[Ace] I-D Action: draft-ietf-ace-usecases-10.txt

internet-drafts@ietf.org Mon, 26 October 2015 16:23 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: ace@ietf.org
Delivered-To: ace@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AA7A1B4E33; Mon, 26 Oct 2015 09:23:27 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.7.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <20151026162327.10444.18407.idtracker@ietfa.amsl.com>
Date: Mon, 26 Oct 2015 09:23:27 -0700
Archived-At: <http://mailarchive.ietf.org/arch/msg/ace/mxvKLN8OaeMSDcsWaYEoreEesh8>
Cc: ace@ietf.org
Subject: [Ace] I-D Action: draft-ietf-ace-usecases-10.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Oct 2015 16:23:27 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
 This draft is a work item of the Authentication and Authorization for Constrained Environments Working Group of the IETF.

        Title           : Use Cases for Authentication and Authorization in Constrained Environments
        Authors         : Ludwig Seitz
                          Stefanie Gerdes
                          Göran Selander
                          Mehdi Mani
                          Sandeep S. Kumar
	Filename        : draft-ietf-ace-usecases-10.txt
	Pages           : 29
	Date            : 2015-10-26

Abstract:
   Constrained devices are nodes with limited processing power, storage
   space and transmission capacities.  These devices in many cases do
   not provide user interfaces and are often intended to interact
   without human intervention.

   This document includes a collection of representative use cases for
   authentication and authorization in constrained environments.  These
   use cases aim at identifying authorization problems that arise during
   the lifecycle of a constrained device and are intended to provide a
   guideline for developing a comprehensive authentication and
   authorization solution for this class of scenarios.

   Where specific details are relevant, it is assumed that the devices
   use the Constrained Application Protocol (CoAP) as communication
   protocol, however most conclusions apply generally.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-ace-usecases/

There's also a htmlized version available at:
https://tools.ietf.org/html/draft-ietf-ace-usecases-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-ace-usecases-10


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/