Re: [Iotops] Authorization for IoT devices
Michael Richardson <mcr+ietf@sandelman.ca> Wed, 28 July 2021 18:25 UTC
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: iotops@ietfa.amsl.com
Delivered-To: iotops@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
by ietfa.amsl.com (Postfix) with ESMTP id 26BD53A1B1D
for <iotops@ietfa.amsl.com>; Wed, 28 Jul 2021 11:25:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_BLOCKED=0.001,
SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001]
autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44])
by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 3MKXx7EcReWG for <iotops@ietfa.amsl.com>;
Wed, 28 Jul 2021 11:25:46 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19])
(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
(No client certificate requested)
by ietfa.amsl.com (Postfix) with ESMTPS id BE5923A1B0A
for <iotops@ietf.org>; Wed, 28 Jul 2021 11:25:46 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1])
by tuna.sandelman.ca (Postfix) with ESMTP id 1A439389A0;
Wed, 28 Jul 2021 14:29:35 -0400 (EDT)
Received: from tuna.sandelman.ca ([127.0.0.1])
by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024)
with LMTP id D2ZJnZdzEIJ8; Wed, 28 Jul 2021 14:29:29 -0400 (EDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21])
by tuna.sandelman.ca (Postfix) with ESMTP id C4EEC3899E;
Wed, 28 Jul 2021 14:29:29 -0400 (EDT)
Received: from localhost (localhost [IPv6:::1])
by sandelman.ca (Postfix) with ESMTP id B2B4E72;
Wed, 28 Jul 2021 14:25:39 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
cc: "hrpc\@irtf.org" <hrpc@irtf.org>, "iotops\@ietf.org" <iotops@ietf.org>
In-Reply-To: <DBBPR08MB5915C85637CDD702C2250659FAEA9@DBBPR08MB5915.eurprd08.prod.outlook.com>
References: <18201.1627351357@localhost>
<DBBPR08MB5915856184BCB76D521132FDFAE99@DBBPR08MB5915.eurprd08.prod.outlook.com>
<23319.1627437136@localhost>
<DBBPR08MB5915C85637CDD702C2250659FAEA9@DBBPR08MB5915.eurprd08.prod.outlook.com>
X-Mailer: MH-E 8.6+git; nmh 1.7+dev; GNU Emacs 26.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0;
<'$9xN5Ub#
z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-=";
micalg=pgp-sha512; protocol="application/pgp-signature"
Date: Wed, 28 Jul 2021 14:25:39 -0400
Message-ID: <2926.1627496739@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/iotops/J1r6N65uAYR8-1UDZDbH5EDqtEA>
Subject: Re: [Iotops] Authorization for IoT devices
X-BeenThere: iotops@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IOT Operations <iotops.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iotops>,
<mailto:iotops-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iotops/>
List-Post: <mailto:iotops@ietf.org>
List-Help: <mailto:iotops-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iotops>,
<mailto:iotops-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Jul 2021 18:25:52 -0000
Hannes Tschofenig <Hannes.Tschofenig@arm.com> wrote: mcr> 2) but in any case, it's the form of the rules which the AS evaluates to mcr> make the authorization decision that I care about. AFAIK, neither mcr> OAUTH2 or ACE-OAUTH standardizes that (or intends to). Hannes> In deployments today the rules are not standardized because they Hannes> are configured by the user/admin into the AS. What gets pushed Hannes> around are permissions, which are defined for specific Hannes> application domains. These permissions are called "scopes" in the Hannes> OAuth language. Some of those scopes have been standardized. Thank you for confirming my understanding. I'm looking for a standard for the rules. Why? because auditing, because humans need to understand them, because configuring the rules needs to be something non-experts can do. > There has also been an attempt to standardize more generic ACLs, > see draft-ietf-ace-aif. Not even close, I think. mcr> If I'm wrong please correct me. mcr> How would ACE-OAuth identify the local Sheriff? Hannes> The purpose of an authorization framework is not to identify a Hannes> specific person. That's the role of an identity management Hannes> framework. It's not a specific person, it's a specific role in an particular geography. That's why this problem is non-trivial. > If you also want to add the identity management piece to ACE/OAuth > (which people have obviously done), then you can add OpenID Connect > and, for example, FIDO to the mix. If we can really do this with those specifications, I'd be interested in knowing how, or seeing an example of a system which has done that. I'm actually convinced that we don't need a lot of new work ("new ingredients") to make things go, but I think that we need a clear architecture on combining existing work ("better recipes") -- Michael Richardson <mcr+IETF@sandelman.ca> . o O ( IPv6 IøT consulting ) Sandelman Software Works Inc, Ottawa and Worldwide
- [Iotops] Authorization for IoT devices Michael Richardson
- Re: [Iotops] Authorization for IoT devices Hannes Tschofenig
- Re: [Iotops] Authorization for IoT devices Michael Richardson
- Re: [Iotops] Authorization for IoT devices Hannes Tschofenig
- Re: [Iotops] Authorization for IoT devices Michael Richardson
- Re: [Iotops] Authorization for IoT devices Hannes Tschofenig