Movatterモバイル変換


[0]ホーム

URL:


Search RFCs

Advanced Search

RFC Editor

RFC 7744

Use Cases for Authentication and Authorization in Constrained Environments,January 2016

File formats:
icon for text fileicon for PDFicon for HTML
Status:
INFORMATIONAL
Authors:
L. Seitz, Ed.
S. Gerdes, Ed.
G. Selander
M. Mani
S. Kumar
Stream:
IETF
Source:
ace (sec)

Cite this RFC:TXT  | XML  |  BibTeX

DOI:  https://doi.org/10.17487/RFC7744

Discuss this RFC: Send questions or comments to the mailing listace@ietf.org

Other actions:Submit Errata  | Find IPR Disclosures from the IETF  | View History of RFC 7744


Abstract

Constrained devices are nodes with limited processing power, storagespace, and transmission capacities. In many cases, these devices donot provide user interfaces, and they are often intended to interactwithout human intervention.

This document includes a collection of representative use cases forauthentication and authorization in constrained environments. Theseuse cases aim at identifying authorization problems that arise duringthe life cycle of a constrained device and are intended to provide aguideline for developing a comprehensive authentication andauthorization solution for this class of scenarios.

Where specific details are relevant, it is assumed that the devicesuse the Constrained Application Protocol (CoAP) as a communicationprotocol. However, most conclusions apply generally.


For the definition ofStatus,seeRFC 2026.

For the definition ofStream, seeRFC 8729.




IABIANAIETFIRTFISEISOCIETF Trust
ReportsPrivacy StatementSite MapContact Us

Advanced Search

[8]ページ先頭

©2009-2026 Movatter.jp