Browse Prior Art Database

Use Cases for Authentication and Authorization in Constrained Environments (RFC7744) Disclosure Number: IPCOM000245092D
Original Publication Date: 2016-Jan-01
Included in the Prior Art Database: 2016-Feb-08
Document File: 60 page(s) / 73K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

L. Seitz: AUTHOR [+7]


Constrained devices [RFC7228] are nodes with limited processing power, storage space, and transmission capacities. These devices are often battery-powered and in many cases do not provide user interfaces.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 4% of the total text.

Internet Engineering Task Force (IETF)                     L. Seitz, Ed. Request for Comments: 7744                           SICS Swedish ICT AB Category: Informational                                   S. Gerdes, Ed. ISSN: 2070-1721                                  Universitaet Bremen TZI                                                              G. Selander                                                                 Ericsson                                                                  M. Mani                                                                    Itron                                                                 S. Kumar                                                         Philips Research                                                             January 2016

              Use Cases for Authentication and Authorization                       in Constrained Environments


   Constrained devices are nodes with limited processing power, storage    space, and transmission capacities.  In many cases, these devices do    not provide user interfaces, and they are often intended to interact    without human intervention.

   This document includes a collection of representative use cases for    authentication and authorization in constrained environments.  These    use cases aim at identifying authorization problems that arise during    the life cycle of a constrained device and are intended to provide a    guideline for developing a comprehensive authentication and    authorization solution for this class of scenarios.

   Where specific details are relevant, it is assumed that the devices    use the Constrained Application Protocol (CoAP) as a communication    protocol.  However, most conclusions apply generally.

 Seitz, et al.                 Informational                     [Page 1]
 RFC 7744                      ACE Use Cases                 January 2016

 Status of This Memo

   This document is not an Internet Standards Track specification; it is    published for informational purposes.

   This document is a product of the Internet Engineering Task Force    (IETF).  It represents the consensus of the IETF community.  It has    received public review and has been approved for publication by the    Interne...