Use Cases for Authentication and Authorization in Constrained Environments (RFC7744)
Original Publication Date: 2016-Jan-01
Included in the Prior Art Database: 2016-Feb-08
Internet Society Requests For Comment (RFCs)
L. Seitz: AUTHOR [+7]
Constrained devices [RFC7228] are nodes with limited processing power, storage space, and transmission capacities. These devices are often battery-powered and in many cases do not provide user interfaces.
Internet Engineering Task Force (IETF) L. Seitz, Ed. Request for Comments: 7744 SICS Swedish ICT AB Category: Informational S. Gerdes, Ed. ISSN: 2070-1721 Universitaet Bremen TZI G. Selander Ericsson M. Mani Itron S. Kumar Philips Research January 2016
Use Cases for Authentication and Authorization in Constrained Environments
Constrained devices are nodes with limited processing power, storage space, and transmission capacities. In many cases, these devices do not provide user interfaces, and they are often intended to interact without human intervention.
This document includes a collection of representative use cases for authentication and authorization in constrained environments. These use cases aim at identifying authorization problems that arise during the life cycle of a constrained device and are intended to provide a guideline for developing a comprehensive authentication and authorization solution for this class of scenarios.
Where specific details are relevant, it is assumed that the devices use the Constrained Application Protocol (CoAP) as a communication protocol. However, most conclusions apply generally.
Seitz, et al. Informational [Page 1]
RFC 7744 ACE Use Cases January 2016
Status of This Memo
This document is not an Internet Standards Track specification; it is published for informational purposes.
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Interne...