RFC 7744 on Use Cases for Authentication and Authorization in Constrained Environments

rfc-editor@rfc-editor.org Fri, 29 January 2016 22:36 UTC

Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: ietf-announce@ietfa.amsl.com
Delivered-To: ietf-announce@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E2E2E1A8BC5; Fri, 29 Jan 2016 14:36:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.903
X-Spam-Level:
X-Spam-Status: No, score=-101.903 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5Dmh2dtQ18DY; Fri, 29 Jan 2016 14:36:10 -0800 (PST)
Received: from rfc-editor.org (rfc-editor.org [IPv6:2001:1900:3001:11::31]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 04F8D1A8F3D; Fri, 29 Jan 2016 14:36:08 -0800 (PST)
Received: by rfc-editor.org (Postfix, from userid 30) id 8DE9B180471; Fri, 29 Jan 2016 14:34:27 -0800 (PST)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
Subject: RFC 7744 on Use Cases for Authentication and Authorization in Constrained Environments
X-PHP-Originating-Script: 1005:ams_util_lib.php
From: rfc-editor@rfc-editor.org
Message-Id: <20160129223427.8DE9B180471@rfc-editor.org>
Date: Fri, 29 Jan 2016 14:34:27 -0800
Archived-At: <http://mailarchive.ietf.org/arch/msg/ietf-announce/QYo9koqNTuwP35lKGCYwbxKHdJs>
Cc: drafts-update-ref@iana.org, ace@ietf.org, rfc-editor@rfc-editor.org
X-BeenThere: ietf-announce@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: ietf@ietf.org
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-announce/>
List-Post: <mailto:ietf-announce@ietf.org>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-announce>, <mailto:ietf-announce-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jan 2016 22:36:14 -0000

A new Request for Comments is now available in online RFC libraries.

        
        RFC 7744

        Title:      Use Cases for Authentication and 
                    Authorization in Constrained Environments 
        Author:     L. Seitz, Ed.,
                    S. Gerdes, Ed.,
                    G. Selander,
                    M. Mani,
                    S. Kumar
        Status:     Informational
        Stream:     IETF
        Date:       January 2016
        Mailbox:    ludwig@sics.se, 
                    gerdes@tzi.org, 
                    goran.selander@ericsson.com,
                    mehdi.mani@itron.com, 
                    sandeep.kumar@philips.com
        Pages:      30
        Characters: 72630
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-ace-usecases-10.txt

        URL:        https://www.rfc-editor.org/info/rfc7744

        DOI:        http://dx.doi.org/10.17487/RFC7744

Constrained devices are nodes with limited processing power, storage
space, and transmission capacities.  In many cases, these devices do
not provide user interfaces, and they are often intended to interact
without human intervention.

This document includes a collection of representative use cases for
authentication and authorization in constrained environments.  These
use cases aim at identifying authorization problems that arise during
the life cycle of a constrained device and are intended to provide a
guideline for developing a comprehensive authentication and
authorization solution for this class of scenarios.

Where specific details are relevant, it is assumed that the devices
use the Constrained Application Protocol (CoAP) as a communication
protocol.  However, most conclusions apply generally.

This document is a product of the Authentication and Authorization for Constrained Environments Working Group of the IETF.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/rfc.html

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC