[Ace] Fwd: New Version Notification for draft-gerdes-ace-dcaf-examples-00.txt
Stefanie Gerdes <gerdes@tzi.de> Wed, 08 July 2015 10:45 UTC
Return-Path: <gerdes@tzi.de>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FFCD1B3439 for <ace@ietfa.amsl.com>; Wed, 8 Jul 2015 03:45:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.55
X-Spam-Level:
X-Spam-Status: No, score=-1.55 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HELO_EQ_DE=0.35] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wc2rqP05B_AX for <ace@ietfa.amsl.com>; Wed, 8 Jul 2015 03:45:16 -0700 (PDT)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 01CCA1B343D for <Ace@ietf.org>; Wed, 8 Jul 2015 03:45:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [134.102.201.11]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id t68Aj51I016588; Wed, 8 Jul 2015 12:45:06 +0200 (CEST)
Received: from [IPv6:2001:638:708:30da:4c7:f948:fd9a:8102] (unknown [IPv6:2001:638:708:30da:4c7:f948:fd9a:8102]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3mRHMj45Mmz3GJb; Wed, 8 Jul 2015 12:45:05 +0200 (CEST)
Message-ID: <559CFF31.4070201@tzi.de>
Date: Wed, 08 Jul 2015 12:45:05 +0200
From: Stefanie Gerdes <gerdes@tzi.de>
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "Ace@ietf.org" <Ace@ietf.org>
References: <20150706230021.15054.17580.idtracker@ietfa.amsl.com>
In-Reply-To: <20150706230021.15054.17580.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20150706230021.15054.17580.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/ace/HIFUKVSyrDgztr2jJszXtUqc7iQ>
Cc: Hannes Tschofenig <hannes.tschofenig@gmx.net>, Kepeng Li <kepeng.lkp@alibaba-inc.com>
Subject: [Ace] Fwd: New Version Notification for draft-gerdes-ace-dcaf-examples-00.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jul 2015 10:45:18 -0000
Hi all, we submitted a draft that will list examples for using DCAF with well-known protocols on the less constrained level. We started with an example that illustrates how DCAF can be used with OpenID Connect. Please refer to the PDF version [1] for illustrations. We would like to present this draft during the ACE Meeting in Prague. Could the chairs please reserve a slot for us? Thanks, Steffi [1] https://tools.ietf.org/pdf/draft-gerdes-ace-dcaf-examples-00.pdf -------- Forwarded Message -------- Subject: New Version Notification for draft-gerdes-ace-dcaf-examples-00.txt Date: Mon, 06 Jul 2015 16:00:21 -0700 From: internet-drafts@ietf.org To: Dr. Carsten Bormann <cabo@tzi.org>, Stefanie Gerdes <gerdes@tzi.org>, Olaf Bergmann <bergmann@tzi.org>, Stefanie Gerdes <gerdes@tzi.org>, Olaf Bergmann <bergmann@tzi.org>, Carsten Bormann <cabo@tzi.org> A new version of I-D, draft-gerdes-ace-dcaf-examples-00.txt has been successfully submitted by Stefanie Gerdes and posted to the IETF repository. Name: draft-gerdes-ace-dcaf-examples Revision: 00 Title: Examples for Using DCAF with less constrained devices Document date: 2015-07-06 Group: Individual Submission Pages: 5 URL: https://www.ietf.org/internet-drafts/draft-gerdes-ace-dcaf-examples-00.txt Status: https://datatracker.ietf.org/doc/draft-gerdes-ace-dcaf-examples/ Htmlized: https://tools.ietf.org/html/draft-gerdes-ace-dcaf-examples-00 Abstract: Constrained nodes are devices which are limited in terms of processing power, memory, non-volatile storage and transmission capacity. Due to these constraints, commonly used security protocols are not easily applicable. Nevertheless, an authentication and authorization solution is needed to ensure the security of these devices. The Delegated CoAP Authorization Framework (DCAF) specifies how resource-constrained nodes can delegate defined authentication- and authorization-related tasks to less-constrained devices called Authorization Managers, thus limiting the hardware requirements of the security solution for the constrained devices. To realize the vision of "one Internet for all", constrained devices need to securely establish trust relationships with less constrained devices. This document lists examples for using DCAF with less constrained devices. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat
- [Ace] Fwd: New Version Notification for draft-ger… Stefanie Gerdes
- Re: [Ace] New Version Notification for draft-gerd… Kepeng Li