constrained devices are nodes with limited processing power, storage
   space and transmission capacities.  These devices in many cases do
   not provide user interfaces and are often intended to interact
   without human intervention.

   This document includes a collection of representative use cases for
   authentication and authorization in constrained environments.  These
   use cases aim at identifying authorization problems that arise during
   the lifecycle of a constrained device and are intended to provide a
   guideline for developing a comprehensive authentication and
   authorization solution for this class of scenarios.

   Where specific details are relevant, it is assumed that the devices
   use the Constrained Application Protocol (CoAP) as communication
   protocol, however most conclusions apply generally.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-ace-usecases/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-ace-usecases/ballot/


No IPR declarations have been submitted directly on this I-D.