Last Call: <draft-ietf-abfab-arch-10.txt> (Application Bridging for Federated Access Beyond Web (ABFAB) Architecture) to Informational RFC

The IESG <> Fri, 03 January 2014 15:13 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id AFAAC1ADFE0; Fri, 3 Jan 2014 07:13:56 -0800 (PST)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id 0P-z-6Pgkn0p; Fri, 3 Jan 2014 07:13:54 -0800 (PST)
Received: from (localhost [IPv6:::1]) by (Postfix) with ESMTP id 21FC71ADFDF; Fri, 3 Jan 2014 07:13:54 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: IETF-Announce <>
Subject: Last Call: <draft-ietf-abfab-arch-10.txt> (Application Bridging for Federated Access Beyond Web (ABFAB) Architecture) to Informational RFC
X-Test-IDTracker: no
X-IETF-IDTracker: 4.90.p1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <>
Date: Fri, 03 Jan 2014 07:13:54 -0800
X-Mailman-Version: 2.1.15
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Fri, 03 Jan 2014 15:13:56 -0000

The IESG has received a request from the Application Bridging for
Federated Access Beyond web WG (abfab) to consider the following
- 'Application Bridging for Federated Access Beyond Web (ABFAB)
  <draft-ietf-abfab-arch-10.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the mailing lists by 2014-01-17. Exceptionally, comments may be
sent to instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.


   Over the last decade a substantial amount of work has occurred in the
   space of federated access management.  Most of this effort has
   focused on two use cases: network access and web-based access.
   However, the solutions to these use cases that have been proposed and
   deployed tend to have few common building blocks in common.

   This memo describes an architecture that makes use of extensions to
   the commonly used security mechanisms for both federated and non-
   federated access management, including the Remote Authentication Dial
   In User Service (RADIUS) the Generic Security Service (GSS), the
   Extensible Authentication Protocol (EAP) and the Security Assertion
   Markup Language (SAML).  The architecture addresses the problem of
   federated access management to primarily non-web-based services, in a
   manner that will scale to large numbers of identity providers,
   relying parties, and federations.

The file can be obtained via

IESG discussion can be tracked via

No IPR declarations have been submitted directly on this I-D.