[Ace] Last Call: <draft-ietf-ace-usecases-09.txt> (ACE use cases) to Informational RFC
The IESG <iesg-secretary@ietf.org> Thu, 08 October 2015 17:02 UTC
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B308E1ACE61; Thu, 8 Oct 2015 10:02:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.9
X-Spam-Level:
X-Spam-Status: No, score=-101.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rKME7-rLmozR; Thu, 8 Oct 2015 10:01:59 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 8A0E11ABD35; Thu, 8 Oct 2015 10:01:59 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.4.1
Auto-Submitted: auto-generated
Precedence: bulk
Sender: iesg-secretary@ietf.org
Message-ID: <20151008170159.15204.85259.idtracker@ietfa.amsl.com>
Date: Thu, 08 Oct 2015 10:01:59 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/ace/D9gAq9T7Z5RP72wCc8Mro7H-B1A>
Cc: ace@ietf.org
Subject: [Ace] Last Call: <draft-ietf-ace-usecases-09.txt> (ACE use cases) to Informational RFC
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Reply-To: ietf@ietf.org
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Oct 2015 17:02:00 -0000
The IESG has received a request from the Authentication and Authorization for Constrained Environments WG (ace) to consider the following document: - 'ACE use cases' <draft-ietf-ace-usecases-09.txt> as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2015-10-22. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract Constrained devices are nodes with limited processing power, storage space and transmission capacities. These devices in many cases do not provide user interfaces and are often intended to interact without human intervention. This document includes a collection of representative use cases for authentication and authorization in constrained environments. These use cases aim at identifying authorization problems that arise during the lifecycle of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and authorization solution for this class of scenarios. Where specific details are relevant, it is assumed that the devices use the Constrained Application Protocol (CoAP) as communication protocol, however most conclusions apply generally. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-ace-usecases/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-ace-usecases/ballot/ No IPR declarations have been submitted directly on this I-D.